Mock Version: 1.2.13 ENTER do(['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/c71511-updates-armhfp-c1f93ea2855aeee3cf4d8131bdf4fa1573732d1e/root'shell=FalseprintOutput=Falseenv={'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0logger=uid=995) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: armv7hl Building for target armv7hl Wrote: /builddir/build/SRPMS/nss-3.21.0-9.el7.src.rpm Child return code was: 0 LEAVE do --> ENTER do(['bash', '--login', '-c', '/usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec '], chrootPath='/var/lib/mock/c71511-updates-armhfp-c1f93ea2855aeee3cf4d8131bdf4fa1573732d1e/root'shell=Falseuid=995env={'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0private_network=Truelogger=printOutput=False) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec '] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: armv7hl Building for target armv7hl Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.n0t3wK + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.21.0 + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.21.0.tar.gz + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.21.0 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + /usr/bin/cp /builddir/build/SOURCES/PayPalEE.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestCA.ca.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestUser50.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/TestUser51.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/PayPalRootCA.cert -f ./nss/tests/libpkix/certs + /usr/bin/cp /builddir/build/SOURCES/PayPalICA.cert -f ./nss/tests/libpkix/certs + cd /builddir/build/BUILD + cd nss-3.21.0 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-pem-20140125.tar.bz2 + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . Patch #2 (add-relro-linker-option.patch): + echo 'Patch #2 (add-relro-linker-option.patch):' + /usr/bin/cat /builddir/build/SOURCES/add-relro-linker-option.patch + /usr/bin/patch -p0 -b --suffix .relro --fuzz=0 patching file nss/coreconf/Linux.mk Hunk #1 succeeded at 186 (offset 12 lines). Patch #3 (renegotiate-transitional.patch): + echo 'Patch #3 (renegotiate-transitional.patch):' + /usr/bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -p0 -b --suffix .transitional --fuzz=0 patching file nss/lib/ssl/sslsock.c Hunk #1 succeeded at 75 (offset -74 lines). Patch #6 (nss-enable-pem.patch): + echo 'Patch #6 (nss-enable-pem.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-enable-pem.patch + /usr/bin/patch -p0 -b --suffix .libpem --fuzz=0 patching file nss/lib/ckfw/manifest.mn Patch #16 (nss-539183.patch): + echo 'Patch #16 (nss-539183.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-539183.patch + /usr/bin/patch -p0 -b --suffix .539183 --fuzz=0 patching file nss/cmd/httpserv/httpserv.c patching file nss/cmd/selfserv/selfserv.c ~/build/BUILD/nss-3.21.0/nss ~/build/BUILD/nss-3.21.0 Patch #18 (nss-646045.patch): + pushd nss + echo 'Patch #18 (nss-646045.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-646045.patch + /usr/bin/patch -p1 -b --suffix .646045 --fuzz=0 patching file tests/dbtests/dbtests.sh ~/build/BUILD/nss-3.21.0 Patch #25 (nsspem-use-system-freebl.patch): + popd + echo 'Patch #25 (nsspem-use-system-freebl.patch):' + /usr/bin/cat /builddir/build/SOURCES/nsspem-use-system-freebl.patch + /usr/bin/patch -p0 -b --suffix .systemfreebl --fuzz=0 patching file nss/lib/ckfw/pem/config.mk patching file nss/lib/ckfw/pem/Makefile patching file nss/lib/ckfw/pem/manifest.mn Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): + echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.14.0.0-disble-ocsp-test.patch + /usr/bin/patch -p0 -b --suffix .noocsptest --fuzz=0 patching file nss/tests/chains/scenarios/scenarios Hunk #1 succeeded at 18 (offset -32 lines). Patch #47 (utilwrap-include-templates.patch): + echo 'Patch #47 (utilwrap-include-templates.patch):' + /usr/bin/cat /builddir/build/SOURCES/utilwrap-include-templates.patch + /usr/bin/patch -p0 -b --suffix .templates --fuzz=0 patching file nss/lib/nss/config.mk Patch #49 (nss-skip-bltest-and-fipstest.patch): + echo 'Patch #49 (nss-skip-bltest-and-fipstest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-bltest-and-fipstest.patch + /usr/bin/patch -p0 -b --suffix .skipthem --fuzz=0 patching file nss/cmd/Makefile Patch #50 (iquote.patch): + echo 'Patch #50 (iquote.patch):' + /usr/bin/cat /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p0 -b --suffix .iquote --fuzz=0 patching file ./nss/cmd/certutil/Makefile patching file ./nss/cmd/httpserv/Makefile patching file ./nss/cmd/lib/Makefile patching file ./nss/cmd/modutil/Makefile patching file ./nss/cmd/selfserv/Makefile patching file ./nss/cmd/ssltap/Makefile patching file ./nss/cmd/strsclnt/Makefile patching file ./nss/cmd/tstclnt/Makefile patching file ./nss/cmd/vfyserv/Makefile patching file ./nss/coreconf/location.mk patching file ./nss/lib/certhigh/Makefile patching file ./nss/lib/cryptohi/Makefile patching file ./nss/lib/libpkix/pkix/checker/Makefile patching file ./nss/lib/nss/Makefile patching file ./nss/lib/ssl/Makefile patching file ./nss/external_tests/ssl_gtest/Makefile Patch #51 (pem-compile-with-Werror.patch): + echo 'Patch #51 (pem-compile-with-Werror.patch):' + /usr/bin/cat /builddir/build/SOURCES/pem-compile-with-Werror.patch + /usr/bin/patch -p1 -b --suffix -Werror --fuzz=0 patching file nss/lib/ckfw/pem/ckpem.h patching file nss/lib/ckfw/pem/pinst.c patching file nss/lib/ckfw/pem/pobject.c patching file nss/lib/ckfw/pem/rsawrapr.c patching file nss/lib/ckfw/pem/util.c ~/build/BUILD/nss-3.21.0/nss ~/build/BUILD/nss-3.21.0 Patch #52 (Bug-1001841-disable-sslv2-libssl.patch): + pushd nss + echo 'Patch #52 (Bug-1001841-disable-sslv2-libssl.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-libssl.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2libssl --fuzz=0 patching file lib/ssl/config.mk patching file lib/ssl/sslsock.c Patch #53 (Bug-1001841-disable-sslv2-tests.patch): + echo 'Patch #53 (Bug-1001841-disable-sslv2-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-tests.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2tests --fuzz=0 patching file tests/ssl/ssl.sh Patch #54 (sslauth-no-v2.patch): + echo 'Patch #54 (sslauth-no-v2.patch):' + /usr/bin/cat /builddir/build/SOURCES/sslauth-no-v2.patch + /usr/bin/patch -p1 -b --suffix .sslauth-no-v2 --fuzz=0 patching file tests/ssl/sslauth.txt Patch #55 (enable-fips-when-system-is-in-fips-mode.patch): + echo 'Patch #55 (enable-fips-when-system-is-in-fips-mode.patch):' + /usr/bin/cat /builddir/build/SOURCES/enable-fips-when-system-is-in-fips-mode.patch + /usr/bin/patch -p1 -b --suffix .852023_enable_fips_when_in_fips_mode --fuzz=0 patching file lib/pk11wrap/pk11pars.c patching file lib/pk11wrap/pk11util.c patching file lib/pk11wrap/secmodi.h Patch #56 (p-ignore-setpolicy.patch): + echo 'Patch #56 (p-ignore-setpolicy.patch):' + /usr/bin/cat /builddir/build/SOURCES/p-ignore-setpolicy.patch + /usr/bin/patch -p1 -b --suffix .1026677_ignore_set_policy --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1401 (offset 37 lines). Patch #62 (nss-fix-deadlock-squash.patch): + echo 'Patch #62 (nss-fix-deadlock-squash.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-fix-deadlock-squash.patch + /usr/bin/patch -p1 -b --suffix .fix_deadlock --fuzz=0 patching file lib/pki/tdcache.c Hunk #3 succeeded at 1123 (offset 6 lines). Patch #99 (ssl-server-min-key-sizes.patch): + echo 'Patch #99 (ssl-server-min-key-sizes.patch):' + /usr/bin/cat /builddir/build/SOURCES/ssl-server-min-key-sizes.patch + /usr/bin/patch -p1 -b --suffix .min_key_sizes --fuzz=0 patching file lib/nss/nssoptions.h patching file lib/ssl/ssl3con.c patching file lib/ssl/sslimpl.h Patch #100 (fix-min-library-version-in-SSLVersionRange.patch): + echo 'Patch #100 (fix-min-library-version-in-SSLVersionRange.patch):' + /usr/bin/cat /builddir/build/SOURCES/fix-min-library-version-in-SSLVersionRange.patch + /usr/bin/patch -p0 -b --suffix .1171318 --fuzz=0 patching file ./lib/ssl/sslsock.c Patch #101 (dhe-sha384-dss-support.patch): + echo 'Patch #101 (dhe-sha384-dss-support.patch):' + /usr/bin/cat /builddir/build/SOURCES/dhe-sha384-dss-support.patch + /usr/bin/patch -p1 -b --suffix .dhe_and_sha384 --fuzz=0 patching file lib/ssl/ssl3con.c patching file lib/ssl/ssl3ecc.c patching file lib/ssl/ssl3prot.h patching file lib/ssl/sslenum.c patching file lib/ssl/sslimpl.h patching file lib/ssl/sslinfo.c patching file lib/ssl/sslproto.h patching file lib/ssl/sslsecur.c patching file lib/ssl/sslt.h Patch #102 (client_auth_for_sha384_prf_support.patch): + echo 'Patch #102 (client_auth_for_sha384_prf_support.patch):' + /usr/bin/cat /builddir/build/SOURCES/client_auth_for_sha384_prf_support.patch + /usr/bin/patch -p1 -b --suffix .client_auth_prf --fuzz=0 patching file lib/ssl/ssl3con.c Patch #112 (rh1238290.patch): + echo 'Patch #112 (rh1238290.patch):' + /usr/bin/cat /builddir/build/SOURCES/rh1238290.patch + /usr/bin/patch -p1 -b --suffix .1238290 --fuzz=0 patching file lib/cryptohi/seckey.c Patch #113 (disable-extended-master-secret-with-old-softoken.patch): + echo 'Patch #113 (disable-extended-master-secret-with-old-softoken.patch):' + /usr/bin/patch -p1 -b --suffix .disable-ems --fuzz=0 + /usr/bin/cat /builddir/build/SOURCES/disable-extended-master-secret-with-old-softoken.patch patching file lib/ssl/sslsock.c Patch #114 (tests-extra.patch): + echo 'Patch #114 (tests-extra.patch):' + /usr/bin/cat /builddir/build/SOURCES/tests-extra.patch + /usr/bin/patch -p1 -b --suffix .extra --fuzz=0 patching file tests/ssl/sslcov.txt Patch #115 (nss-prevent-abi-issue.patch): + echo 'Patch #115 (nss-prevent-abi-issue.patch):' + /usr/bin/patch -p1 -b --suffix .abi_lib --fuzz=0 + /usr/bin/cat /builddir/build/SOURCES/nss-prevent-abi-issue.patch patching file lib/ssl/sslinfo.c patching file lib/ssl/sslt.h Hunk #1 succeeded at 146 (offset 1 line). Patch #116 (nss-tests-prevent-abi-issue.patch): + echo 'Patch #116 (nss-tests-prevent-abi-issue.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-tests-prevent-abi-issue.patch + /usr/bin/patch -p1 -b --suffix .abi_tests --fuzz=0 patching file cmd/selfserv/selfserv.c patching file cmd/tstclnt/tstclnt.c patching file external_tests/ssl_gtest/tls_agent.cc Patch #117 (fix-nss-test-filtering.patch): + echo 'Patch #117 (fix-nss-test-filtering.patch):' + /usr/bin/cat /builddir/build/SOURCES/fix-nss-test-filtering.patch + /usr/bin/patch -p1 -b --suffix .test-filtering --fuzz=0 patching file tests/all.sh Patch #74 (race.patch): + echo 'Patch #74 (race.patch):' + /usr/bin/cat /builddir/build/SOURCES/race.patch + /usr/bin/patch -p1 -b --suffix .race --fuzz=0 patching file lib/pk11wrap/pk11util.c Hunk #1 succeeded at 1277 (offset 19 lines). Hunk #2 succeeded at 1378 (offset 19 lines). Hunk #3 succeeded at 1531 (offset 19 lines). ~/build/BUILD/nss-3.21.0 Patch #94 (nss-3.16-token-init-race.patch): + popd + echo 'Patch #94 (nss-3.16-token-init-race.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.16-token-init-race.patch + /usr/bin/patch -p0 -b --suffix .init-token-race --fuzz=0 patching file ./nss/lib/pk11wrap/dev3hack.c patching file ./nss/lib/pk11wrap/pk11auth.c patching file ./nss/lib/pk11wrap/pk11slot.c patching file ./nss/lib/pk11wrap/pk11util.c Hunk #1 succeeded at 1579 (offset 19 lines). Hunk #2 succeeded at 1603 (offset 19 lines). + echo 'Patch #103 (nss-fix-client-auth-init-hashes.patch):' Patch #103 (nss-fix-client-auth-init-hashes.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-fix-client-auth-init-hashes.patch + /usr/bin/patch -p0 -b --suffix .fix_client_auth_crash --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c Patch #104 (nss-map-oid-to-hashalg.patch): + echo 'Patch #104 (nss-map-oid-to-hashalg.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-map-oid-to-hashalg.patch + /usr/bin/patch -p0 -b --suffix .use_oids --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c Patch #105 (nss-remove-bogus-assert.patch): + echo 'Patch #105 (nss-remove-bogus-assert.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-remove-bogus-assert.patch + /usr/bin/patch -p0 -b --suffix .remove_bogus_assert --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c Patch #106 (nss-old-pkcs11-num.patch): + echo 'Patch #106 (nss-old-pkcs11-num.patch):' + /usr/bin/patch -p0 -b --suffix .old_pkcs11_num --fuzz=0 + /usr/bin/cat /builddir/build/SOURCES/nss-old-pkcs11-num.patch patching file ./nss/lib/ssl/ssl3con.c Patch #107 (nss-enable-384-cipher-tests.patch): + echo 'Patch #107 (nss-enable-384-cipher-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-enable-384-cipher-tests.patch + /usr/bin/patch -p0 -b --suffix .enable_384_cipher_tests --fuzz=0 patching file ./nss/tests/ssl/ssl.sh Patch #108 (nss-sni-c-v-fix.patch): + echo 'Patch #108 (nss-sni-c-v-fix.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sni-c-v-fix.patch + /usr/bin/patch -p0 -b --suffix .sni_c_v_fix --fuzz=0 patching file ./nss/tests/ssl/sslauth.txt Hunk #1 succeeded at 64 (offset 10 lines). Patch #109 (nss-fix-signature-and-hash.patch): + echo 'Patch #109 (nss-fix-signature-and-hash.patch):' + /usr/bin/patch -p0 -b --suffix .fix_signature_and_hash --fuzz=0 + /usr/bin/cat /builddir/build/SOURCES/nss-fix-signature-and-hash.patch patching file ./nss/lib/ssl/ssl3con.c Patch #110 (nss-sslstress-txt-ssl3-lower-value-in-range.patch): + echo 'Patch #110 (nss-sslstress-txt-ssl3-lower-value-in-range.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sslstress-txt-ssl3-lower-value-in-range.patch + /usr/bin/patch -p0 -b --suffix .no_ssl2 --fuzz=0 patching file ./nss/tests/ssl/sslstress.txt ~/build/BUILD/nss-3.21.0/nss ~/build/BUILD/nss-3.21.0 Patch #118 (fix-allowed-sig-alg.patch): + pushd nss + echo 'Patch #118 (fix-allowed-sig-alg.patch):' + /usr/bin/cat /builddir/build/SOURCES/fix-allowed-sig-alg.patch + /usr/bin/patch -p1 -b --suffix .allowed-sig-alg --fuzz=0 patching file lib/ssl/ssl3con.c ~/build/BUILD/nss-3.21.0 Patch #119 (nss-ssl-ssl3con-delete-duplicates.patch): + popd + echo 'Patch #119 (nss-ssl-ssl3con-delete-duplicates.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-ssl-ssl3con-delete-duplicates.patch + /usr/bin/patch -p0 -b --suffix .delete_duplicates --fuzz=0 patching file ./nss/lib/ssl/ssl3con.c + pemNeedsFromSoftoken='lowkeyi lowkeyti softoken softoknt' + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/softoken.h ./nss/lib/ckfw/pem/ + for file in '${pemNeedsFromSoftoken}' + /usr/bin/cp ./nss/lib/softoken/softoknt.h ./nss/lib/ckfw/pem/ + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/cmd/rsaperf + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/cmd/rsaperf + /usr/bin/mv ./nss/lib/util/verref.h ./nss/verref.h + /usr/bin/rm -rf ./nss/lib/freebl + /usr/bin/rm -rf ./nss/lib/softoken + /usr/bin/rm -rf ./nss/lib/util + /usr/bin/rm -rf ./nss/cmd/bltest + /usr/bin/rm -rf ./nss/cmd/fipstest + /usr/bin/rm -rf ./nss/cmd/rsaperf_low ~/build/BUILD/nss-3.21.0/nss/tests/ssl ~/build/BUILD/nss-3.21.0 + pushd nss/tests/ssl + cat sslcov.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + cat sslstress.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' ~/build/BUILD/nss-3.21.0 + popd + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.WSTzvr + umask 022 + cd /builddir/build/BUILD + cd nss-3.21.0 + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + NSS_NO_PKCS11_BYPASS=1 + export NSS_NO_PKCS11_BYPASS + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-util ++ sed s/-I// + export 'NSSUTIL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + NSSUTIL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export NSSUTIL_LIB_DIR=/usr/lib + NSSUTIL_LIB_DIR=/usr/lib ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib + FREEBL_LIB_DIR=/usr/lib + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NSS_USE_SYSTEM_FREEBL=1 + NSS_USE_SYSTEM_FREEBL=1 ++ /usr/bin/pkg-config --libs nss-softokn + export 'FREEBL_LIBS=-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + FREEBL_LIBS='-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export USE_SYSTEM_NSSUTIL=1 + USE_SYSTEM_NSSUTIL=1 + export USE_SYSTEM_SOFTOKEN=1 + USE_SYSTEM_SOFTOKEN=1 + export NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + NSS_ENABLE_ECC=1 + export NSS_ENABLE_ECC + NSS_ECC_MORE_THAN_SUITE_B=1 + export NSS_ECC_MORE_THAN_SUITE_B + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + /usr/bin/make -C ./nss/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsinstall.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pathsub.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pathsub.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro -lpthread -ldl -lc true -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf' + /usr/bin/make -C ./nss/lib/dbm make: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/include' Creating ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm Creating ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h search.h ../../../../dist/private/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/src' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/db.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard db.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/h_bigkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_bigkey.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/h_func.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_func.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/h_log2.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_log2.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/h_page.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_page.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hash_buf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash_buf.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mktemp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mktemp.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dirent.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dirent.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/db.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/h_func.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/h_log2.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/h_page.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hash.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mktemp.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dirent.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm' + /usr/bin/mkdir -p ./dist/private/nss + /usr/bin/mv ./nss/verref.h ./dist/private/nss/verref.h + /usr/bin/make -C ./nss make: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss' cd coreconf; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf' cd nsinstall; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' true -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib' cd dbm; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/include' ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ncompat.h winfile.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h search.h ../../../../dist/private/dbm make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/include' cd src; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/src' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/src' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm' cd base; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/base' Creating ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dev' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pki' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/include' ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/checker' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/params' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/results' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/store' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/top' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/util' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/certdb' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/certhigh' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pk11wrap' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/cryptohi' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/nss' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h nssoptions.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ssl' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ssl' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pkcs7' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pkcs7' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pkcs12' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pkcs12' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/smime' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/crmf' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/jar' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/builtins' ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/pem' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/pem' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/lib' ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/lib' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/atob' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/certutil' cd checkcert; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/checkcert' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/checkcert' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/digest' cd httpserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/httpserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/httpserv' cd listsuites; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/listsuites' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/listsuites' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ocspresp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk12util' cd pk11gcmtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk11gcmtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk1sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk1sign' cd pkix-errcodes; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pkix-errcodes' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pkix-errcodes' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pp' cd pwdecrypt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pwdecrypt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/signver' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/shlibsign' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd' cd external_tests; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests' cd google_test; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests/google_test' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests/google_test' cd ssl_gtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests/ssl_gtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests/ssl_gtest' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests' cd coreconf; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf' cd nsinstall; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' true -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf/nsinstall' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/coreconf' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib' cd dbm; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/include' cd src; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/src' ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm/src' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dbm' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/base' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/arena.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard arena.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/error.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard error.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/errorval.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard errorval.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hashops.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hashops.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard libc.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tracker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tracker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/item.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard item.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utf8.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/arena.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/error.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/errorval.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hashops.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libc.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tracker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/item.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/utf8.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/list.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hash.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dev' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/devslot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devslot.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devtoken.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/devutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckhelper.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/devslot.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/devutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pki' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asymmkey.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certificate.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certificate.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cryptocontext.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symmkey.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard trustdomain.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tdcache.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdecode.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkistore.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkibase.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pki3hack.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certificate.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/certsel' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certselector.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcertselparams.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/crlsel' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlselector.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcrlselparams.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/checker' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_basicconstraintschecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certchainchecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlchecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ekuchecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_expirationchecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_namechainingchecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_nameconstraintschecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ocspchecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationmethod.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationchecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policychecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_signaturechecker.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_targetcertchecker.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/params' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_trustanchor.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_procparams.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valparams.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_resourcelimits.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/results' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_buildresult.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policynode.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valresult.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_verifynode.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/store' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_store.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/top' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_validate.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_lifecycle.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_build.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/util' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_tools.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_error.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_logger.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_list.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_errpaths.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/pki' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_basicconstraints.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_cert.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyinfo.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicymap.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyqualifier.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crl.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crldp.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crlentry.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_date.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_generalname.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_infoaccess.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nameconstraints.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocsprequest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspresponse.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_publickey.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_x500name.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspcertid.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/system' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bigint.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bytearray.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_common.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_error.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_hashtable.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_lifecycle.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mem.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_monitorlock.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mutex.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_object.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_oid.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_primhash.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_rwlock.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_string.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/module' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_aiamgr.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_colcertstore.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpcertstore.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpdefaultclient.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaptemplates.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapcertstore.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapresponse.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaprequest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapdefaultclient.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nsscontext.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_pk11certstore.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_socket.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/certdb' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard alg1485.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdb.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdb.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certv3.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certv3.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certxutl.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crl.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/genname.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard genname.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard stanpcertdb.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard polcyxtn.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secname.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secname.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xauthkid.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xbsconst.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xconst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xconst.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdb.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certv3.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crl.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/genname.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secname.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xconst.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/certhigh' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhtml.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certreq.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certreq.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlv2.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocsp.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspsig.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhigh.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfy.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfypkix.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xcrldist.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certreq.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pk11wrap' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dev3hack.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11akey.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11auth.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cert.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cxt.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11err.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11kea.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11list.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11load.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mech.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11merge.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11nobj.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11obj.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pars.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pbe.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pk12.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pqg.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11sdr.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11skey.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11slot.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11util.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/cryptohi' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sechash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sechash.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/seckey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard seckey.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secsign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secsign.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secvfy.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dsautil.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sechash.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/seckey.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secsign.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/nss' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssinit.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssoptions.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssver.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utilwrap.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnss.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssver.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nss.def rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nss.def -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssver.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/arena.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/error.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libc.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/item.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/list.o ../base/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnss.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ssl' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/derive.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derive.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dtlscon.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/prelib.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prelib.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3con.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3gthr.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslauth.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslcon.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssldef.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslenum.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerr.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerrstrs.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinit.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ext.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslgathr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslgathr.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslmutex.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslnonce.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslreveal.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsecur.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsnce.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsock.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltrace.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslver.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/authcert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard authcert.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmpcert.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinfo.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ecc.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNO_PKCS11_BYPASS -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard unix_err.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/derive.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/prelib.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslgathr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslver.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/authcert.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl.def -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/derive.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/prelib.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslgathr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslver.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/authcert.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz chmod +x Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ssl' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pkcs7' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certread.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certread.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7common.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7common.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7create.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7create.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7decode.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7encode.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7local.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7local.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secmime.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmime.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certread.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7common.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7create.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7local.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secmime.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pkcs7' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pkcs12' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12local.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12local.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12creat.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12dec.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12plcy.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12tmpl.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12e.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12e.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12d.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12d.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12local.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12e.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12d.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/pkcs12' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/smime' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsarray.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsasn1.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsattr.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscinfo.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscipher.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdecode.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigdata.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencdata.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencode.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsenvdata.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsmessage.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmspubkey.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsrecinfo.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsreclist.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssigdata.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssiginfo.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsudf.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimemessage.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimeutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smimever.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimever.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smimever.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smime.def rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smime.def -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secmime.o -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/crmf' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfenc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfenc.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmftmpl.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmftmpl.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfreq.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfreq.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfpop.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfpop.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfdec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfdec.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfget.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfget.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfcont.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfcont.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfasn1.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmmfresp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfresp.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmmfrec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfrec.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmmfchal.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfchal.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/servget.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard servget.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/encutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/respcli.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcli.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/respcmn.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcmn.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/challcli.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard challcli.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/asn1cmn.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asn1cmn.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfget.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/servget.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/encutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/respcli.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/respcmn.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/challcli.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/asn1cmn.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/jar' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jarver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarver.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jarsign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarsign.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jar.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jar-ds.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar-ds.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jarfile.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarfile.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jarint.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarint.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libjar.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jarver.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jarsign.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jar.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jarfile.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/jarint.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crypto.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crypto.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/find.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard find.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/instance.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instance.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mutex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mutex.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/object.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard object.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/session.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard session.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sessobj.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sessobj.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/slot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard slot.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/token.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard token.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/wrap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard wrap.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mechanism.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mechanism.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crypto.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/find.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/hash.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/instance.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mutex.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/object.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/session.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sessobj.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/slot.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/token.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/wrap.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mechanism.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/builtins' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/constants.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bfind.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bfind.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/binst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard binst.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bobject.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bobject.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bsession.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bsession.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bslot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bslot.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/btoken.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoken.c perl certdata.perl < certdata.txt > Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdata.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdata.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdata.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/anchor.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/constants.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bfind.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/binst.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bobject.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bsession.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bslot.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/btoken.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certdata.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/pem' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/constants.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pargs.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pargs.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pfind.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pfind.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pinst.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pinst.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pobject.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pobject.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/prsa.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prsa.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/psession.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard psession.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pslot.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pslot.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ptoken.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ptoken.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ckpemver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckpemver.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/rsawrapr.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsawrapr.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c grep -v ';-' nsspem.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsspem.def rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsspem.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsspem.so -Wl,--version-script,Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsspem.def -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsspem.so Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/anchor.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/constants.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pargs.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pfind.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pinst.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pobject.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/prsa.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/psession.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pslot.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ptoken.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ckpemver.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/rsawrapr.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/util.o ../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lnssutil3 -lfreebl3 -L../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lnssckfw -lnssb -lplc4 -lplds4 -L../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -lfreebl3 -lsoftokn3 -lpthread -ldl -lc -L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl chmod +x Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsspem.so ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/sysinit' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsssysinit.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/lib' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/basicutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard basicutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secpwd.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secpwd.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/derprint.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derprint.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/moreoids.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard moreoids.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pppolicy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pppolicy.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ffs.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ffs.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11table.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11table.c rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/basicutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secpwd.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/derprint.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/moreoids.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ffs.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11table.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/lib' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/addbuiltin' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard addbuiltin.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/atob' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/atob.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard atob.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/atob -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/atob ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/atob' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/btoa' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/btoa.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoa.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/btoa -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/btoa ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/certcgi' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certcgi.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certcgi.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certcgi -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certcgi.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certcgi ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/certutil' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certext.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certext.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/keystuff.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard keystuff.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certutil -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certext.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certutil ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/certutil' cd checkcert; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/checkcert' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/checkcert.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard checkcert.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/checkcert -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/checkcert.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/checkcert ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/checkcert' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/chktest' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/chktest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard chktest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/chktest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/chktest ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/crlutil' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen_lex.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlgen.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlutil -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlgen.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crlutil ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/crmftest' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/testcrmf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard testcrmf.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmftest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/crmftest ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/dbtest' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dbtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dbtest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dbtest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dbtest ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/derdump' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/derdump.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derdump.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/derdump -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/derdump ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/digest' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/digest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard digest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/digest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/digest ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/digest' cd httpserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/httpserv' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/httpserv.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard httpserv.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/httpserv -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/httpserv ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/httpserv' cd listsuites; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/listsuites' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/listsuites.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard listsuites.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/listsuites -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/listsuites ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/listsuites' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/makepqg' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/makepqg.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard makepqg.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/makepqg -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/makepqg ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/multinit' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/multinit.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard multinit.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/multinit -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/multinit ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ocspclnt' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspclnt.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ocspclnt' cd ocspresp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ocspresp' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspresp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspresp.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspresp -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ocspresp ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ocspresp' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/oidcalc' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/oidcalc.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard oidcalc.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/oidcalc -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/oidcalc ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7content' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7content.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7content.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7content -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7content ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7env' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7env.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7env.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7env -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7env ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7sign' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7sign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7sign.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7sign -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7sign ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7verify' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7verify.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7verify.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7verify -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/p7verify ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk12util' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk12util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk12util.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk12util -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk12util ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk12util' cd pk11gcmtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk11gcmtest' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11gcmtest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk11gcmtest' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk11mode' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11mode.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mode.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11mode -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11mode ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk11mode' cd pk1sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk1sign' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk1sign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk1sign.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk1sign -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk1sign ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pk1sign' cd pkix-errcodes; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pkix-errcodes' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix-errcodes.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pkix-errcodes' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pp' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pp.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pp.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pp -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pp ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pp' cd pwdecrypt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pwdecrypt' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pwdecrypt.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/pwdecrypt' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/rsaperf' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/rsaperf.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsaperf.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/defkey.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard defkey.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/rsaperf -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/rsaperf ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/sdrtest' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sdrtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sdrtest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sdrtest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sdrtest ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/selfserv' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/selfserv.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard selfserv.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/selfserv -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/selfserv ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/signtool' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/signtool.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signtool.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certgen.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certgen.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/javascript.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard javascript.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/list.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sign.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/util.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/verify.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard verify.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/zip.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard zip.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/signtool -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/signtool.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/certgen.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/javascript.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/list.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/sign.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/util.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/verify.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/signtool ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/signver' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/signver.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signver.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk7print.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk7print.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/signver -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/signver.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/signver ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/signver' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/shlibsign' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/shlibsign.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard shlibsign.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/shlibsign -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/shlibsign ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/shlibsign/mangle' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mangle.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mangle.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mangle -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/mangle ../../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/shlibsign' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/smimetools' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsutil -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/cmsutil ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ssltap' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssltap.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltap.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssltap -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssltap ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/strsclnt' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/strsclnt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard strsclnt.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/strsclnt -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/strsclnt ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/symkeyutil' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symkeyutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/tests' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/baddbdir.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard baddbdir.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/baddbdir -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/baddbdir.o \ -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/conflict.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard conflict.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/conflict -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/conflict.o \ -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dertimetest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dertimetest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dertimetest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dertimetest.o \ -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encodeinttest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest.o \ -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nonspr10.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nonspr10.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nonspr10 -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nonspr10.o \ -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/remtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard remtest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/remtest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/remtest.o \ -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secmodtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmodtest.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secmodtest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secmodtest.o \ -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/baddbdir Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/conflict Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/dertimetest Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nonspr10 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/remtest Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/secmodtest ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/tstclnt' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tstclnt.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tstclnt.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tstclnt -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tstclnt ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/vfychain' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfychain.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfychain.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfychain -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfychain ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/vfyserv' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfyserv.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyserv.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfyutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfyserv -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/vfyserv ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/modutil' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/modutil.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard modutil.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/instsec.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instsec.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/install.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/installparse.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard installparse.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/install-ds.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install-ds.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard lex.Pk11Install_yy.c gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/modutil -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/modutil.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/pk11.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/instsec.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/install.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/installparse.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/install-ds.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/modutil ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/cmd' cd external_tests; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests' cd google_test; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests/google_test' if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/gtest/src; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/gtest/src; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/gtest/src; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -Igtest/include/ -Igtest -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/gtest -I../../../dist/private/gtest -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard gtest/src/gtest-all.cc rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a ar cr Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o ranlib Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a rm -f Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so g++ -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o -lpthread -ldl -lc chmod +x Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libgtest.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libgtest1.so ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests/google_test' cd ssl_gtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests/ssl_gtest' gcc -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl_internals.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl libssl_internals.c if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x ssl_agent_unittest.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x ssl_loopback_unittest.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x ssl_extension_unittest.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_prf_unittest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x ssl_prf_unittest.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x ssl_skip_unittest.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_gtest.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x ssl_gtest.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/test_io.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x test_io.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tls_agent.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x tls_agent.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tls_connect.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x tls_connect.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tls_filter.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x tls_filter.cc if test ! -d Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; then rm -rf Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.4_arm_cc_glibc_PTH_OPT.OBJ; fi g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tls_parser.o -c -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl -std=c++0x tls_parser.cc g++ -o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_gtest -O2 -fPIC -DLINUX2_1 -Wall -Werror -pipe -ffunction-sections -fdata-sections -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -I../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../lib/ssl Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/libssl_internals.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_prf_unittest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_gtest.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/test_io.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tls_agent.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tls_connect.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tls_filter.o Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/tls_parser.o -Wl,-z,relro ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/ssl_gtest ../../../dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests/ssl_gtest' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/external_tests' make: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss' ~/build/BUILD/nss-3.21.0/nss ~/build/BUILD/nss-3.21.0 + unset NSS_BLTEST_NOT_AVAILABLE + pushd ./nss + /usr/bin/make clean_docs build_docs /usr/bin/make -C ./doc clean make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/doc' rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/doc' /usr/bin/make -C ./doc make[1]: Entering directory `/builddir/build/BUILD/nss-3.21.0/nss/doc' date +"%e %B %Y" | tr -d '\n' > date.xml echo -n > version.xml mkdir -p html mkdir -p nroff make[1]: Leaving directory `/builddir/build/BUILD/nss-3.21.0/nss/doc' ~/build/BUILD/nss-3.21.0 + popd + /usr/bin/mkdir -p ./dist/doc/nroff + /usr/bin/cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/doc/nroff + /usr/bin/mkdir -p ./dist/pkgconfig + /usr/bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.21.0,g -e s,%NSPR_VERSION%,4.11.0,g -e s,%NSSUTIL_VERSION%,3.21.0,g -e s,%SOFTOKEN_VERSION%,3.16.2.3,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=21 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=0 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /usr/bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,21,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-config + /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + /usr/bin/cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + date '+%e %B %Y' + tr -d '\n' + echo -n 3.21.0 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert8.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key3.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/secmod.db.xml . + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert8.db.xml Note: Writing cert8.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key3.db.xml Note: Writing key3.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man secmod.db.xml Note: Writing secmod.db.5 + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.Hb3iRk + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm ++ dirname /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm + cd nss-3.21.0 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3/templates + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man5 + touch /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/libnssckbi.so + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/libnssckbi.so + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib + for file in libnss3.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/nss/unsupported-tools + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nsspem.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3 + for file in dist/private/nss/nssck.api + /usr/bin/install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/include/nss3/templates + /usr/bin/install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/lib/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin/nss-config + /usr/bin/install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/setup-nsssysinit.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/certutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/cmsutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/crlutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/derdump.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/modutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/pk12util.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/pp.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/signtool.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/signver.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/ssltap.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/vfychain.1 + for f in '""certutil' cmsutil crlutil derdump modutil pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man1/vfyserv.1 + for f in pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man5/pkcs11.txt.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert8.db.5 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man5/cert8.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man5/cert9.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key3.db.5 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man5/key3.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man5/key4.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 secmod.db.5 /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/share/man/man5/secmod.db.5 + /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.21.0 extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/bin/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/libnsspem.so extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/nss/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm/usr/lib/libnss3.so /usr/lib/rpm/sepdebugcrcfix: Updated 26 CRC32s, 0 CRC32s did match. cpio: nss-3.21.0/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.21.0/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 23953 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.mJ5fW6 + umask 022 + cd /builddir/build/BUILD + cd nss-3.21.0 + '[' 0 -eq 1 ']' + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' 9709 selfserv_9709 + MYRAND=9709 + echo 9709 + RANDSERV=selfserv_9709 + echo selfserv_9709 ++ ls -d ./dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin ./dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin + echo ./dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin ++ pwd + pushd /builddir/build/BUILD/nss-3.21.0 ~/build/BUILD/nss-3.21.0 ~/build/BUILD/nss-3.21.0 + cd ./dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9709 ~/build/BUILD/nss-3.21.0 + popd + find ./nss/tests -type f + grep -v '\.crt$' + grep -v '\.db$' + grep -vw CVS + grep -v '\.crl$' + xargs grep -lw selfserv + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9709/g' + killall selfserv_9709 selfserv_9709: no process found + : + rm -rf ./tests_results ~/build/BUILD/nss-3.21.0/nss/tests ~/build/BUILD/nss-3.21.0 + pushd ./nss/tests/ + HOST=localhost + DOMSUF=localdomain + PORT=9709 + NSS_CYCLES= + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains' + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh testdir is /builddir/build/BUILD/nss-3.21.0/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.21.0/tests_results/security which: no domainname in (.:/builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin) ******************************************** Platform: Linux4.4_arm_cc_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib: Checking if libpkix should be skipped based on skip list [] Running tests for libpkix TIMESTAMP libpkix BEGIN: Mon Apr 25 13:42:07 UTC 2016 TIMESTAMP libpkix END: Mon Apr 25 13:42:07 UTC 2016 Checking if cert should be skipped based on skip list [] Running tests for cert TIMESTAMP cert BEGIN: Mon Apr 25 13:42:07 UTC 2016 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #37: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #39: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #50: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #51: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #52: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #53: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #54: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #55: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #56: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #57: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #58: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #59: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #60: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #61: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #62: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #63: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #64: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #65: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #66: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #67: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #68: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #69: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #71: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #72: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #73: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #75: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #76: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #77: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #78: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #79: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #80: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #81: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #82: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #84: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #85: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #86: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #88: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #89: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #90: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #91: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #92: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #93: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #94: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #95: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #96: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #97: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #98: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #99: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #100: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #101: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #102: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #104: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #105: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #106: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #107: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #108: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #109: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #110: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #111: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #112: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #113: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #114: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #116: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #117: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #118: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #119: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #120: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #121: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #123: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #126: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #128: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #129: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #130: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #131: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #132: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #133: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #134: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #135: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #136: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #137: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #138: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #139: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #140: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #141: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #142: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #143: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #144: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #149: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #152: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #155: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #158: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #160: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #161: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #163: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #164: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #165: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #166: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #167: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #168: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #169: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #170: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #171: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #172: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #173: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #174: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #175: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #176: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #177: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #178: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #179: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #180: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #181: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #182: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #183: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #184: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #185: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #186: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #187: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #188: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #189: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #190: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #191: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #192: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #193: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #195: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #198: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #201: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #204: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #206: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #207: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #208: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #209: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #210: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #211: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #212: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #213: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #214: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #215: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #216: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #218: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #221: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #224: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #226: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #227: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #228: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #229: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #230: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #231: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #232: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #233: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #234: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #235: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #236: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #237: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #238: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #239: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #241: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #244: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #246: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #247: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #248: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #249: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #250: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #251: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #252: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #253: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #254: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #255: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #256: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #258: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #260: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #261: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #262: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #263: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #264: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #265: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #266: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #267: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #268: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #269: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #270: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #271: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #272: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #273: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #274: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #276: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #278: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #279: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #281: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #282: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #283: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #284: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #285: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #286: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #287: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #288: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #289: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:0d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:49:16 2016 Not After : Mon Jul 25 13:49:16 2016 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:4c:7d:14:94:08:32:9a:49:c8:46:00:5d:76:04:43: d1:e7:98:e5:71:86:df:42:ff:b0:59:63:f4:6c:88:82: ab:7d:51:7f:8e:5a:87:ac:d8:ac:f5:53:55:48:c7:a2: 6d:57:5b:e0:ac:30:2d:9b:7c:26:3c:50:d4:dd:89:ab: a5:f2:2e:00:4d:21:a3:c5:aa:ba:b4:55:46:fd:b2:b3: 40:c9:b9:9e:8d:2b:c1:74:6d:0d:41:22:9b:79:3b:70: 55:06:20:d3:be:33:08:b7:4f:74:af:04:16:20:3c:68: 23:64:6d:2e:e6:a7:25:89:a8:52:0c:4e:ea:29:c8:73: 5a:fb:67:74:e6:6e:fd:36:07:f7:47:fd:be:03:30:af: 2e:a5:e7:59:20:5f:7a:04:b5:da:09:c3:a8:61:a9:73: 59:aa:83:39:30:e1:3a:90:bc:a5:e3:29:34:5b:b0:76: ab:e9:8c:e7:11:f7:8e:b0:a4:28:f1:96:20:4c:49:39: f5:0a:62:7f:95:15:be:4e:70:87:24:03:90:47:aa:2d: be:54:13:b0:f5:c3:f3:d4:11:cc:9c:5e:a1:f8:e2:69: ee:81:16:26:5a:31:af:64:d7:c3:91:84:8f:17:56:bd: 52:93:a2:bc:e8:31:9b:fc:11:8a:04:c2:98:d4:a2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:ab:74:c0:6f:fe:50:69:55:20:d5:ab:24:be:fa:f0: ac:f2:b0:b4:5b:5f:12:f1:74:7f:8d:83:48:76:65:1f: e7:28:e2:98:e2:f1:4e:40:34:d8:20:e6:4f:7d:b1:0b: 12:ee:36:a3:f3:e1:4b:8d:51:1d:19:ea:fa:9c:f1:54: b3:5a:d0:62:e3:f8:14:34:9c:aa:7e:86:02:22:ef:4b: 76:c1:15:3b:50:e8:87:2c:2d:41:70:43:7a:1f:85:66: cc:ec:d8:86:b7:29:4e:35:c9:3d:6d:33:e6:00:53:8c: b4:08:e6:22:1e:e5:53:e5:71:bb:6d:06:ea:45:51:f8: 95:39:b4:37:b8:b5:bf:76:28:c3:23:d6:13:d9:5c:58: 6b:1a:1c:bf:0d:79:da:f6:dd:b5:84:d8:91:6f:f1:dd: ae:63:f9:4c:89:83:23:01:6e:ca:f6:6d:a2:76:72:d5: 07:8a:f9:69:b4:59:49:af:4c:68:8a:95:c4:e5:b3:fc: ac:51:e9:08:62:0a:34:f2:7c:3e:69:31:34:f3:81:b8: 8a:ef:70:99:37:d4:34:d9:08:00:8f:c3:33:f3:7d:52: 4f:c3:fd:cf:43:75:d6:4c:c6:39:b4:c5:a2:60:2b:e8: b5:ab:9e:29:e1:c8:d0:64:8a:70:58:88:6f:e2:0e:91 Fingerprint (SHA-256): 03:E3:A9:7A:A2:BB:BF:96:EA:71:98:5B:FF:F6:8E:11:C3:04:E0:F2:B9:AD:EF:2F:7E:77:47:B2:67:CD:A9:80 Fingerprint (SHA1): 86:F3:A2:8B:7C:6B:E0:A3:4F:84:F4:B8:A1:AB:27:72:4E:84:D7:1E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #290: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:2b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:49:21 2016 Not After : Mon Jul 25 13:49:21 2016 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:1f:ff:25:2d:39:d3:f3:13:ec:34:18:49:69:ff:47: 13:bd:b9:b8:41:0d:ff:83:55:47:a3:77:c4:b7:a7:55: f9:d5:ca:c5:2d:7b:2c:ea:1c:ec:cd:15:b9:a2:61:d9: 51:7d:d4:e9:ba:99:d3:9a:6d:18:d8:47:3c:99:3a:5a: f1:f0:cf:3a:dd:e9:31:31:0a:42:bf:55:68:d6:80:a0: 42:66:66:6b:5f:59:d4:ab:a3:52:4a:8e:5b:06:94:30: eb:30:ce:87:40:c4:71:b9:01:9c:9c:cc:f2:60:3c:79: ef:a9:3e:99:ab:87:47:13:46:c9:0f:25:4a:f6:87:fd: 8d:df:2a:fe:e5:44:bc:20:bf:4f:bd:8b:37:9b:13:9f: fe:bd:cb:f7:13:48:32:27:37:60:a5:aa:84:a5:99:da: 47:8b:11:71:80:57:a0:38:7a:81:6d:b5:1b:ff:6b:af: 1b:81:07:31:f8:77:c7:fc:1f:04:88:43:85:4c:8c:a4: ca:4e:d2:d4:2d:a7:18:ac:7b:4d:0f:52:d2:38:e0:5c: 88:2d:61:c9:d7:30:25:57:c6:6a:8f:c7:a7:ae:34:87: cb:68:9a:8a:30:e3:c4:4b:7a:bd:6f:a9:27:36:5c:78: e8:89:37:8d:73:5c:30:30:3e:01:db:ab:65:79:e5:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:bc:ad:23:4c:42:97:9d:36:a8:75:d5:e2:56:96:85: 92:af:86:29:23:56:04:8b:44:98:65:d1:89:92:19:8a: 29:b4:c4:63:14:0b:f2:4e:9e:e0:ad:e5:65:2b:a9:99: e2:77:93:da:b0:3d:b0:c7:cd:a9:15:fe:9f:79:fc:3b: 94:20:50:f6:8a:dd:53:0d:ff:a7:eb:12:62:9d:13:1c: d7:10:e8:7d:7a:07:9c:6c:24:25:2a:3e:11:6d:83:83: 58:90:a5:b7:d9:bb:e9:da:56:a2:03:69:d0:a0:e2:c5: 2a:c4:b2:eb:8e:de:aa:44:99:69:3b:6f:8c:21:bb:c2: 6e:74:dd:ef:dc:f3:ae:2c:d7:5a:87:6d:42:a4:e4:c6: c6:39:0d:2e:a3:33:e7:91:3f:17:09:2f:fb:5a:50:d8: ce:d9:71:09:0a:e0:d7:3f:cf:07:34:35:37:4d:25:25: 54:87:c5:da:eb:2e:05:37:99:92:07:f0:e3:86:3f:aa: 08:f9:1d:d9:f4:5a:45:11:b2:b1:0e:7a:77:24:32:e1: 32:d3:af:4d:4f:1a:e5:cb:de:80:a4:8e:1c:cd:0a:02: 0e:1d:8c:0c:49:0b:45:4e:c1:14:e8:ca:9c:02:7b:93: b3:77:f1:41:ec:b0:a8:11:93:b3:f2:08:dd:14:b5:e0 Fingerprint (SHA-256): B4:E9:13:DE:76:1B:A1:F7:5A:64:FB:A2:AC:03:D1:51:16:38:74:2F:E6:BC:B6:9B:14:AC:B2:12:6B:56:52:65 Fingerprint (SHA1): 95:E4:A0:01:D0:AC:5D:25:71:1F:E4:84:E3:9D:A8:49:34:20:88:DA Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #291: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:35 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:49:41 2016 Not After : Mon Jul 25 13:49:41 2016 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:4c:af:fa:c2:78:4a:a5:18:89:86:f8:11:38:ea:4e: 50:58:86:10:f8:46:4e:b8:fc:a9:ab:bf:ef:57:a9:40: af:90:55:68:e6:40:de:f3:18:f5:59:82:31:b5:bc:16: 88:ff:d7:c0:20:bf:72:c2:2e:30:20:18:85:83:fb:21: 5d:60:28:8c:7d:31:94:ca:7a:90:0c:77:e9:d6:eb:df: 01:20:9f:e3:df:11:02:7e:de:a3:e7:9b:96:4a:ae:d9: 2f:47:70:17:06:d9:f3:30:67:b6:58:52:9b:31:2c:0b: 29:02:45:c3:e5:23:ed:5b:f1:cb:38:a6:f0:e5:fb:cb: 71:fc:e5:a8:ef:fd:95:e8:92:21:13:e1:28:27:d2:72: 69:6f:1d:ad:65:c7:ad:61:56:92:7d:a2:df:1c:9d:27: 13:42:e7:23:89:90:f5:fa:4b:8b:a1:04:dd:35:76:c1: 26:bc:a2:96:bd:1f:83:1e:eb:45:71:e5:e0:59:8b:64: a6:e4:08:e0:a1:d7:24:ca:1f:e4:72:85:7d:fc:c9:ac: ed:b3:ee:5a:07:54:dd:3b:c6:4c:17:36:a5:31:fe:58: f0:34:14:42:0a:8f:04:e1:0a:bb:57:a1:2c:40:0a:de: d4:3c:15:d2:7b:a9:ca:48:01:c5:33:a0:b8:66:d1:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:fe:dc:20:93:14:92:c2:fc:f4:a3:2e:fe:b8:39:ad: b0:88:29:99:24:cc:cc:96:58:bb:b5:7f:b6:6f:02:18: 5d:45:79:dd:56:3f:8c:49:93:1d:86:de:fd:f4:a7:67: e4:8b:8b:01:51:70:63:c3:a0:7c:ae:5a:36:17:33:61: a2:0c:f8:44:7b:ad:69:49:b1:4d:e0:b9:7b:bf:19:5a: d6:3f:6d:43:42:10:77:ae:d9:36:db:dc:7a:86:0e:5f: e2:f4:68:01:01:2b:fb:49:e4:b6:d4:61:81:15:23:e9: 8c:25:06:82:c0:b7:58:74:95:c0:f8:57:b4:f6:75:1a: 81:16:73:3f:7d:fd:e9:2a:09:b5:05:e7:96:a8:21:9b: d6:62:8a:fa:62:df:58:0d:0c:74:f3:4a:d8:98:df:38: ae:ff:26:72:d6:e3:8d:dc:9f:14:08:e0:03:7a:38:6f: 9b:83:8e:de:88:15:60:2a:73:be:18:d1:a1:33:45:a2: ad:a7:ee:98:f6:2b:67:b5:ae:a5:ce:61:72:92:47:05: 46:21:ad:06:c7:ef:ee:e6:02:10:66:f9:97:7c:cb:eb: a4:aa:5e:a2:d9:ae:f8:5e:dc:3b:1d:8c:c8:02:7f:5e: b5:90:f9:80:33:d1:f2:89:54:2f:bc:e1:be:1f:00:dd Fingerprint (SHA-256): BD:A9:9A:29:5D:05:BC:DF:01:AD:52:8D:4A:C5:A5:74:2A:D7:0A:A1:A5:E2:92:9B:9D:38:47:4F:9E:78:61:8A Fingerprint (SHA1): DA:A5:19:FD:CB:54:45:EC:C7:D1:15:B9:55:2A:9D:22:0D:8E:13:23 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #292: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:5a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:49:44 2016 Not After : Mon Jul 25 13:49:44 2016 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:26:bd:b6:aa:b7:4d:df:06:30:7e:0d:d7:38:89:e1: 3a:15:db:cd:23:aa:f3:96:5b:db:1b:ae:7e:d5:db:bc: ba:d0:61:78:2e:3e:48:a1:9e:9d:8e:07:a5:11:53:50: e5:aa:2c:fc:c0:2f:77:e2:b5:0b:0a:e7:ab:12:79:14: f7:1f:a3:b0:57:71:16:0a:94:84:38:9b:26:8b:a9:61: 95:67:32:0a:57:5e:99:a1:29:1b:01:98:38:1e:53:84: 15:eb:82:85:07:ed:5d:13:32:fd:52:88:49:eb:03:7c: 85:49:b5:a4:8c:b7:6b:32:18:ef:34:07:80:21:fb:2b: 7a:6b:fe:2f:48:81:e1:f9:cf:3c:7a:e6:e4:27:98:ef: 8a:ad:db:48:79:65:7f:9c:a4:4c:9c:77:60:28:f1:e3: 36:3e:62:5e:5a:a5:35:5d:09:21:17:28:8a:09:33:ad: 47:8a:5e:19:d7:95:dd:b4:9c:f4:0d:32:a8:5e:6f:08: c6:97:08:d7:23:ff:fd:ff:a4:11:e2:5e:1f:60:1b:c6: d9:ef:8a:55:9e:66:c7:df:a4:81:24:31:19:03:4d:d9: 7b:6d:b7:c8:29:8c:d3:ce:c5:06:b0:18:c9:ec:5f:90: 50:8d:d1:21:33:4c:73:58:a5:2f:f1:c9:a2:8b:1e:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:e4:b8:0b:3b:6f:dc:8b:cb:9a:02:66:54:ba:ed:6c: d8:0f:cc:f6:bd:a1:d8:f6:92:45:24:37:2f:4a:e6:ab: 59:00:b1:41:1c:1a:9c:cb:f7:72:3c:99:34:29:b0:a9: b3:c9:16:d6:8d:c8:bb:e0:f0:d0:1c:b6:ce:66:3c:8f: 06:4d:57:75:5b:79:a6:e9:f8:c7:dd:5b:18:14:7b:f3: 24:f4:28:31:57:96:5f:e4:f1:c8:0d:3d:d9:01:25:41: e4:3c:49:1e:f0:b5:8e:fe:f6:20:55:ea:b3:aa:3b:09: af:af:f9:ca:88:66:fb:ac:0e:82:8b:e4:31:d0:fa:02: 34:a5:e8:6d:72:e5:52:b2:67:de:79:c8:58:84:b1:3d: c4:0e:08:e4:ed:e2:a1:22:70:52:24:1b:ad:6c:77:66: b6:67:56:9c:ab:d2:ce:38:e5:f2:7c:1f:f7:ec:98:c4: b5:49:24:39:77:0f:fc:04:50:ff:7e:4e:c6:d1:47:12: 59:d8:32:92:90:fa:c4:8b:7a:69:27:43:be:a7:ac:aa: 7a:96:2b:ea:b3:3d:ab:27:0e:c3:5e:e9:94:a5:03:11: 6f:8d:3f:02:58:83:24:54:e1:68:83:9a:21:58:cd:e9: 6c:45:67:b5:fe:a0:55:b6:a5:15:d7:61:96:82:71:01 Fingerprint (SHA-256): 76:CA:D1:D3:7E:1A:2A:02:22:2C:E4:50:B8:E0:39:26:B5:FA:66:FE:C7:7B:F5:3E:16:82:42:69:FF:DB:FA:D3 Fingerprint (SHA1): 6B:B9:9A:4C:4B:EE:6F:0D:60:98:7E:13:81:AC:3A:BE:BA:2F:67:6A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #293: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:62 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:50:12 2016 Not After : Mon Jul 25 13:50:12 2016 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:72:53:5a:dd:5f:70:0a:1f:25:ff:47:10:d1:9e:b9: a2:37:14:53:5d:c6:f6:fc:49:e6:ff:ed:51:f5:f5:2c: 1a:74:2e:db:16:74:3f:cb:d7:4b:de:b9:ef:32:ce:f1: 5f:3e:a0:a2:49:61:a6:ba:15:1f:b8:2d:9b:27:82:0d: 4e:a7:bb:b7:3b:42:0b:51:b5:e1:46:56:51:ed:17:f4: 61:52:2d:b3:52:d6:ff:9b:14:4d:05:86:08:8d:19:c6: 23:1e:4b:4e:43:04:31:ca:b6:41:f9:e0:91:9d:cf:9d: 08:a0:41:c1:d1:e6:25:1e:ef:e4:1e:91:fa:ef:e1:5b: 37:ad:de:29:73:c3:b0:c8:66:d6:8e:ff:13:33:aa:66: 56:d7:ce:0e:58:12:43:81:bf:3e:4b:45:8f:41:01:11: 15:6a:87:d8:47:fe:13:db:aa:fd:93:4a:b2:d2:44:ab: e0:ec:15:b9:3e:08:d8:1d:3f:e0:ef:26:28:c2:75:ad: 73:c2:c8:d6:6d:13:21:95:d7:20:ed:d2:cb:a9:96:bc: dc:d2:bd:e2:8d:90:93:70:d1:23:af:dd:e3:bc:1c:02: db:fe:1d:41:56:7e:14:97:d0:06:d5:cb:0d:27:57:f6: 68:6d:3d:cf:5e:33:63:96:a9:de:b9:52:29:de:d2:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:0f:77:91:4c:7a:53:8b:5c:9f:2b:97:c0:14:ec:61: c6:fc:ac:ee:c2:aa:b1:60:3a:89:25:be:5e:30:ae:fc: 11:61:45:a7:1f:98:1a:04:50:b0:4e:a5:ee:2b:90:34: 21:80:70:2f:1c:dd:9f:0e:b4:35:88:c8:d3:91:f8:bf: 52:f3:28:22:bd:0d:c0:85:4b:c0:fc:ce:23:bf:c1:44: 15:33:71:c6:54:78:d7:28:18:53:0b:9a:b9:bc:f8:2d: 0e:c1:cc:12:f0:cd:e4:ef:c6:47:70:b7:bc:2a:47:3f: ac:6b:b6:45:8b:79:d6:d4:4e:c6:37:c8:7a:94:a4:bc: 5b:e8:cd:97:33:7e:a1:05:eb:d0:09:e4:25:ca:e3:e6: 43:58:cf:27:dc:6e:38:fb:b2:c2:b0:a8:5a:5a:3b:a7: 7b:1d:7b:65:f5:4a:65:35:66:c4:e3:e5:a1:06:81:41: 0d:0e:16:87:d7:94:f5:f3:3f:a6:52:f8:d1:ab:1c:e9: 5b:c6:60:dc:c5:1e:90:13:7e:7e:a0:54:3f:6e:db:cf: ce:0f:c6:b1:ab:c3:75:27:7f:56:95:ca:ea:5f:44:06: fd:ca:d8:38:f0:d6:5e:d1:0f:05:a5:80:15:ed:75:68: 63:8c:1e:4d:5c:ef:a3:d4:0a:87:e2:3b:2a:3d:85:38 Fingerprint (SHA-256): 59:FF:7E:C1:9E:81:A5:1C:E9:06:A7:C5:CC:E5:A6:9A:88:A2:9D:00:50:9D:E6:E4:8A:A6:EA:69:58:86:61:26 Fingerprint (SHA1): ED:9A:D9:32:E4:8D:66:37:28:90:E9:55:27:AE:70:33:60:CB:C8:24 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #294: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:97 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:50:21 2016 Not After : Mon Jul 25 13:50:21 2016 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:50:6d:57:e6:43:1d:34:39:29:2d:f8:e2:6b:ee:e8: 4b:8a:db:7c:ac:e8:9c:1b:36:78:d0:90:fa:2c:c2:48: 4e:7b:06:17:1f:59:84:4f:ec:1e:09:47:49:88:62:c5: ad:23:bd:d2:34:14:d8:b6:c4:8b:58:5c:c0:72:b8:61: b8:5b:09:b2:55:25:09:02:5f:17:c2:d9:b4:1a:f2:9b: db:5c:9f:3b:3c:96:3e:d3:01:a9:7e:5f:bd:82:97:9c: 22:51:c7:50:4c:99:26:5e:ae:aa:7e:27:8c:dc:ce:70: bd:11:d7:24:8e:2b:1b:bc:bb:cc:fc:78:2f:14:5b:a0: 4a:15:34:75:b7:32:f3:e8:5b:75:ae:d8:13:7e:34:1a: 89:a3:b0:5a:0c:3b:f3:58:bb:59:b5:d5:d2:b8:79:ef: fc:d9:75:5d:61:e1:54:16:0f:63:3f:e6:37:7c:98:9d: f9:99:47:e0:de:ed:af:01:bd:b9:b5:64:10:d0:57:ca: e4:2e:46:3a:7d:12:95:e6:2c:3a:39:85:5a:36:0e:c3: ce:70:4b:6b:da:e8:f9:54:9e:5c:6f:db:59:19:9a:75: e9:3c:ec:50:eb:f1:8d:08:7d:01:fb:7e:8a:89:43:5e: d5:ba:8f:b7:9c:4e:92:39:01:9a:ab:97:a5:cb:d7:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:fa:c1:77:b5:f0:8b:48:17:40:bf:da:10:42:18:f7: c1:5d:0a:ba:a3:8a:d3:31:a8:b1:06:84:c9:cc:aa:95: e4:6b:d2:50:c0:21:db:aa:6c:a4:97:71:2b:bd:e7:89: 89:97:f1:70:3c:a5:53:26:1b:05:56:af:db:ea:47:50: a3:a5:07:7e:0d:0e:84:cf:31:21:7c:4e:4b:92:a5:b5: 91:23:60:88:8f:a2:0a:34:93:bb:dc:cd:43:1d:7f:7f: c8:d5:01:7c:f1:9d:33:93:fc:07:43:69:91:9c:ac:73: 6b:29:b1:70:f6:f6:c2:9a:3e:bc:a9:bd:b2:84:81:21: b1:0e:e8:2d:92:7b:c4:24:3f:a2:da:23:56:26:d1:e2: cc:19:dc:8f:26:16:94:63:8f:99:87:e4:90:e2:d2:58: 88:f3:f2:52:d3:99:05:76:a3:c3:1c:2d:9f:ed:17:99: 80:44:8e:0b:0b:4b:f4:76:79:55:02:0c:22:ab:4d:7d: cd:e7:64:41:12:01:e6:1c:a7:8e:8f:6a:c5:73:50:58: 51:19:ef:7b:4d:58:e8:e6:2c:00:a1:ef:1d:dd:21:27: b4:2f:54:44:52:ff:81:62:1f:59:14:e3:bc:aa:fc:2f: 0b:57:39:56:a7:0d:9b:f6:36:dc:bf:20:2f:1b:66:8b Fingerprint (SHA-256): 6F:55:2F:80:25:21:D3:B6:78:0A:80:9F:59:84:B7:26:50:B5:88:AC:E8:91:74:DE:3E:06:4A:ED:11:9A:6D:E0 Fingerprint (SHA1): 0E:2A:A8:EA:80:37:07:02:4D:C7:1E:5F:B6:0E:C0:30:B0:34:64:6E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #295: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:a8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:50:34 2016 Not After : Mon Jul 25 13:50:34 2016 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:be:4c:0b:7c:dd:8a:67:4d:b0:0a:80:e5:d0:73:6e: 96:7c:68:b6:1c:00:db:45:eb:08:cd:ba:3a:4b:01:0c: 51:e2:d3:71:55:bd:4f:39:7f:46:7d:65:67:dc:08:cc: cf:99:fd:a5:52:48:dc:26:f8:79:a8:c1:78:bc:32:b7: ac:a7:fc:73:15:50:84:90:8b:c8:38:4f:9f:42:54:25: 8f:ae:d3:28:93:3f:d5:da:f6:1d:85:1a:1d:c8:2f:c2: 18:c3:64:21:76:f1:73:98:4c:b3:06:d0:96:38:cf:7f: 15:ee:15:36:ae:cc:ca:a2:96:f9:f7:53:94:b4:e8:40: 38:fa:35:e8:f7:66:42:1d:80:8f:41:65:77:e5:1d:11: f9:6e:05:5c:90:6f:cf:85:cf:08:bc:c2:b7:10:96:3c: fb:c2:56:3a:26:c3:81:c0:35:16:da:6e:c0:6e:ad:4d: 05:12:90:82:61:8d:2f:05:2a:33:b8:dd:e2:72:28:ef: 36:aa:be:61:23:2d:fa:de:4d:03:d3:69:29:9a:42:dc: 8b:a1:00:7e:6b:2b:f7:a2:8c:74:8f:0d:a6:e7:c7:9e: 50:bb:0d:48:c7:e6:9e:bb:c7:1e:5c:17:4e:68:d5:fb: e9:b6:43:9d:4d:9f:50:b2:a8:7f:88:8b:57:38:6b:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:a7:6b:fd:fc:18:90:3f:8b:29:98:a4:5b:2e:4c:8c: d8:bd:23:bb:34:bb:ef:28:cc:20:42:92:cd:b9:d6:ac: 92:8d:77:e8:e0:9b:86:f3:c5:dc:0b:d4:ad:32:55:ac: d6:fe:7e:8e:bc:fb:70:63:18:44:d3:6f:da:89:b3:99: 9c:fa:83:78:75:9d:4f:ca:36:9e:f4:de:d4:f4:74:fe: 1c:cf:82:0f:18:1f:e4:21:9f:62:ca:4e:4f:a3:9b:4d: 1e:61:91:82:a6:ba:ec:16:0e:1f:58:67:6a:e1:c1:38: 24:25:6c:99:18:2f:45:da:eb:37:6b:89:2a:8d:40:51: b2:e8:5d:88:40:a0:74:b0:a1:e1:d3:ad:6f:5b:85:e3: 49:1d:2a:55:91:20:8c:4e:ee:04:0f:27:26:48:ce:95: c1:7d:a6:d8:d3:3b:32:62:50:f8:83:1a:4c:fc:bb:86: 48:32:55:10:1d:a7:78:2f:46:31:a4:cb:29:4c:93:08: cc:3f:4a:3d:21:21:7d:e0:99:ad:a1:87:dc:5f:ec:94: da:f2:28:77:fc:75:bd:67:bc:56:eb:2d:07:77:bb:3d: 65:66:42:b8:15:3b:27:05:f3:9f:0a:98:30:d7:87:a5: 7b:9f:fb:1f:72:00:cb:60:40:47:8d:d5:1d:a2:5c:13 Fingerprint (SHA-256): D0:89:FD:91:08:BE:BC:09:3A:85:CE:07:7A:DB:B7:A1:E3:E5:1A:11:82:71:5E:E8:F8:39:12:1B:8E:AD:A0:CE Fingerprint (SHA1): C8:96:9E:5A:7D:0B:3B:1D:30:34:54:92:5E:A0:E9:04:F7:66:3D:57 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #296: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:c0 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:50:47 2016 Not After : Mon Jul 25 13:50:47 2016 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:06:cb:4b:d5:55:30:cf:f6:39:60:42:fd:8a:3f:ab: 4c:63:cd:ac:7f:70:99:f0:aa:ca:c9:cb:1f:4a:90:b1: f9:e6:ae:73:08:09:dc:df:1c:02:a6:c1:c4:e7:3f:5f: ab:71:d7:0a:e7:cc:89:a0:ba:28:fb:da:ac:53:4a:f5: cd:10:83:3c:25:86:c4:58:f1:42:e2:2b:f7:71:cf:3f: 1a:07:ba:78:3e:54:0b:55:0d:0d:ee:fc:67:66:22:9b: 64:f4:6e:13:5d:98:32:49:5f:65:50:45:a2:26:75:bc: ac:ac:56:29:ca:58:a1:8e:08:a5:a2:4b:a9:32:9f:94: 39:2e:b1:da:0f:90:02:0f:65:e1:0f:55:8c:6d:66:90: ed:c2:5b:b5:ff:95:92:50:9f:39:87:0b:0e:34:40:68: c5:39:a2:fb:7c:4e:50:3d:85:a9:0d:8f:9e:8b:88:48: 24:00:e6:78:98:d6:48:d0:28:09:1c:83:57:2a:3b:b2: f6:d3:bc:fd:3e:47:a8:90:0d:58:34:82:a5:f3:87:00: b7:84:80:72:fa:cf:73:37:27:c4:bf:1b:13:93:e7:d3: 0b:c8:56:56:7b:27:19:53:90:ee:7a:66:d9:e5:52:eb: 89:c4:4b:40:80:3f:34:6a:cd:df:8a:b3:72:bc:8e:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:5d:6e:63:36:64:82:6c:29:8e:2a:56:67:c6:b8:8f: 37:0b:0b:4a:4b:4c:20:52:50:02:78:46:19:76:2b:c2: b1:04:19:f1:af:af:b1:8c:62:cb:35:17:34:b2:e7:57: 37:7d:ea:c1:94:ab:1e:69:e5:74:0a:3f:e4:d5:32:25: dc:7d:c9:b5:bf:71:3d:d7:d1:08:73:2c:2b:7c:b9:35: dd:cd:03:84:c8:56:5e:e3:ee:6d:02:22:d8:76:47:cc: 02:f2:d3:64:43:fb:ae:e1:74:63:9e:16:89:6f:09:18: 45:e2:d8:8b:8f:bc:35:2a:4b:7b:05:f0:94:74:0c:f8: 3e:02:3d:ac:cd:9e:39:83:b8:43:a1:ad:77:8e:69:e2: 39:6a:12:ff:48:f9:ac:f8:96:ed:15:8a:8c:d8:8f:7c: 8c:9f:9a:f3:ab:1f:42:58:45:c9:75:d8:ea:53:33:61: b6:b0:ef:4b:7a:85:b9:9f:0d:85:bf:3f:5e:d1:cb:91: 0b:5a:05:09:3d:c6:ae:af:dc:d1:0d:60:30:e3:1e:bd: fe:30:c0:a8:19:5f:b3:81:84:65:1e:6e:8e:c8:db:bf: b6:83:a7:b1:af:a9:e1:58:28:e4:e7:b2:11:92:b7:50: d1:56:0c:01:88:cd:04:a4:63:99:69:23:06:06:e1:4a Fingerprint (SHA-256): 14:9D:7A:27:1B:D0:D0:15:E8:F6:CE:3D:BC:53:7A:81:06:62:D7:FF:91:7B:7D:24:81:40:36:1E:F7:23:91:E0 Fingerprint (SHA1): 1C:38:87:8B:36:2F:6B:29:18:1C:5B:4E:E4:E6:53:EC:F0:23:48:3E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #297: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:d9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:51:02 2016 Not After : Mon Jul 25 13:51:02 2016 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:24:b9:7f:07:5f:0e:58:0f:3c:78:b6:28:86:07:42: 81:ba:93:f8:9e:38:54:e2:f9:4e:b0:08:a8:dc:46:72: 2f:65:80:3d:f6:42:26:a3:a0:64:35:61:18:bd:c4:1d: 76:68:9f:08:ae:29:88:d1:06:85:a0:1e:1b:e6:2f:b3: 16:da:12:70:24:32:ed:a2:81:3d:a5:7b:a3:29:ff:0a: 24:35:9a:15:48:0d:bd:25:1f:26:d5:27:fd:38:63:8a: 28:5b:76:43:7a:7c:a9:4a:2b:c6:39:7f:a1:00:08:fd: f3:f9:df:25:e9:a8:5d:58:c1:1e:f2:e8:0e:c9:13:be: f9:d5:db:2e:c3:af:ef:a6:b4:7d:cc:06:dc:42:84:f1: 0f:cc:14:f1:4e:98:81:7e:6b:b3:49:01:df:05:ef:1b: 35:48:43:0f:c7:ae:29:0e:d7:f9:e9:ba:81:ba:62:0f: 96:bb:b9:4f:bf:fe:ac:6a:06:50:f4:68:e8:5e:0b:32: d3:19:a7:fe:9b:d5:74:31:76:b6:c3:c4:bb:51:af:60: e8:65:9f:98:b4:0a:13:cb:68:b6:15:8d:fe:d9:9f:0d: 33:78:63:7e:41:e2:c3:22:42:69:01:7f:28:d4:c1:76: e4:4d:16:79:27:e9:1a:02:76:ee:c5:ed:33:f5:1a:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:98:ad:3c:c4:d5:15:19:55:d1:c8:e0:72:53:16:3d: 87:67:33:9a:67:1a:3a:db:a8:fd:a8:c7:e6:10:32:cf: e8:a2:64:65:2c:0e:4c:0f:f6:5c:b1:92:e6:d7:82:e2: 41:76:46:10:61:55:95:a7:fc:24:1f:31:03:38:86:a7: 53:18:35:a0:bd:2d:de:4d:1a:d5:de:6e:68:db:07:66: 2e:0d:de:90:cb:25:cc:e5:8e:9d:4c:f2:67:5e:b9:60: 0c:f7:bb:7c:b7:1c:c9:2b:01:18:a0:0e:95:a0:36:8d: 8e:8b:79:d0:18:47:dc:d9:b4:79:21:1c:60:00:b9:46: 73:e0:0c:49:92:d1:3a:35:96:97:b4:e5:02:70:13:46: be:8b:86:3b:72:09:52:29:a0:d3:a8:61:88:e2:2a:c1: a1:25:5c:bb:8a:7c:88:52:ed:99:85:d7:f1:56:9c:dd: ee:ae:fb:7a:a7:fc:51:ce:8e:04:e3:f5:98:4e:22:0b: 85:b6:f7:e0:6c:e7:0a:92:a0:90:9b:d1:ea:73:20:c8: cb:06:b6:b6:25:bc:39:fc:e4:63:3d:b6:e8:de:a7:36: f3:97:0c:b1:ec:64:95:5f:7a:74:0b:c7:fb:29:32:64: 3e:a7:c9:d5:af:e5:74:69:3a:ed:ad:cb:55:dd:f3:b5 Fingerprint (SHA-256): 8E:4F:6B:27:21:03:B1:F0:4A:4F:07:9C:54:CF:00:A2:72:E7:5B:74:6B:7F:BF:D8:46:1C:AE:E9:52:18:7C:0F Fingerprint (SHA1): C8:C9:83:EA:5B:E5:0F:E4:4D:13:25:39:C3:1B:E5:AE:45:59:68:46 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #298: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ee:f6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:51:10 2016 Not After : Mon Jul 25 13:51:10 2016 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:3f:66:60:da:1c:19:59:d0:cb:21:ef:a5:34:46: 8a:fe:4e:aa:08:78:8c:67:f2:f4:d3:eb:3a:96:94:91: 37:6d:ac:25:47:0e:a0:d9:fe:9b:35:a8:12:42:dd:33: 16:59:fb:a1:92:92:89:32:55:5d:7a:d3:ba:a7:cc:20: 55:b6:6f:c5:6e:e3:7e:71:ee:7f:75:5b:49:c0:f9:f9: 90:df:73:c9:77:57:8f:27:a9:07:00:77:80:63:4c:c3: bf:ac:70:2b:e8:5b:7a:be:bb:58:45:77:96:53:aa:54: bd:ce:00:fd:38:de:88:8a:d8:7e:da:41:75:e0:49:21: 25:d8:77:e9:62:59:af:74:39:81:e3:57:69:70:c1:6e: e1:1b:c7:c2:6b:cd:35:82:25:89:04:a7:a9:c0:cb:70: 46:e2:37:3c:92:db:7f:bc:71:72:db:4c:13:be:a2:c2: 39:e1:0c:96:ff:09:e1:1d:9d:4d:3f:d6:64:7d:f5:01: 23:3e:ac:39:15:cb:1d:44:cc:eb:41:64:8a:a7:3b:30: e1:ff:e9:b2:50:37:a0:ee:6d:56:4d:1b:1f:cf:a5:f2: 93:dd:76:5a:2f:85:e0:73:eb:38:4f:03:2d:86:2d:77: c7:a9:cc:76:95:bb:e5:24:05:53:6d:6e:be:95:0d:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:92:a3:66:a6:35:63:60:7f:69:f1:98:e5:1b:7c:dd: 1e:7e:31:36:15:1c:97:f4:60:72:92:41:f2:a8:79:6f: 9b:a4:5d:62:57:b8:bb:71:0e:23:17:46:7b:18:62:7c: 0e:f1:94:aa:11:69:12:3f:f7:67:ff:28:20:2d:30:e2: b1:72:24:0c:15:a0:77:af:85:16:03:82:16:53:96:45: 06:5f:e8:6a:be:e9:75:a2:06:ba:e3:9e:d0:5f:bf:bd: c9:92:35:75:d6:bd:4f:64:91:85:b7:2a:54:c3:c6:fa: e3:33:73:27:17:b2:ba:54:e9:0f:20:1f:fd:67:a2:82: f7:f8:a0:ca:de:e7:44:83:da:83:25:b8:83:fb:4b:60: 64:a5:4e:e8:2c:f4:3e:12:26:af:dd:26:84:1a:a0:78: 9b:dc:24:63:d5:f4:f4:55:be:95:79:dc:5f:02:99:36: 90:83:b1:84:0b:f0:d2:fc:37:c7:00:aa:34:5c:25:aa: 47:52:37:89:8c:b8:c8:bf:c0:07:07:8d:d9:0f:d2:00: 7a:ea:9b:b7:09:2a:54:02:0f:e0:4d:81:d3:f7:8f:6a: b6:35:e3:1e:c3:0a:2b:cc:e0:43:5d:6b:09:f9:fb:d3: 25:de:2b:98:c8:80:8c:dd:0c:12:c2:4a:29:79:22:18 Fingerprint (SHA-256): 02:1E:94:E5:33:51:F6:96:89:7E:C0:32:60:77:B8:83:22:14:A9:D9:EE:42:29:77:5C:56:E7:7A:F1:6B:32:F5 Fingerprint (SHA1): 90:77:3F:47:A0:74:4C:29:54:FF:9A:4A:F0:2A:64:A5:DF:5A:79:57 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #299: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ef:06 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Apr 25 13:51:29 2016 Not After : Mon Jul 25 13:51:29 2016 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:dc:7a:0c:73:f4:de:f3:e9:41:14:8b:2e:3f:a9:d8: 1e:dd:46:0f:99:a1:73:2a:bd:cd:ef:f7:fd:6e:e3:ce: 28:a6:0e:e0:b6:1b:c8:cc:35:e4:2b:5a:d5:ac:28:5b: 39:e2:74:4b:91:55:e1:56:9c:68:d7:a7:9d:32:7e:4e: bc:e6:84:a5:b5:99:53:0f:1e:e6:99:55:fc:ae:80:04: c7:46:71:b0:55:63:77:23:2c:63:74:e2:45:8d:ed:61: 46:69:f6:60:88:bd:00:01:1e:9e:23:a7:8c:02:4c:9e: 61:54:a9:08:9e:cd:ca:ea:12:63:9a:da:e9:ec:5e:cf: 30:f5:e9:c4:90:d8:f8:f3:33:b8:b4:1c:4b:75:3f:5e: 94:bd:f5:c5:8c:5e:44:27:02:d8:d8:3b:af:07:13:1c: b1:7b:34:fa:fe:26:e9:bc:25:37:5b:cb:81:e6:15:98: ff:7a:c5:1d:9d:44:02:b1:d8:0b:31:59:17:bf:8a:32: 88:30:4b:f1:6c:a2:89:2e:d5:de:a1:52:8b:4f:d6:6d: 6d:05:30:7f:1b:61:c6:fc:7b:82:49:c1:42:88:5b:0f: 6f:7e:d6:47:80:98:2c:98:72:c6:de:78:0f:7b:8e:e7: 96:91:9e:f4:14:40:14:66:50:3c:b5:90:e7:21:bb:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:d4:8b:3f:ab:76:82:5f:f2:a5:bd:4e:69:3f:e7:3f: ce:f2:87:62:9f:b0:06:d5:f1:07:69:0d:4b:8c:b6:d7: 46:a1:81:74:ed:44:1b:35:10:46:45:9b:68:0b:94:b4: 84:8c:63:fb:d4:9b:ad:28:2e:a3:00:90:90:8e:3b:df: c1:09:82:e8:c4:c1:90:7c:53:45:6b:b2:87:ea:37:89: d4:6f:e1:31:2b:70:58:ed:f0:e3:aa:a5:8a:e5:fd:ca: 5e:25:b5:28:de:ac:2b:aa:d4:7f:9a:9c:a5:ba:40:f3: 81:74:3f:de:c1:f2:cd:3a:59:ca:8a:ef:b4:a6:9a:f5: c4:d6:19:df:01:e7:aa:8c:02:c7:3f:08:02:0d:04:04: 88:47:2c:f0:b9:e3:22:62:40:62:88:f4:18:fb:91:06: cc:dc:a4:88:dd:55:dc:88:70:78:49:30:17:5e:8f:d6: 64:cc:e5:24:fc:3e:62:a6:79:9d:9e:5f:1d:76:73:5a: 40:6f:3b:fe:7f:a8:70:bb:a3:4a:2f:d1:71:fa:41:b8: 71:3a:5d:25:54:04:da:55:2b:b9:7f:dd:8d:2a:99:a4: df:92:54:09:67:e2:38:b1:93:30:83:80:a3:16:6c:52: 58:51:f0:46:10:8c:6d:af:3d:6d:43:57:88:ae:ec:5a Fingerprint (SHA-256): 2D:CB:6F:2B:E5:2C:0C:F9:E3:79:62:AD:1E:8A:AC:8D:25:14:93:37:8E:F0:B4:55:16:D1:23:D2:85:F2:81:75 Fingerprint (SHA1): C4:A5:A8:D5:45:2F:93:99:97:5F:08:4C:08:33:A9:27:5E:BA:E4:DC Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #300: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #301: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #302: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #303: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ef:46 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Apr 25 13:51:51 2016 Not After : Mon Jul 25 13:51:51 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:0f:5c:7b:44:1e:4e:40:1f:7f:ac:02:26:05:4e:2e: e2:f1:02:90:8d:93:2b:84:fd:f3:3e:5b:f6:33:93:ab: 46:03:d5:1e:56:65:90:1f:10:2f:92:02:02:46:76:83: 81:2b:8b:a6:69:75:bc:48:c3:02:39:0d:33:01:d3:fe: af:c3:80:2c:47:21:04:da:da:48:54:c3:2e:68:78:57: 03:e3:d7:34:12:51:25:5d:2f:4d:c4:04:f6:98:27:9f: 98:d5:fc:4d:da:c5:1b:f9:72:20:5e:3f:1c:8d:79:e7: 5b:24:a7:54:ce:2a:58:07:4f:d0:27:3c:14:8f:9d:d7: 87:2c:13:aa:24:a0:1b:98:e5:54:60:f6:d5:98:db:d9: b0:dd:21:18:f1:f2:af:18:a1:ef:2b:ae:43:46:e5:ae: 64:f9:24:d3:fa:a5:a9:72:df:94:86:06:89:66:ba:75: 4a:a6:1f:91:37:d3:31:1f:56:e0:37:91:da:ea:e6:ee: 1c:35:2c:e7:ec:5e:8b:00:6b:2e:4c:c4:96:5f:d4:a4: 63:d8:e4:b5:8b:16:be:ff:90:5e:94:bf:aa:8e:ac:1f: f9:01:b8:cb:d2:11:25:f4:86:3d:e3:3b:94:1f:90:5e: f0:91:bf:2c:60:74:22:22:56:7d:45:d1:3f:dd:4b:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:59:78:32:de:7b:ee:f6:0c:e1:c7:d7:93:5f:c6:4c: 78:7a:36:f6:5a:ca:55:a8:60:d5:5a:53:40:3f:16:cb: b8:e8:5f:29:de:7d:ce:bb:70:02:ee:e3:5f:02:75:84: 72:2d:12:45:a7:85:5a:c9:34:79:51:ed:ad:b6:48:5d: 1a:e8:3c:39:02:b3:3c:98:50:1b:bd:8e:fc:1d:15:1f: 5b:90:72:26:57:0a:5f:78:12:40:48:fd:09:b2:3b:e2: 56:01:97:72:23:70:7d:5d:4c:4a:6e:8d:02:d4:09:fe: e6:51:cb:18:aa:41:88:80:a0:bf:50:67:c7:5c:22:52: fc:03:a6:9e:a6:f9:a8:a7:79:1b:4f:2c:8f:24:5b:6a: 04:5e:60:c1:1a:2e:a0:6d:27:e4:c4:5d:82:03:b2:18: f0:1f:2c:73:cb:a5:a6:c8:f8:e5:9a:56:7e:52:11:03: f4:6b:3c:d8:a7:2e:2d:47:52:70:33:b8:af:ac:d4:58: 92:df:d0:12:d6:ef:d6:b3:e8:97:42:3d:97:63:42:2b: 9a:4f:88:14:25:2b:c1:f8:d7:c0:9b:de:08:87:46:0a: e9:61:33:69:1e:a6:7a:1d:c4:95:f5:7b:07:0e:57:1d: 21:a3:e7:23:91:87:fa:a5:70:9b:ae:e6:54:29:7b:02 Fingerprint (SHA-256): 1C:F6:51:BD:65:89:58:78:11:FB:39:7C:59:79:DA:49:1C:18:5D:80:CE:E1:60:96:BC:1F:75:D4:41:69:C7:D8 Fingerprint (SHA1): 7A:D9:09:54:C3:6C:AE:05:A9:03:B4:6A:B7:03:05:9A:57:E9:1C:5F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #304: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #305: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #306: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #307: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #308: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #309: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #310: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #311: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:29:ef:95 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Apr 25 13:52:35 2016 Not After : Mon Jul 25 13:52:35 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:a5:5f:fb:27:6c:ea:e2:67:8e:5a:5e:f4:d0:4a:76: ef:52:03:62:52:16:d8:c7:af:48:3e:b2:3a:50:00:e3: 42:4d:e3:9e:04:74:1f:6e:54:46:d5:60:49:d5:3f:2f: 26:c7:f9:6b:f0:59:cd:76:61:8d:03:15:05:bd:bb:11: f9:28:96:48:fe:21:a6:cc:7c:67:5a:81:f4:a5:b9:f5: 24:bd:e8:72:d9:5b:2b:e8:e0:c4:ba:21:d0:be:dd:7f: 3d:a5:dc:a7:ef:6b:3b:1a:fb:17:3e:b9:b5:58:b0:d7: 94:1d:37:f1:b7:7d:ea:43:f4:80:20:7d:41:50:a7:2f: 45:bc:87:75:2b:37:e3:05:05:61:70:fa:a8:87:3f:34: 83:7c:b9:d2:a2:be:19:52:c5:06:ea:a7:97:59:6f:2f: 43:e0:d9:07:d6:b8:06:cd:6e:37:50:7d:4f:2e:72:71: 0f:68:e6:fb:de:da:db:76:08:20:c4:12:a3:6c:95:c0: 68:ca:dd:f5:e9:df:b6:5d:4c:01:88:45:3b:0c:ef:6e: 0c:0a:7d:da:dc:2c:b4:8c:71:10:b5:2a:ef:4c:84:a9: 2a:ff:3f:97:2e:ed:d4:5f:36:79:b4:5f:38:5d:f2:e5: 7e:a0:7e:67:e6:92:d9:e1:c5:38:6d:5e:8a:ad:43:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:0d:8b:8f:b7:d7:1e:cd:71:86:b2:8e:0d:a7:14:27: b2:5f:36:cd:1b:37:5a:f5:d5:65:15:13:9f:07:87:96: a1:26:1b:15:d9:87:4e:34:2d:08:9d:c0:47:e7:bf:1f: 42:eb:a2:30:b4:66:28:ef:4f:54:4e:5f:45:b9:24:f2: 10:7e:15:7c:24:a7:6f:87:e1:b0:6c:6e:e4:61:c1:32: 4e:24:7d:60:35:d5:f1:cd:d9:8e:97:b3:54:e3:7a:69: 95:94:90:e0:26:f7:94:27:00:44:64:33:7b:0a:0c:bf: 0c:05:87:07:23:22:8d:d0:5c:6c:2c:0b:0d:31:18:d4: 72:47:96:01:94:65:1e:2b:9a:f6:c3:94:59:98:f7:c2: 94:59:5a:f4:34:4e:30:51:21:f3:5f:8f:f0:c3:ea:c8: 6f:1f:ac:94:91:9c:f7:ac:e1:93:8c:2c:1c:1d:02:3c: 04:d7:eb:19:2e:1b:37:05:2c:41:e2:9b:00:70:d9:77: d0:e0:d0:1f:7f:8a:c0:b1:a0:4c:cf:2b:d9:4c:d2:40: e2:5b:2f:4a:7c:53:d9:2f:12:ed:e0:87:f6:85:92:a2: a4:0d:ee:c1:49:e2:7e:32:c7:36:c6:ff:74:7a:a7:c4: 69:9a:37:7a:0f:2c:35:da:47:b4:41:71:ae:5d:f6:63 Fingerprint (SHA-256): 86:03:3E:57:86:18:05:7F:4E:F1:B9:99:A7:F0:2A:58:4A:3A:19:F3:0B:A0:AF:1B:86:F3:59:B2:7B:E3:64:4B Fingerprint (SHA1): EA:9F:01:C0:6D:04:03:3F:7B:E8:D6:FD:45:D6:59:5B:57:CB:B2:0E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #312: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #313: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #314: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #315: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #316: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #317: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #318: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #319: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #320: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #321: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #322: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #323: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #324: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #325: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #326: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #327: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #328: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #329: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #330: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #331: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #332: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #333: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #334: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #335: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #336: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #337: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #338: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #339: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #340: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #341: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #342: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #343: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -o root.cert cert.sh: #344: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #345: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #346: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #347: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #348: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #349: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #350: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #351: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #352: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #353: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #354: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #355: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #356: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #357: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #358: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #359: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #360: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #361: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #362: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #363: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #364: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #365: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #366: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #367: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #369: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #372: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #375: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #378: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #381: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #383: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #384: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #386: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #387: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #388: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #389: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #390: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #391: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #392: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #393: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #394: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #395: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #396: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #397: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #398: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #399: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #400: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #401: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #402: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #403: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #404: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #405: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #406: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #407: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #408: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #409: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #410: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #411: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #412: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #413: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #414: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #415: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #416: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #417: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #418: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #419: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #420: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #421: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #422: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #423: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #424: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #426: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #427: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #428: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #429: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #430: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #431: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #432: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #433: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #434: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #435: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #436: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #437: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #438: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #439: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #440: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #441: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #442: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #443: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #444: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #445: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #446: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #447: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #448: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #449: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #450: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #451: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #453: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #454: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #455: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #456: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #457: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #458: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #459: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #460: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #461: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #462: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #463: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #464: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #465: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #466: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #467: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #468: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #469: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #470: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #471: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #472: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #473: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #474: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #475: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #476: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #477: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #478: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #479: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #480: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #481: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #482: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #483: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #484: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #485: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #486: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #487: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #488: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #489: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #490: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #491: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #492: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #493: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #494: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #495: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #496: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #497: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #498: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #499: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #500: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #501: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #502: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #503: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #504: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #505: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #506: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #507: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #508: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #509: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #510: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #511: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #512: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #513: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #514: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #515: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #516: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #517: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #518: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #519: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #520: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #521: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #522: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #523: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #524: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #525: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #526: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #527: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #528: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #529: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #530: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #531: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #532: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #533: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #534: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #535: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #536: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #537: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #538: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #539: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #540: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #541: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #542: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #543: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #544: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #545: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #546: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #547: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #548: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #549: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #550: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #551: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #552: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #553: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #554: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #555: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #556: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #557: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #558: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #559: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #560: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #561: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #562: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #563: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #564: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #565: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #566: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #567: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #568: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #569: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #570: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #571: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #572: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #573: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Apr 25 13:58:21 UTC 2016 Checking if dbtests should be skipped based on skip list [] Running tests for dbtests TIMESTAMP dbtests BEGIN: Mon Apr 25 13:58:21 UTC 2016 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #574: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #575: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #576: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #577: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #578: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir dbtests.sh: #579: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir dbtests.sh: #580: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #581: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #582: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #583: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #584: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/secmod.db database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/cert8.db database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/key3.db dbtests.sh: #585: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtests.sh: #586: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mockbuild 1221 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1425 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 579 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 229376 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/cert8.db -r--------. 1 mockbuild mockbuild 110592 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/key3.db -r--r-----. 1 mockbuild mockbuild 394 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/req -r--------. 1 mockbuild mockbuild 16384 Apr 25 13:58 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ronlydir/secmod.db --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #587: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:22 2016 Not After : Sun Apr 25 13:47:22 2021 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:81:a5:d1:b6:94:ab:01:6a:f6:85:88:b1:ea:ee:06: 3d:79:97:1e:92:41:bb:f2:2d:8f:a2:b0:9a:e3:13:e0: a7:d1:02:86:3d:1b:5c:d1:72:1d:50:1f:c5:98:95:dd: a0:79:d1:92:fc:f2:50:ce:93:de:f3:29:94:6e:b6:da: 1e:5e:6e:39:ca:d9:51:59:3d:d4:dd:09:30:83:e5:c2: 27:ba:a9:ec:4b:f6:fd:6d:b3:db:4c:50:30:59:0a:d5: 09:6c:f7:f5:09:2d:48:f4:1a:d5:d9:78:70:96:41:65: 3f:3d:5a:82:3f:c6:08:4a:fb:af:bf:96:ad:a7:8a:ff: a7:00:e6:6b:51:d5:de:ca:6f:db:84:5c:f8:9f:a6:eb: 9e:ac:2b:c7:67:2b:a2:ba:b3:9e:d8:2b:ca:c1:a2:81: 0c:fa:6a:57:cc:57:b6:c4:26:2e:4f:56:1e:45:3c:0c: 0d:a6:dd:5c:7c:db:a9:13:6f:c6:63:4d:d7:06:c2:88: 3e:c4:f3:8d:81:a9:83:9d:13:10:39:ae:75:73:53:39: c5:1e:be:22:bd:cf:57:05:c3:80:cd:88:ad:bf:e1:b5: 2f:ba:47:35:4a:98:9e:e4:2a:ec:56:58:18:c5:1d:c8: bb:f4:8d:d0:14:c2:27:c3:98:d0:74:d4:2b:8d:e7:8b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:bb:fa:2d:44:ab:4f:ed:e7:a3:45:74:01:e3:b6:00: a7:fe:d6:82:f0:86:bf:6a:9f:0e:b7:4c:07:33:04:b8: c6:17:65:d1:d9:d1:c5:a4:56:bc:8b:71:74:49:ed:b6: 93:75:ef:53:e9:f8:c8:62:86:a2:f8:16:43:d4:f7:71: 38:4c:a8:21:e8:19:9c:37:5e:1f:40:33:b3:86:6d:43: 6d:2e:1e:aa:93:22:b4:36:65:4a:e2:a0:a0:db:1c:c9: ca:7c:06:cb:cb:20:6a:70:b9:00:40:62:d2:af:cc:4e: 64:14:ca:1a:0a:f1:f5:69:84:b9:f9:04:9f:4d:31:38: c0:06:8b:a8:3c:55:81:b6:12:5b:5f:75:8f:3a:f4:ad: f1:e5:d4:40:6d:82:c5:b2:e4:e7:16:8a:a9:d8:74:45: 75:89:d8:21:a0:5a:a4:9a:91:2b:6c:0a:0d:60:0e:f6: d0:7a:17:09:15:09:1e:f0:88:c1:48:fd:90:cd:4e:c3: bb:3a:95:ca:30:73:7d:04:ed:f4:3b:f2:98:4d:0d:4c: 5f:04:db:61:d9:88:a0:35:23:f6:24:2f:c6:51:51:b6: d2:28:5c:e9:c4:ca:89:81:8c:1e:f1:66:c1:72:0e:63: 55:5e:b3:2d:f2:d1:fc:f7:92:78:4c:b5:b7:1d:62:e8 Fingerprint (SHA-256): AA:D1:60:34:73:1D:64:9E:02:DA:D0:9A:59:B2:DB:A0:D2:08:61:11:61:96:D4:63:7E:5B:65:67:A0:65:5C:6D Fingerprint (SHA1): 8C:75:D7:C8:8E:B5:FC:86:E3:84:0B:E1:AC:06:CA:59:98:B7:05:93 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #588: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Mon Apr 25 13:58:30 UTC 2016 Checking if tools should be skipped based on skip list [] Running tests for tools TIMESTAMP tools BEGIN: Mon Apr 25 13:58:30 UTC 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 84:96:74:d2:de:6f:95:65:fd:42:d6:09:84:63:47:42 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #590: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #591: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #592: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #593: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:f3:9e:d3:52:9b:04:55:61:5c:b7:f3:9a:0d:89:d6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Apr 25 13:44:19 2016 Not After : Sun Apr 25 13:44:19 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:e8:ec:2b:b3:36:79:06:33:9c:29:52:ff:bd:95: f9:b3:c6:b3:4e:0b:3d:51:62:fc:16:70:ca:57:00:e4: 96:8a:b1:67:01:7b:46:33:b4:45:8e:87:84:40:19:fe: 0d:6b:54:d9:83:c5:23:7d:77:08:30:22:97:c7:7a:2e: a3:cf:f5:01:6c:74:be:94:78:2b:91:a9:c2:02:7e:3c: a8:88:47:dc:5a:90:db:36:c8:00:df:bc:ae:fa:f5:5b: 57:9e:b2:5e:6b:fc:e1:af:57:55:e6:8d:41:b8:17:f2: 6d:b2:49:fd:d4:66:ff:d2:ac:31:d2:5b:e9:01:2f:ee: 53:4a:09:c3:ff Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:08:a2:fa:c6:f2:63:ea:ae:f0:4d: c2:d7:02:dc:d9:1b:01:9e:9d:e5:87:24:18:5e:00:80: 63:33:7f:40:5f:16:d1:ff:82:7a:c9:5b:dc:f5:ed:06: 78:53:c7:81:ee:87:cc:ac:ff:02:49:c6:a7:4a:22:83: b0:39:3c:e1:18:d0:9d:02:42:00:c0:64:9e:3d:74:7c: 48:14:39:14:d8:8e:78:5f:66:78:a3:d5:85:23:7d:a5: 19:b6:e7:44:aa:5d:26:7d:24:47:40:94:56:b1:02:d5: 12:2d:fe:21:c0:a9:e4:da:46:a9:ad:93:af:03:2d:cb: 87:59:68:df:78:d0:29:76:7b:a8:e2 Fingerprint (SHA-256): 95:A7:9D:E8:E9:DA:8A:CE:04:80:FD:A2:D6:51:B6:00:36:2B:54:E6:89:13:3C:BE:C7:F7:1B:61:6D:C3:83:98 Fingerprint (SHA1): 08:C8:CA:B2:E0:7B:90:9E:84:4E:37:1A:50:E2:F9:1A:01:F2:A8:29 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Apr 25 13:47:06 2016 Not After : Sun Apr 25 13:47:06 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:13:c6:d1:15:32:72:e7:50:26:d4:c8:d5:17:88:22: d0:a7:29:0b:75:2b:99:34:37:7a:84:85:11:76:8d:28: ee:75:41:23:a7:8d:9e:dc:8a:aa:a9:4b:55:4a:2e:60: 4b:ba:fa:93:84:9e:a3:9d:08:62:77:8e:3c:97:76:e4: 3e:24:f6:00:2f:31:fb:3a:37:87:37:c6:3e:91:a3:a1: 7c:2e:11:11:ae:8a:44:f9:0e:c7:cb:16:39:a1:a6:b4: 4c Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:e8:a8:37:2e:15:b9:31:4d:16:d4: 0e:66:78:91:4b:3c:05:be:3e:35:86:76:81:85:24:ea: 77:27:3f:df:90:f9:ee:10:f3:de:3d:af:bf:03:f2:bf: d2:46:ec:e4:3a:46:9c:f3:68:10:50:e2:74:95:c8:d7: 52:ef:6b:72:18:66:ea:02:42:00:c3:92:de:aa:5b:e1: 5e:4b:c0:9d:8f:48:0c:f4:51:5d:cf:2c:8f:29:c0:e9: f7:27:da:b2:7c:83:65:05:41:5c:c2:34:65:52:ce:0d: f8:8e:f7:27:5c:54:ab:3c:c0:c7:ff:c4:4e:92:3e:90: d2:d6:d7:a5:b6:55:91:57:ec:69:48 Fingerprint (SHA-256): B9:0A:9A:63:BC:25:08:91:31:F0:6F:3F:34:27:00:4A:86:A1:E9:E1:15:AC:55:B4:5C:88:47:94:C4:F6:EA:C6 Fingerprint (SHA1): EF:15:F7:0B:92:77:99:A8:F9:7B:FC:59:87:3D:F8:02:6C:15:FA:0C Friendly Name: Alice-ec tools.sh: #594: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #595: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ba:e0:da:9c:14:b0:eb:54:05:9e:5e:d3:3d:10:13:e2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #596: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #597: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #598: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a8:40:2a:0f:ef:d1:db:7d:f0:d0:97:de:74:cc:3d:db Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 07:68:81:e5:7a:9c:40:bc:8b:35:9a:0d:1f:32:2f:f0 Iteration Count: 2000 (0x7d0) tools.sh: #602: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #603: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #604: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: df:3b:49:f0:a7:09:7c:06:2e:c5:90:fd:06:3c:06:02 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #605: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #606: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #607: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:a7:d1:e7:6c:71:56:cb:7d:9d:e0:93:92:30:10:eb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #608: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #609: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #610: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e4:e0:69:4b:11:43:3c:ad:51:8a:d9:4a:0f:7b:a5:f7 Iteration Count: 2000 (0x7d0) tools.sh: #611: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 41:39:8b:cd:10:13:c0:3e:9d:a3:0d:00:30:ca:17:9a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:79:06:21:db:fd:71:87:41:2c:d8:4d:0c:eb:9e: 77:e8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #614: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #615: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #616: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:3b:96:eb:b8:5a:d7:47:e8:81:a9:f2:c2:2a:44:05 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:11:84:6e:6b:1a:63:84:12:6a:92:fc:15:37:19: c9:ac Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #617: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #618: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #619: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:e5:b0:2e:3c:a4:6b:74:2f:1b:ea:d0:0e:ba:c3:22 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:1b:fa:c2:68:a2:07:76:47:ea:0e:5a:06:d8:d7: 61:a5 tools.sh: #620: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #621: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #622: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d1:d7:91:12:54:a7:4d:57:c1:34:32:a3:bd:5f:15:92 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:48:be:7c:50:02:ae:cc:af:2e:8d:5a:1d:d4:69: ba:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #623: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b3:9e:58:a2:42:76:1f:f7:22:ac:e6:e1:6c:a5:a8:d9 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:39:f5:d8:27:62:92:3a:39:6e:f8:35:5b:96:37: 61:1b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #626: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #627: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #628: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: be:88:1f:d8:9e:24:4d:ea:20:5f:e7:18:ca:b7:0f:4a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:cd:82:11:60:32:9e:f2:24:51:97:c5:5f:1f:71: 20:9c tools.sh: #629: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #630: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #631: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:8f:f2:2d:9f:2d:f1:ff:c4:c5:ee:62:c8:5f:4b:e1 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d1:71:95:76:8f:0a:22:33:20:8b:eb:a2:56:dd: 8f:31 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #632: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #633: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #634: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:4a:05:12:8b:a8:b3:4d:df:63:1f:7c:e8:e3:a6:b8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5c:bf:ab:2b:d5:ff:bf:4f:53:f9:cd:96:d0:26: 9b:ed Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:9a:b3:45:7b:5e:58:51:aa:84:75:7f:f8:2d:b9:74 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f7:e5:1e:54:4d:9f:e6:76:8a:7b:44:5d:7d:bf: bc:c6 tools.sh: #638: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #639: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #640: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1e:c9:89:99:be:a7:72:74:7f:23:b7:7a:a7:e6:09:13 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:31:d4:10:c4:c6:da:3e:90:82:79:31:67:e0:30: 2f:69 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #641: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #642: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #643: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8f:30:6b:dd:58:71:ed:2a:0d:08:61:4f:be:ac:55:33 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:44:99:42:ca:12:3c:ca:8f:b9:36:7c:62:b7:22: 5c:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #644: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #645: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #646: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ab:a8:2e:ca:1d:16:d5:57:21:c2:28:39:d3:20:1f:42 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:ef:31:cf:65:25:64:d4:62:a1:4d:8f:b9:8d:ac: c1:87 tools.sh: #647: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 43:b0:05:62:c1:d9:5b:9b:e2:2c:59:36:12:42:5a:99 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:c0:06:27:0b:56:d2:e8:d2:79:eb:e0:a0:9b:4c: ce:e0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #650: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #651: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #652: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a9:2a:6b:1b:2a:bc:00:bf:7b:c9:fe:68:27:1d:2e:77 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:64:bb:7a:25:e6:b4:84:5c:2b:fa:82:60:0e:f4: f2:c6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #653: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #654: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #655: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:13:5c:c2:f1:b6:18:ac:7d:30:4f:5f:af:70:19:a8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:18:4b:bf:5f:21:86:f3:fb:a0:e2:7d:4e:c6:38: 04:cf tools.sh: #656: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #657: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #658: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:9d:c2:7f:6d:57:2f:b2:54:e2:62:ff:c6:ce:6e:7b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:e2:8f:76:33:9e:95:9f:46:fc:5d:7a:5f:9e:ef: 3e:94 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:2b:d0:78:04:a9:47:5e:8d:a5:47:2b:cc:8f:c4:bb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:44:09:45:2f:cc:7e:de:37:f4:54:d5:60:cc:1b: 61:e6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #662: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #663: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #664: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f6:4b:99:a8:22:49:74:16:be:99:a6:f4:cb:d4:91:d9 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:c5:b4:fa:82:c7:f0:84:4f:42:b4:93:4f:6a:42: ed:f8 tools.sh: #665: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #666: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #667: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 4d:ec:df:f3:4c:08:74:8e:29:3c:38:a7:ae:be:4e:43 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #668: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #669: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #670: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 4e:30:96:e7:8b:1a:3b:85:2d:8c:d9:a5:88:7d:d9:0a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 6e:ea:6c:18:2e:88:87:82:ed:19:e9:6b:c4:1b:c2:45 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #674: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #675: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #676: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ad:e3:77:c7:04:10:aa:b7:ed:cc:83:ca:03:fe:f9:91 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #677: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #678: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #679: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 51:c0:81:2e:37:76:07:f1:65:1b:dd:53:62:33:a5:fd Iteration Count: 2000 (0x7d0) tools.sh: #680: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #681: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #682: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: dd:ef:6a:29:af:05:44:68:7d:60:7a:fb:93:6a:e6:d8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: de:6a:6a:78:ef:f5:1f:69:50:e4:b7:11:d7:93:7c:88 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #686: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #687: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #688: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 15:7c:4d:7a:02:cf:23:4c:5e:7f:4d:50:d4:66:5a:db Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #689: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #690: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #691: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a3:bb:6c:9c:d8:8a:b2:eb:d3:97:84:c2:5c:e0:9a:11 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #692: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #693: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #694: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 8f:32:d9:70:33:72:76:23:56:62:0c:21:64:f7:ec:5b Iteration Count: 2000 (0x7d0) tools.sh: #695: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: be:9b:94:bc:1b:0e:7d:df:fb:3a:d3:bf:84:fd:a2:ed Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #698: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #699: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #700: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b3:de:25:e4:32:e7:03:52:5c:78:6b:44:ab:71:f5:b7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #701: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #702: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #703: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 21:c5:4c:5a:6a:8c:b5:92:db:4e:f7:94:3d:f5:a0:7c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #704: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #705: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #706: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 47:6b:46:0b:f0:8a:5b:48:12:2a:a3:c6:e7:01:3c:23 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f3:62:e7:7d:ef:e7:98:b8:6e:55:56:82:24:cb:94:ab Iteration Count: 2000 (0x7d0) tools.sh: #710: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #711: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #712: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:b1:0e:83:b6:ab:e2:7c:2f:7c:11:62:64:f8:06:fc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #713: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #714: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #715: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c3:6d:17:84:3f:ed:bd:81:2c:2f:f6:b2:aa:14:71:20 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #716: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #717: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #718: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:99:99:21:5e:d3:1a:f7:c2:17:87:4a:b1:46:02:4e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cb:df:35:01:ac:ee:e8:31:1a:66:16:52:a3:bb:12:fc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #722: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #723: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #724: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:9a:b7:ff:2d:5f:2f:50:c1:38:50:e7:7b:29:d2:e6 Iteration Count: 2000 (0x7d0) tools.sh: #725: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #726: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #727: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:5c:9c:5c:6a:c1:fe:95:d4:00:af:6c:7e:eb:c4:f7 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #728: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #729: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #730: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:01:66:38:46:48:9c:6f:1a:05:b4:86:ee:f0:01:8f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #731: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #732: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #733: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:60:db:d9:e1:66:31:ce:e5:51:95:3a:e8:f9:bb:7a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #734: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #735: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #736: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:5d:65:fa:22:07:17:38:e2:66:5a:db:69:41:8b:17 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #737: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #738: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #739: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:a5:4e:1b:51:09:f0:8c:d3:7c:5d:67:a4:9c:85:47 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #740: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #741: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #742: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 93:27:74:a9:b8:06:2b:ed:37:1a:7d:94:1a:b9:a7:e4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #743: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #744: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #745: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: db:35:45:35:e8:92:06:e6:a9:1b:4e:7d:08:b1:8f:6c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #746: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #747: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #748: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:9e:40:67:e2:11:ad:03:e1:64:f7:16:a7:3f:81:78 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #749: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #750: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #751: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: db:ae:a8:e8:a2:0f:78:0a:b9:2f:f2:82:a6:4a:9c:5d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #752: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #753: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #754: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2f:bb:43:f3:90:2f:d4:e4:08:03:87:88:62:6f:35:78 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #755: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #756: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #757: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #758: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #759: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #760: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #761: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #762: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #763: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #764: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #765: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Apr 25 14:00:01 UTC 2016 Checking if fips should be skipped based on skip list [] Running tests for fips TIMESTAMP fips BEGIN: Mon Apr 25 14:00:01 UTC 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #766: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #767: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 0c398fa944265856994d4d6f8ab5302c6c7ec29d NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #768: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #769: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #770: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #771: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #772: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #773: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #774: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #775: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #776: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #777: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #778: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 0c398fa944265856994d4d6f8ab5302c6c7ec29d FIPS_PUB_140_Test_Certificate fips.sh: #779: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #780: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #781: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #782: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #783: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 0c398fa944265856994d4d6f8ab5302c6c7ec29d FIPS_PUB_140_Test_Certificate fips.sh: #784: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #785: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #786: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle Changing byte 0x00032fe4 (208868): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #787: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Apr 25 14:01:27 UTC 2016 Checking if sdr should be skipped based on skip list [] Running tests for sdr TIMESTAMP sdr BEGIN: Mon Apr 25 14:01:27 UTC 2016 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.v1.28098 -t "Test1" sdr.sh: #788: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.v2.28098 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #789: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.v3.28098 -t "1234567" sdr.sh: #790: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.v1.28098 -t "Test1" sdr.sh: #791: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.v2.28098 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #792: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.v3.28098 -t "1234567" sdr.sh: #793: Decrypt - Value 3 - PASSED TIMESTAMP sdr END: Mon Apr 25 14:01:30 UTC 2016 Checking if crmf should be skipped based on skip list [] Running tests for crmf TIMESTAMP crmf BEGIN: Mon Apr 25 14:01:30 UTC 2016 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #794: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #795: CMMF test . - PASSED TIMESTAMP crmf END: Mon Apr 25 14:01:32 UTC 2016 Checking if smime should be skipped based on skip list [] Running tests for smime TIMESTAMP smime BEGIN: Mon Apr 25 14:01:32 UTC 2016 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #796: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #797: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #798: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #799: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #800: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #801: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #802: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #803: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #804: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #805: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #806: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #807: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #808: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #809: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #810: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #811: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #812: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #813: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #814: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #815: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #816: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #817: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #818: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #819: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #820: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #821: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #822: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #823: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #824: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #825: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #826: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #827: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #828: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #829: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #830: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #831: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #832: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #833: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #834: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #835: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #836: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #837: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #838: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #839: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #840: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #841: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #842: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #843: Decrypt with a Multiple Email cert . - PASSED smime.sh: #844: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #845: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #846: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #847: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #848: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #849: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #850: Decode Encrypted-Data . - PASSED smime.sh: #851: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #852: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #853: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #854: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #855: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #856: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Apr 25 14:02:00 UTC 2016 Checking if ssl should be skipped based on skip list [] Running tests for ssl TIMESTAMP ssl BEGIN: Mon Apr 25 14:02:00 UTC 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5761 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5761 found at Mon Apr 25 14:02:01 UTC 2016 selfserv_9709 with PID 5761 started at Mon Apr 25 14:02:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 5761 at Mon Apr 25 14:02:02 UTC 2016 kill -USR1 5761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5761 killed at Mon Apr 25 14:02:02 UTC 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5831 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5831 found at Mon Apr 25 14:02:03 UTC 2016 selfserv_9709 with PID 5831 started at Mon Apr 25 14:02:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 5831 at Mon Apr 25 14:02:04 UTC 2016 kill -USR1 5831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5831 killed at Mon Apr 25 14:02:04 UTC 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5887 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5887 found at Mon Apr 25 14:02:05 UTC 2016 selfserv_9709 with PID 5887 started at Mon Apr 25 14:02:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 5887 at Mon Apr 25 14:02:06 UTC 2016 kill -USR1 5887 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5887 killed at Mon Apr 25 14:02:06 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5955 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5955 found at Mon Apr 25 14:02:07 UTC 2016 selfserv_9709 with PID 5955 started at Mon Apr 25 14:02:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 5955 at Mon Apr 25 14:02:08 UTC 2016 kill -USR1 5955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5955 killed at Mon Apr 25 14:02:08 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6011 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6011 found at Mon Apr 25 14:02:09 UTC 2016 selfserv_9709 with PID 6011 started at Mon Apr 25 14:02:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 6011 at Mon Apr 25 14:02:10 UTC 2016 kill -USR1 6011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6011 killed at Mon Apr 25 14:02:10 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6067 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6067 found at Mon Apr 25 14:02:10 UTC 2016 selfserv_9709 with PID 6067 started at Mon Apr 25 14:02:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 6067 at Mon Apr 25 14:02:12 UTC 2016 kill -USR1 6067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6067 killed at Mon Apr 25 14:02:12 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6135 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6135 found at Mon Apr 25 14:02:12 UTC 2016 selfserv_9709 with PID 6135 started at Mon Apr 25 14:02:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #863: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6135 at Mon Apr 25 14:02:13 UTC 2016 kill -USR1 6135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6135 killed at Mon Apr 25 14:02:14 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6191 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6191 found at Mon Apr 25 14:02:14 UTC 2016 selfserv_9709 with PID 6191 started at Mon Apr 25 14:02:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 6191 at Mon Apr 25 14:02:16 UTC 2016 kill -USR1 6191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6191 killed at Mon Apr 25 14:02:16 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6248 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6248 found at Mon Apr 25 14:02:16 UTC 2016 selfserv_9709 with PID 6248 started at Mon Apr 25 14:02:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #865: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6248 at Mon Apr 25 14:02:17 UTC 2016 kill -USR1 6248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6248 killed at Mon Apr 25 14:02:18 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6316 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6316 found at Mon Apr 25 14:02:18 UTC 2016 selfserv_9709 with PID 6316 started at Mon Apr 25 14:02:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #866: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6316 at Mon Apr 25 14:02:19 UTC 2016 kill -USR1 6316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6316 killed at Mon Apr 25 14:02:20 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6372 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6372 found at Mon Apr 25 14:02:20 UTC 2016 selfserv_9709 with PID 6372 started at Mon Apr 25 14:02:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #867: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6372 at Mon Apr 25 14:02:21 UTC 2016 kill -USR1 6372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6372 killed at Mon Apr 25 14:02:22 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6428 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6428 found at Mon Apr 25 14:02:22 UTC 2016 selfserv_9709 with PID 6428 started at Mon Apr 25 14:02:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #868: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6428 at Mon Apr 25 14:02:23 UTC 2016 kill -USR1 6428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6428 killed at Mon Apr 25 14:02:23 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6496 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6496 found at Mon Apr 25 14:02:24 UTC 2016 selfserv_9709 with PID 6496 started at Mon Apr 25 14:02:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #869: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6496 at Mon Apr 25 14:02:25 UTC 2016 kill -USR1 6496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6496 killed at Mon Apr 25 14:02:25 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6552 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6552 found at Mon Apr 25 14:02:26 UTC 2016 selfserv_9709 with PID 6552 started at Mon Apr 25 14:02:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #870: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6552 at Mon Apr 25 14:02:27 UTC 2016 kill -USR1 6552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6552 killed at Mon Apr 25 14:02:27 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6608 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6608 found at Mon Apr 25 14:02:28 UTC 2016 selfserv_9709 with PID 6608 started at Mon Apr 25 14:02:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #871: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6608 at Mon Apr 25 14:02:29 UTC 2016 kill -USR1 6608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6608 killed at Mon Apr 25 14:02:29 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6676 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6676 found at Mon Apr 25 14:02:29 UTC 2016 selfserv_9709 with PID 6676 started at Mon Apr 25 14:02:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #872: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6676 at Mon Apr 25 14:02:30 UTC 2016 kill -USR1 6676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6676 killed at Mon Apr 25 14:02:31 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6732 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6732 found at Mon Apr 25 14:02:31 UTC 2016 selfserv_9709 with PID 6732 started at Mon Apr 25 14:02:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 6732 at Mon Apr 25 14:02:32 UTC 2016 kill -USR1 6732 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6732 killed at Mon Apr 25 14:02:33 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6788 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6788 found at Mon Apr 25 14:02:33 UTC 2016 selfserv_9709 with PID 6788 started at Mon Apr 25 14:02:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #874: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 6788 at Mon Apr 25 14:02:34 UTC 2016 kill -USR1 6788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6788 killed at Mon Apr 25 14:02:35 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6856 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6856 found at Mon Apr 25 14:02:35 UTC 2016 selfserv_9709 with PID 6856 started at Mon Apr 25 14:02:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 6856 at Mon Apr 25 14:02:36 UTC 2016 kill -USR1 6856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6856 killed at Mon Apr 25 14:02:37 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6913 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6913 found at Mon Apr 25 14:02:37 UTC 2016 selfserv_9709 with PID 6913 started at Mon Apr 25 14:02:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 6913 at Mon Apr 25 14:02:38 UTC 2016 kill -USR1 6913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6913 killed at Mon Apr 25 14:02:38 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6969 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 6969 found at Mon Apr 25 14:02:39 UTC 2016 selfserv_9709 with PID 6969 started at Mon Apr 25 14:02:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 6969 at Mon Apr 25 14:02:40 UTC 2016 kill -USR1 6969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6969 killed at Mon Apr 25 14:02:40 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7037 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7037 found at Mon Apr 25 14:02:40 UTC 2016 selfserv_9709 with PID 7037 started at Mon Apr 25 14:02:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7037 at Mon Apr 25 14:02:41 UTC 2016 kill -USR1 7037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7037 killed at Mon Apr 25 14:02:42 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7093 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7093 found at Mon Apr 25 14:02:42 UTC 2016 selfserv_9709 with PID 7093 started at Mon Apr 25 14:02:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7093 at Mon Apr 25 14:02:43 UTC 2016 kill -USR1 7093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7093 killed at Mon Apr 25 14:02:43 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7149 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7149 found at Mon Apr 25 14:02:44 UTC 2016 selfserv_9709 with PID 7149 started at Mon Apr 25 14:02:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7149 at Mon Apr 25 14:02:45 UTC 2016 kill -USR1 7149 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7149 killed at Mon Apr 25 14:02:45 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7217 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7217 found at Mon Apr 25 14:02:46 UTC 2016 selfserv_9709 with PID 7217 started at Mon Apr 25 14:02:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #881: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7217 at Mon Apr 25 14:02:47 UTC 2016 kill -USR1 7217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7217 killed at Mon Apr 25 14:02:47 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7273 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7273 found at Mon Apr 25 14:02:47 UTC 2016 selfserv_9709 with PID 7273 started at Mon Apr 25 14:02:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7273 at Mon Apr 25 14:02:48 UTC 2016 kill -USR1 7273 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7273 killed at Mon Apr 25 14:02:49 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7329 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7329 found at Mon Apr 25 14:02:49 UTC 2016 selfserv_9709 with PID 7329 started at Mon Apr 25 14:02:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #883: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7329 at Mon Apr 25 14:02:50 UTC 2016 kill -USR1 7329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7329 killed at Mon Apr 25 14:02:50 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7397 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7397 found at Mon Apr 25 14:02:51 UTC 2016 selfserv_9709 with PID 7397 started at Mon Apr 25 14:02:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #884: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7397 at Mon Apr 25 14:02:52 UTC 2016 kill -USR1 7397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7397 killed at Mon Apr 25 14:02:52 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7453 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7453 found at Mon Apr 25 14:02:53 UTC 2016 selfserv_9709 with PID 7453 started at Mon Apr 25 14:02:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #885: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7453 at Mon Apr 25 14:02:53 UTC 2016 kill -USR1 7453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7453 killed at Mon Apr 25 14:02:54 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:02:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7509 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7509 found at Mon Apr 25 14:02:54 UTC 2016 selfserv_9709 with PID 7509 started at Mon Apr 25 14:02:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #886: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7509 at Mon Apr 25 14:02:55 UTC 2016 kill -USR1 7509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7509 killed at Mon Apr 25 14:02:55 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7577 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7577 found at Mon Apr 25 14:02:56 UTC 2016 selfserv_9709 with PID 7577 started at Mon Apr 25 14:02:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #887: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7577 at Mon Apr 25 14:02:57 UTC 2016 kill -USR1 7577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7577 killed at Mon Apr 25 14:02:57 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7637 found at Mon Apr 25 14:02:58 UTC 2016 selfserv_9709 with PID 7637 started at Mon Apr 25 14:02:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #888: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7637 at Mon Apr 25 14:02:58 UTC 2016 kill -USR1 7637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7637 killed at Mon Apr 25 14:02:59 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:02:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:02:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7693 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7693 found at Mon Apr 25 14:02:59 UTC 2016 selfserv_9709 with PID 7693 started at Mon Apr 25 14:02:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #889: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7693 at Mon Apr 25 14:03:00 UTC 2016 kill -USR1 7693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7693 killed at Mon Apr 25 14:03:01 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7761 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7761 found at Mon Apr 25 14:03:01 UTC 2016 selfserv_9709 with PID 7761 started at Mon Apr 25 14:03:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #890: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7761 at Mon Apr 25 14:03:02 UTC 2016 kill -USR1 7761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7761 killed at Mon Apr 25 14:03:02 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7831 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7831 found at Mon Apr 25 14:03:03 UTC 2016 selfserv_9709 with PID 7831 started at Mon Apr 25 14:03:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7831 at Mon Apr 25 14:03:04 UTC 2016 kill -USR1 7831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7831 killed at Mon Apr 25 14:03:04 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7887 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7887 found at Mon Apr 25 14:03:05 UTC 2016 selfserv_9709 with PID 7887 started at Mon Apr 25 14:03:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #892: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7887 at Mon Apr 25 14:03:05 UTC 2016 kill -USR1 7887 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7887 killed at Mon Apr 25 14:03:06 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7955 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7955 found at Mon Apr 25 14:03:06 UTC 2016 selfserv_9709 with PID 7955 started at Mon Apr 25 14:03:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7955 at Mon Apr 25 14:03:08 UTC 2016 kill -USR1 7955 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7955 killed at Mon Apr 25 14:03:08 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8011 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8011 found at Mon Apr 25 14:03:09 UTC 2016 selfserv_9709 with PID 8011 started at Mon Apr 25 14:03:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8011 at Mon Apr 25 14:03:10 UTC 2016 kill -USR1 8011 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8011 killed at Mon Apr 25 14:03:10 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8067 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8067 found at Mon Apr 25 14:03:11 UTC 2016 selfserv_9709 with PID 8067 started at Mon Apr 25 14:03:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8067 at Mon Apr 25 14:03:12 UTC 2016 kill -USR1 8067 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8067 killed at Mon Apr 25 14:03:12 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:03:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8135 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8135 found at Mon Apr 25 14:03:13 UTC 2016 selfserv_9709 with PID 8135 started at Mon Apr 25 14:03:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8135 at Mon Apr 25 14:03:14 UTC 2016 kill -USR1 8135 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8135 killed at Mon Apr 25 14:03:15 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:03:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8191 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8191 found at Mon Apr 25 14:03:15 UTC 2016 selfserv_9709 with PID 8191 started at Mon Apr 25 14:03:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8191 at Mon Apr 25 14:03:16 UTC 2016 kill -USR1 8191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8191 killed at Mon Apr 25 14:03:17 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:03:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8248 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8248 found at Mon Apr 25 14:03:17 UTC 2016 selfserv_9709 with PID 8248 started at Mon Apr 25 14:03:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8248 at Mon Apr 25 14:03:19 UTC 2016 kill -USR1 8248 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8248 killed at Mon Apr 25 14:03:19 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8316 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8316 found at Mon Apr 25 14:03:20 UTC 2016 selfserv_9709 with PID 8316 started at Mon Apr 25 14:03:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #899: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8316 at Mon Apr 25 14:03:21 UTC 2016 kill -USR1 8316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8316 killed at Mon Apr 25 14:03:21 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8372 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8372 found at Mon Apr 25 14:03:22 UTC 2016 selfserv_9709 with PID 8372 started at Mon Apr 25 14:03:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8372 at Mon Apr 25 14:03:23 UTC 2016 kill -USR1 8372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8372 killed at Mon Apr 25 14:03:23 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8428 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8428 found at Mon Apr 25 14:03:24 UTC 2016 selfserv_9709 with PID 8428 started at Mon Apr 25 14:03:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #901: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8428 at Mon Apr 25 14:03:25 UTC 2016 kill -USR1 8428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8428 killed at Mon Apr 25 14:03:26 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8496 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8496 found at Mon Apr 25 14:03:26 UTC 2016 selfserv_9709 with PID 8496 started at Mon Apr 25 14:03:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #902: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8496 at Mon Apr 25 14:03:27 UTC 2016 kill -USR1 8496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8496 killed at Mon Apr 25 14:03:28 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8552 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8552 found at Mon Apr 25 14:03:28 UTC 2016 selfserv_9709 with PID 8552 started at Mon Apr 25 14:03:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #903: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8552 at Mon Apr 25 14:03:30 UTC 2016 kill -USR1 8552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8552 killed at Mon Apr 25 14:03:30 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8608 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8608 found at Mon Apr 25 14:03:30 UTC 2016 selfserv_9709 with PID 8608 started at Mon Apr 25 14:03:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #904: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8608 at Mon Apr 25 14:03:32 UTC 2016 kill -USR1 8608 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8608 killed at Mon Apr 25 14:03:32 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:03:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8676 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8676 found at Mon Apr 25 14:03:33 UTC 2016 selfserv_9709 with PID 8676 started at Mon Apr 25 14:03:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #905: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8676 at Mon Apr 25 14:03:34 UTC 2016 kill -USR1 8676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8676 killed at Mon Apr 25 14:03:34 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:03:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8732 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8732 found at Mon Apr 25 14:03:35 UTC 2016 selfserv_9709 with PID 8732 started at Mon Apr 25 14:03:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #906: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8732 at Mon Apr 25 14:03:36 UTC 2016 kill -USR1 8732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8732 killed at Mon Apr 25 14:03:37 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:03:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8788 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8788 found at Mon Apr 25 14:03:37 UTC 2016 selfserv_9709 with PID 8788 started at Mon Apr 25 14:03:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #907: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8788 at Mon Apr 25 14:03:38 UTC 2016 kill -USR1 8788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8788 killed at Mon Apr 25 14:03:39 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8857 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8857 found at Mon Apr 25 14:03:39 UTC 2016 selfserv_9709 with PID 8857 started at Mon Apr 25 14:03:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #908: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8857 at Mon Apr 25 14:03:40 UTC 2016 kill -USR1 8857 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8857 killed at Mon Apr 25 14:03:41 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8913 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8913 found at Mon Apr 25 14:03:41 UTC 2016 selfserv_9709 with PID 8913 started at Mon Apr 25 14:03:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8913 at Mon Apr 25 14:03:43 UTC 2016 kill -USR1 8913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8913 killed at Mon Apr 25 14:03:43 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8969 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8969 found at Mon Apr 25 14:03:44 UTC 2016 selfserv_9709 with PID 8969 started at Mon Apr 25 14:03:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #910: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8969 at Mon Apr 25 14:03:45 UTC 2016 kill -USR1 8969 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8969 killed at Mon Apr 25 14:03:45 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9037 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9037 found at Mon Apr 25 14:03:46 UTC 2016 selfserv_9709 with PID 9037 started at Mon Apr 25 14:03:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9037 at Mon Apr 25 14:03:47 UTC 2016 kill -USR1 9037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9037 killed at Mon Apr 25 14:03:48 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9093 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9093 found at Mon Apr 25 14:03:48 UTC 2016 selfserv_9709 with PID 9093 started at Mon Apr 25 14:03:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9093 at Mon Apr 25 14:03:49 UTC 2016 kill -USR1 9093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9093 killed at Mon Apr 25 14:03:50 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9149 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9149 found at Mon Apr 25 14:03:50 UTC 2016 selfserv_9709 with PID 9149 started at Mon Apr 25 14:03:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9149 at Mon Apr 25 14:03:52 UTC 2016 kill -USR1 9149 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9149 killed at Mon Apr 25 14:03:52 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:03:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9217 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9217 found at Mon Apr 25 14:03:52 UTC 2016 selfserv_9709 with PID 9217 started at Mon Apr 25 14:03:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9217 at Mon Apr 25 14:03:54 UTC 2016 kill -USR1 9217 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9217 killed at Mon Apr 25 14:03:54 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:03:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9273 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9273 found at Mon Apr 25 14:03:55 UTC 2016 selfserv_9709 with PID 9273 started at Mon Apr 25 14:03:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9273 at Mon Apr 25 14:03:56 UTC 2016 kill -USR1 9273 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9273 killed at Mon Apr 25 14:03:56 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:03:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9329 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9329 found at Mon Apr 25 14:03:57 UTC 2016 selfserv_9709 with PID 9329 started at Mon Apr 25 14:03:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9329 at Mon Apr 25 14:03:58 UTC 2016 kill -USR1 9329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9329 killed at Mon Apr 25 14:03:59 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:03:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:03:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9401 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9401 found at Mon Apr 25 14:03:59 UTC 2016 selfserv_9709 with PID 9401 started at Mon Apr 25 14:03:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #917: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9401 at Mon Apr 25 14:04:01 UTC 2016 kill -USR1 9401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9401 killed at Mon Apr 25 14:04:01 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9471 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9471 found at Mon Apr 25 14:04:01 UTC 2016 selfserv_9709 with PID 9471 started at Mon Apr 25 14:04:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9471 at Mon Apr 25 14:04:03 UTC 2016 kill -USR1 9471 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9471 killed at Mon Apr 25 14:04:03 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9527 found at Mon Apr 25 14:04:04 UTC 2016 selfserv_9709 with PID 9527 started at Mon Apr 25 14:04:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #919: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9527 at Mon Apr 25 14:04:05 UTC 2016 kill -USR1 9527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9527 killed at Mon Apr 25 14:04:05 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9595 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9595 found at Mon Apr 25 14:04:06 UTC 2016 selfserv_9709 with PID 9595 started at Mon Apr 25 14:04:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #920: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9595 at Mon Apr 25 14:04:07 UTC 2016 kill -USR1 9595 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9595 killed at Mon Apr 25 14:04:08 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9651 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9651 found at Mon Apr 25 14:04:08 UTC 2016 selfserv_9709 with PID 9651 started at Mon Apr 25 14:04:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #921: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9651 at Mon Apr 25 14:04:09 UTC 2016 kill -USR1 9651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9651 killed at Mon Apr 25 14:04:10 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9707 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9707 found at Mon Apr 25 14:04:10 UTC 2016 selfserv_9709 with PID 9707 started at Mon Apr 25 14:04:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #922: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9707 at Mon Apr 25 14:04:11 UTC 2016 kill -USR1 9707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9707 killed at Mon Apr 25 14:04:12 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9775 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9775 found at Mon Apr 25 14:04:12 UTC 2016 selfserv_9709 with PID 9775 started at Mon Apr 25 14:04:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #923: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9775 at Mon Apr 25 14:04:14 UTC 2016 kill -USR1 9775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9775 killed at Mon Apr 25 14:04:14 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9831 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9831 found at Mon Apr 25 14:04:14 UTC 2016 selfserv_9709 with PID 9831 started at Mon Apr 25 14:04:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #924: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9831 at Mon Apr 25 14:04:16 UTC 2016 kill -USR1 9831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9831 killed at Mon Apr 25 14:04:16 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9887 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9887 found at Mon Apr 25 14:04:17 UTC 2016 selfserv_9709 with PID 9887 started at Mon Apr 25 14:04:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #925: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9887 at Mon Apr 25 14:04:18 UTC 2016 kill -USR1 9887 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9887 killed at Mon Apr 25 14:04:18 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9956 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9956 found at Mon Apr 25 14:04:19 UTC 2016 selfserv_9709 with PID 9956 started at Mon Apr 25 14:04:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #926: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9956 at Mon Apr 25 14:04:20 UTC 2016 kill -USR1 9956 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9956 killed at Mon Apr 25 14:04:21 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10012 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10012 found at Mon Apr 25 14:04:21 UTC 2016 selfserv_9709 with PID 10012 started at Mon Apr 25 14:04:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10012 at Mon Apr 25 14:04:22 UTC 2016 kill -USR1 10012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10012 killed at Mon Apr 25 14:04:23 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10068 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10068 found at Mon Apr 25 14:04:23 UTC 2016 selfserv_9709 with PID 10068 started at Mon Apr 25 14:04:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #928: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10068 at Mon Apr 25 14:04:25 UTC 2016 kill -USR1 10068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10068 killed at Mon Apr 25 14:04:25 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10136 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10136 found at Mon Apr 25 14:04:26 UTC 2016 selfserv_9709 with PID 10136 started at Mon Apr 25 14:04:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10136 at Mon Apr 25 14:04:26 UTC 2016 kill -USR1 10136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10136 killed at Mon Apr 25 14:04:27 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10192 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10192 found at Mon Apr 25 14:04:27 UTC 2016 selfserv_9709 with PID 10192 started at Mon Apr 25 14:04:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10192 at Mon Apr 25 14:04:28 UTC 2016 kill -USR1 10192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10192 killed at Mon Apr 25 14:04:29 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10248 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10248 found at Mon Apr 25 14:04:29 UTC 2016 selfserv_9709 with PID 10248 started at Mon Apr 25 14:04:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10248 at Mon Apr 25 14:04:30 UTC 2016 kill -USR1 10248 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10248 killed at Mon Apr 25 14:04:31 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10316 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10316 found at Mon Apr 25 14:04:31 UTC 2016 selfserv_9709 with PID 10316 started at Mon Apr 25 14:04:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10316 at Mon Apr 25 14:04:32 UTC 2016 kill -USR1 10316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10316 killed at Mon Apr 25 14:04:33 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10372 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10372 found at Mon Apr 25 14:04:33 UTC 2016 selfserv_9709 with PID 10372 started at Mon Apr 25 14:04:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10372 at Mon Apr 25 14:04:34 UTC 2016 kill -USR1 10372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10372 killed at Mon Apr 25 14:04:34 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10428 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10428 found at Mon Apr 25 14:04:35 UTC 2016 selfserv_9709 with PID 10428 started at Mon Apr 25 14:04:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10428 at Mon Apr 25 14:04:36 UTC 2016 kill -USR1 10428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10428 killed at Mon Apr 25 14:04:36 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10496 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10496 found at Mon Apr 25 14:04:37 UTC 2016 selfserv_9709 with PID 10496 started at Mon Apr 25 14:04:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #935: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10496 at Mon Apr 25 14:04:38 UTC 2016 kill -USR1 10496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10496 killed at Mon Apr 25 14:04:38 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10552 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10552 found at Mon Apr 25 14:04:39 UTC 2016 selfserv_9709 with PID 10552 started at Mon Apr 25 14:04:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10552 at Mon Apr 25 14:04:40 UTC 2016 kill -USR1 10552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10552 killed at Mon Apr 25 14:04:40 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10609 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10609 found at Mon Apr 25 14:04:41 UTC 2016 selfserv_9709 with PID 10609 started at Mon Apr 25 14:04:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #937: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10609 at Mon Apr 25 14:04:42 UTC 2016 kill -USR1 10609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10609 killed at Mon Apr 25 14:04:42 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10677 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10677 found at Mon Apr 25 14:04:43 UTC 2016 selfserv_9709 with PID 10677 started at Mon Apr 25 14:04:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #938: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10677 at Mon Apr 25 14:04:44 UTC 2016 kill -USR1 10677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10677 killed at Mon Apr 25 14:04:44 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10733 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10733 found at Mon Apr 25 14:04:45 UTC 2016 selfserv_9709 with PID 10733 started at Mon Apr 25 14:04:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #939: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10733 at Mon Apr 25 14:04:46 UTC 2016 kill -USR1 10733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10733 killed at Mon Apr 25 14:04:46 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10789 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10789 found at Mon Apr 25 14:04:46 UTC 2016 selfserv_9709 with PID 10789 started at Mon Apr 25 14:04:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #940: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10789 at Mon Apr 25 14:04:47 UTC 2016 kill -USR1 10789 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10789 killed at Mon Apr 25 14:04:48 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10857 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10857 found at Mon Apr 25 14:04:48 UTC 2016 selfserv_9709 with PID 10857 started at Mon Apr 25 14:04:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #941: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10857 at Mon Apr 25 14:04:49 UTC 2016 kill -USR1 10857 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10857 killed at Mon Apr 25 14:04:50 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10913 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10913 found at Mon Apr 25 14:04:50 UTC 2016 selfserv_9709 with PID 10913 started at Mon Apr 25 14:04:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #942: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10913 at Mon Apr 25 14:04:51 UTC 2016 kill -USR1 10913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10913 killed at Mon Apr 25 14:04:51 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10969 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10969 found at Mon Apr 25 14:04:52 UTC 2016 selfserv_9709 with PID 10969 started at Mon Apr 25 14:04:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #943: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10969 at Mon Apr 25 14:04:53 UTC 2016 kill -USR1 10969 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10969 killed at Mon Apr 25 14:04:53 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11037 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11037 found at Mon Apr 25 14:04:54 UTC 2016 selfserv_9709 with PID 11037 started at Mon Apr 25 14:04:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #944: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11037 at Mon Apr 25 14:04:55 UTC 2016 kill -USR1 11037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11037 killed at Mon Apr 25 14:04:55 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11093 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11093 found at Mon Apr 25 14:04:56 UTC 2016 selfserv_9709 with PID 11093 started at Mon Apr 25 14:04:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #945: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11093 at Mon Apr 25 14:04:57 UTC 2016 kill -USR1 11093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11093 killed at Mon Apr 25 14:04:57 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:04:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11152 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11152 found at Mon Apr 25 14:04:58 UTC 2016 selfserv_9709 with PID 11152 started at Mon Apr 25 14:04:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #946: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11152 at Mon Apr 25 14:04:59 UTC 2016 kill -USR1 11152 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11152 killed at Mon Apr 25 14:04:59 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:04:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:04:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11230 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11230 found at Mon Apr 25 14:05:00 UTC 2016 selfserv_9709 with PID 11230 started at Mon Apr 25 14:05:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #947: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11230 at Mon Apr 25 14:05:01 UTC 2016 kill -USR1 11230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11230 killed at Mon Apr 25 14:05:01 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11301 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11301 found at Mon Apr 25 14:05:02 UTC 2016 selfserv_9709 with PID 11301 started at Mon Apr 25 14:05:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #948: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11301 at Mon Apr 25 14:05:03 UTC 2016 kill -USR1 11301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11301 killed at Mon Apr 25 14:05:03 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11357 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11357 found at Mon Apr 25 14:05:03 UTC 2016 selfserv_9709 with PID 11357 started at Mon Apr 25 14:05:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #949: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11357 at Mon Apr 25 14:05:05 UTC 2016 kill -USR1 11357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11357 killed at Mon Apr 25 14:05:05 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11425 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11425 found at Mon Apr 25 14:05:06 UTC 2016 selfserv_9709 with PID 11425 started at Mon Apr 25 14:05:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #950: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 11425 at Mon Apr 25 14:05:07 UTC 2016 kill -USR1 11425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11425 killed at Mon Apr 25 14:05:07 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11481 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11481 found at Mon Apr 25 14:05:08 UTC 2016 selfserv_9709 with PID 11481 started at Mon Apr 25 14:05:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #951: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11481 at Mon Apr 25 14:05:09 UTC 2016 kill -USR1 11481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11481 killed at Mon Apr 25 14:05:09 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11537 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11537 found at Mon Apr 25 14:05:10 UTC 2016 selfserv_9709 with PID 11537 started at Mon Apr 25 14:05:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #952: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 11537 at Mon Apr 25 14:05:11 UTC 2016 kill -USR1 11537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11537 killed at Mon Apr 25 14:05:11 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11605 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11605 found at Mon Apr 25 14:05:12 UTC 2016 selfserv_9709 with PID 11605 started at Mon Apr 25 14:05:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #953: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 11605 at Mon Apr 25 14:05:13 UTC 2016 kill -USR1 11605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11605 killed at Mon Apr 25 14:05:13 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11661 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11661 found at Mon Apr 25 14:05:14 UTC 2016 selfserv_9709 with PID 11661 started at Mon Apr 25 14:05:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #954: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 11661 at Mon Apr 25 14:05:15 UTC 2016 kill -USR1 11661 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11661 killed at Mon Apr 25 14:05:15 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11717 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11717 found at Mon Apr 25 14:05:15 UTC 2016 selfserv_9709 with PID 11717 started at Mon Apr 25 14:05:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #955: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 11717 at Mon Apr 25 14:05:16 UTC 2016 kill -USR1 11717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11717 killed at Mon Apr 25 14:05:17 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11785 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11785 found at Mon Apr 25 14:05:17 UTC 2016 selfserv_9709 with PID 11785 started at Mon Apr 25 14:05:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #956: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 11785 at Mon Apr 25 14:05:18 UTC 2016 kill -USR1 11785 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11785 killed at Mon Apr 25 14:05:19 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11841 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11841 found at Mon Apr 25 14:05:19 UTC 2016 selfserv_9709 with PID 11841 started at Mon Apr 25 14:05:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #957: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11841 at Mon Apr 25 14:05:21 UTC 2016 kill -USR1 11841 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11841 killed at Mon Apr 25 14:05:21 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11898 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11898 found at Mon Apr 25 14:05:21 UTC 2016 selfserv_9709 with PID 11898 started at Mon Apr 25 14:05:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #958: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 11898 at Mon Apr 25 14:05:23 UTC 2016 kill -USR1 11898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11898 killed at Mon Apr 25 14:05:23 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11966 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11966 found at Mon Apr 25 14:05:24 UTC 2016 selfserv_9709 with PID 11966 started at Mon Apr 25 14:05:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #959: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11966 at Mon Apr 25 14:05:24 UTC 2016 kill -USR1 11966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11966 killed at Mon Apr 25 14:05:25 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12022 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12022 found at Mon Apr 25 14:05:25 UTC 2016 selfserv_9709 with PID 12022 started at Mon Apr 25 14:05:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #960: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12022 at Mon Apr 25 14:05:26 UTC 2016 kill -USR1 12022 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12022 killed at Mon Apr 25 14:05:26 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12078 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12078 found at Mon Apr 25 14:05:27 UTC 2016 selfserv_9709 with PID 12078 started at Mon Apr 25 14:05:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #961: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12078 at Mon Apr 25 14:05:28 UTC 2016 kill -USR1 12078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12078 killed at Mon Apr 25 14:05:28 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12147 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12147 found at Mon Apr 25 14:05:29 UTC 2016 selfserv_9709 with PID 12147 started at Mon Apr 25 14:05:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #962: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 12147 at Mon Apr 25 14:05:30 UTC 2016 kill -USR1 12147 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12147 killed at Mon Apr 25 14:05:30 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12203 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12203 found at Mon Apr 25 14:05:30 UTC 2016 selfserv_9709 with PID 12203 started at Mon Apr 25 14:05:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12203 at Mon Apr 25 14:05:31 UTC 2016 kill -USR1 12203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12203 killed at Mon Apr 25 14:05:32 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12259 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12259 found at Mon Apr 25 14:05:32 UTC 2016 selfserv_9709 with PID 12259 started at Mon Apr 25 14:05:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #964: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 12259 at Mon Apr 25 14:05:33 UTC 2016 kill -USR1 12259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12259 killed at Mon Apr 25 14:05:34 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12327 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12327 found at Mon Apr 25 14:05:34 UTC 2016 selfserv_9709 with PID 12327 started at Mon Apr 25 14:05:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #965: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 12327 at Mon Apr 25 14:05:35 UTC 2016 kill -USR1 12327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12327 killed at Mon Apr 25 14:05:35 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12383 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12383 found at Mon Apr 25 14:05:36 UTC 2016 selfserv_9709 with PID 12383 started at Mon Apr 25 14:05:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #966: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 12383 at Mon Apr 25 14:05:37 UTC 2016 kill -USR1 12383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12383 killed at Mon Apr 25 14:05:37 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12439 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12439 found at Mon Apr 25 14:05:38 UTC 2016 selfserv_9709 with PID 12439 started at Mon Apr 25 14:05:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #967: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 12439 at Mon Apr 25 14:05:38 UTC 2016 kill -USR1 12439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12439 killed at Mon Apr 25 14:05:39 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12507 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12507 found at Mon Apr 25 14:05:39 UTC 2016 selfserv_9709 with PID 12507 started at Mon Apr 25 14:05:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #968: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 12507 at Mon Apr 25 14:05:40 UTC 2016 kill -USR1 12507 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12507 killed at Mon Apr 25 14:05:41 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12564 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12564 found at Mon Apr 25 14:05:41 UTC 2016 selfserv_9709 with PID 12564 started at Mon Apr 25 14:05:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12564 at Mon Apr 25 14:05:42 UTC 2016 kill -USR1 12564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12564 killed at Mon Apr 25 14:05:43 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12620 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12620 found at Mon Apr 25 14:05:43 UTC 2016 selfserv_9709 with PID 12620 started at Mon Apr 25 14:05:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #970: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 12620 at Mon Apr 25 14:05:44 UTC 2016 kill -USR1 12620 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12620 killed at Mon Apr 25 14:05:45 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12688 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12688 found at Mon Apr 25 14:05:45 UTC 2016 selfserv_9709 with PID 12688 started at Mon Apr 25 14:05:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12688 at Mon Apr 25 14:05:46 UTC 2016 kill -USR1 12688 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12688 killed at Mon Apr 25 14:05:47 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12744 found at Mon Apr 25 14:05:47 UTC 2016 selfserv_9709 with PID 12744 started at Mon Apr 25 14:05:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12744 at Mon Apr 25 14:05:49 UTC 2016 kill -USR1 12744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12744 killed at Mon Apr 25 14:05:49 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12800 found at Mon Apr 25 14:05:49 UTC 2016 selfserv_9709 with PID 12800 started at Mon Apr 25 14:05:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12800 at Mon Apr 25 14:05:51 UTC 2016 kill -USR1 12800 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12800 killed at Mon Apr 25 14:05:51 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12868 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12868 found at Mon Apr 25 14:05:52 UTC 2016 selfserv_9709 with PID 12868 started at Mon Apr 25 14:05:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #974: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12868 at Mon Apr 25 14:05:53 UTC 2016 kill -USR1 12868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12868 killed at Mon Apr 25 14:05:53 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12924 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12924 found at Mon Apr 25 14:05:54 UTC 2016 selfserv_9709 with PID 12924 started at Mon Apr 25 14:05:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12924 at Mon Apr 25 14:05:55 UTC 2016 kill -USR1 12924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12924 killed at Mon Apr 25 14:05:56 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:05:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12980 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12980 found at Mon Apr 25 14:05:56 UTC 2016 selfserv_9709 with PID 12980 started at Mon Apr 25 14:05:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #976: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12980 at Mon Apr 25 14:05:58 UTC 2016 kill -USR1 12980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12980 killed at Mon Apr 25 14:05:58 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:05:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:05:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13051 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13051 found at Mon Apr 25 14:05:59 UTC 2016 selfserv_9709 with PID 13051 started at Mon Apr 25 14:05:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #977: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13051 at Mon Apr 25 14:06:00 UTC 2016 kill -USR1 13051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13051 killed at Mon Apr 25 14:06:00 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13108 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13108 found at Mon Apr 25 14:06:01 UTC 2016 selfserv_9709 with PID 13108 started at Mon Apr 25 14:06:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #978: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13108 at Mon Apr 25 14:06:02 UTC 2016 kill -USR1 13108 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13108 killed at Mon Apr 25 14:06:02 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13177 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13177 found at Mon Apr 25 14:06:03 UTC 2016 selfserv_9709 with PID 13177 started at Mon Apr 25 14:06:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #979: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13177 at Mon Apr 25 14:06:04 UTC 2016 kill -USR1 13177 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13177 killed at Mon Apr 25 14:06:05 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13245 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13245 found at Mon Apr 25 14:06:05 UTC 2016 selfserv_9709 with PID 13245 started at Mon Apr 25 14:06:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #980: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13245 at Mon Apr 25 14:06:07 UTC 2016 kill -USR1 13245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13245 killed at Mon Apr 25 14:06:07 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13301 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13301 found at Mon Apr 25 14:06:08 UTC 2016 selfserv_9709 with PID 13301 started at Mon Apr 25 14:06:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13301 at Mon Apr 25 14:06:09 UTC 2016 kill -USR1 13301 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13301 killed at Mon Apr 25 14:06:09 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13357 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13357 found at Mon Apr 25 14:06:10 UTC 2016 selfserv_9709 with PID 13357 started at Mon Apr 25 14:06:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #982: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13357 at Mon Apr 25 14:06:11 UTC 2016 kill -USR1 13357 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13357 killed at Mon Apr 25 14:06:12 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13425 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13425 found at Mon Apr 25 14:06:12 UTC 2016 selfserv_9709 with PID 13425 started at Mon Apr 25 14:06:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13425 at Mon Apr 25 14:06:14 UTC 2016 kill -USR1 13425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13425 killed at Mon Apr 25 14:06:14 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13481 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13481 found at Mon Apr 25 14:06:14 UTC 2016 selfserv_9709 with PID 13481 started at Mon Apr 25 14:06:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13481 at Mon Apr 25 14:06:16 UTC 2016 kill -USR1 13481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13481 killed at Mon Apr 25 14:06:16 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13537 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13537 found at Mon Apr 25 14:06:17 UTC 2016 selfserv_9709 with PID 13537 started at Mon Apr 25 14:06:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13537 at Mon Apr 25 14:06:18 UTC 2016 kill -USR1 13537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13537 killed at Mon Apr 25 14:06:18 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13605 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13605 found at Mon Apr 25 14:06:19 UTC 2016 selfserv_9709 with PID 13605 started at Mon Apr 25 14:06:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13605 at Mon Apr 25 14:06:20 UTC 2016 kill -USR1 13605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13605 killed at Mon Apr 25 14:06:21 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13662 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13662 found at Mon Apr 25 14:06:21 UTC 2016 selfserv_9709 with PID 13662 started at Mon Apr 25 14:06:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13662 at Mon Apr 25 14:06:23 UTC 2016 kill -USR1 13662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13662 killed at Mon Apr 25 14:06:23 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13718 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13718 found at Mon Apr 25 14:06:24 UTC 2016 selfserv_9709 with PID 13718 started at Mon Apr 25 14:06:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #988: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13718 at Mon Apr 25 14:06:25 UTC 2016 kill -USR1 13718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13718 killed at Mon Apr 25 14:06:26 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13786 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13786 found at Mon Apr 25 14:06:26 UTC 2016 selfserv_9709 with PID 13786 started at Mon Apr 25 14:06:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13786 at Mon Apr 25 14:06:27 UTC 2016 kill -USR1 13786 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13786 killed at Mon Apr 25 14:06:28 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13842 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13842 found at Mon Apr 25 14:06:28 UTC 2016 selfserv_9709 with PID 13842 started at Mon Apr 25 14:06:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #990: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13842 at Mon Apr 25 14:06:29 UTC 2016 kill -USR1 13842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13842 killed at Mon Apr 25 14:06:30 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13898 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13898 found at Mon Apr 25 14:06:30 UTC 2016 selfserv_9709 with PID 13898 started at Mon Apr 25 14:06:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #991: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13898 at Mon Apr 25 14:06:32 UTC 2016 kill -USR1 13898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13898 killed at Mon Apr 25 14:06:32 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13966 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13966 found at Mon Apr 25 14:06:32 UTC 2016 selfserv_9709 with PID 13966 started at Mon Apr 25 14:06:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #992: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13966 at Mon Apr 25 14:06:34 UTC 2016 kill -USR1 13966 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13966 killed at Mon Apr 25 14:06:34 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14022 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14022 found at Mon Apr 25 14:06:35 UTC 2016 selfserv_9709 with PID 14022 started at Mon Apr 25 14:06:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14022 at Mon Apr 25 14:06:36 UTC 2016 kill -USR1 14022 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14022 killed at Mon Apr 25 14:06:37 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14078 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14078 found at Mon Apr 25 14:06:37 UTC 2016 selfserv_9709 with PID 14078 started at Mon Apr 25 14:06:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #994: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14078 at Mon Apr 25 14:06:39 UTC 2016 kill -USR1 14078 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14078 killed at Mon Apr 25 14:06:39 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14146 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14146 found at Mon Apr 25 14:06:40 UTC 2016 selfserv_9709 with PID 14146 started at Mon Apr 25 14:06:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14146 at Mon Apr 25 14:06:41 UTC 2016 kill -USR1 14146 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14146 killed at Mon Apr 25 14:06:41 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14202 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14202 found at Mon Apr 25 14:06:42 UTC 2016 selfserv_9709 with PID 14202 started at Mon Apr 25 14:06:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14202 at Mon Apr 25 14:06:43 UTC 2016 kill -USR1 14202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14202 killed at Mon Apr 25 14:06:43 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14259 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14259 found at Mon Apr 25 14:06:43 UTC 2016 selfserv_9709 with PID 14259 started at Mon Apr 25 14:06:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14259 at Mon Apr 25 14:06:44 UTC 2016 kill -USR1 14259 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14259 killed at Mon Apr 25 14:06:45 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14327 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14327 found at Mon Apr 25 14:06:45 UTC 2016 selfserv_9709 with PID 14327 started at Mon Apr 25 14:06:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14327 at Mon Apr 25 14:06:46 UTC 2016 kill -USR1 14327 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14327 killed at Mon Apr 25 14:06:47 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14383 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14383 found at Mon Apr 25 14:06:47 UTC 2016 selfserv_9709 with PID 14383 started at Mon Apr 25 14:06:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14383 at Mon Apr 25 14:06:49 UTC 2016 kill -USR1 14383 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14383 killed at Mon Apr 25 14:06:49 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14439 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14439 found at Mon Apr 25 14:06:49 UTC 2016 selfserv_9709 with PID 14439 started at Mon Apr 25 14:06:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #1000: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14439 at Mon Apr 25 14:06:51 UTC 2016 kill -USR1 14439 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14439 killed at Mon Apr 25 14:06:51 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14507 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14507 found at Mon Apr 25 14:06:52 UTC 2016 selfserv_9709 with PID 14507 started at Mon Apr 25 14:06:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1001: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14507 at Mon Apr 25 14:06:53 UTC 2016 kill -USR1 14507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14507 killed at Mon Apr 25 14:06:53 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14563 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14563 found at Mon Apr 25 14:06:53 UTC 2016 selfserv_9709 with PID 14563 started at Mon Apr 25 14:06:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1002: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14563 at Mon Apr 25 14:06:54 UTC 2016 kill -USR1 14563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14563 killed at Mon Apr 25 14:06:55 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:06:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14619 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14619 found at Mon Apr 25 14:06:55 UTC 2016 selfserv_9709 with PID 14619 started at Mon Apr 25 14:06:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1003: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14619 at Mon Apr 25 14:06:56 UTC 2016 kill -USR1 14619 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14619 killed at Mon Apr 25 14:06:57 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14687 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14687 found at Mon Apr 25 14:06:57 UTC 2016 selfserv_9709 with PID 14687 started at Mon Apr 25 14:06:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #1004: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14687 at Mon Apr 25 14:06:58 UTC 2016 kill -USR1 14687 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14687 killed at Mon Apr 25 14:06:59 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:06:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:06:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14746 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14746 found at Mon Apr 25 14:06:59 UTC 2016 selfserv_9709 with PID 14746 started at Mon Apr 25 14:06:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14746 at Mon Apr 25 14:07:00 UTC 2016 kill -USR1 14746 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14746 killed at Mon Apr 25 14:07:01 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:07:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:07:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14802 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14802 found at Mon Apr 25 14:07:01 UTC 2016 selfserv_9709 with PID 14802 started at Mon Apr 25 14:07:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #1006: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14802 at Mon Apr 25 14:07:02 UTC 2016 kill -USR1 14802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14802 killed at Mon Apr 25 14:07:03 UTC 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9709 starting at Mon Apr 25 14:07:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:07:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:03 UTC 2016 selfserv_9709 with PID 14880 started at Mon Apr 25 14:07:03 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:04 UTC 2016 ssl.sh: #1007: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:05 UTC 2016 ssl.sh: #1008: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:06 UTC 2016 ssl.sh: #1009: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:07 UTC 2016 ssl.sh: #1010: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:08 UTC 2016 ssl.sh: #1011: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:09 UTC 2016 ssl.sh: #1012: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:10 UTC 2016 ssl.sh: #1013: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:11 UTC 2016 ssl.sh: #1014: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:12 UTC 2016 ssl.sh: #1015: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:13 UTC 2016 ssl.sh: #1016: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:14 UTC 2016 ssl.sh: #1017: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:15 UTC 2016 ssl.sh: #1018: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:16 UTC 2016 ssl.sh: #1019: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:17 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1020: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:18 UTC 2016 ssl.sh: #1021: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:19 UTC 2016 ssl.sh: #1022: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:20 UTC 2016 ssl.sh: #1023: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:21 UTC 2016 ssl.sh: #1024: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:21 UTC 2016 ssl.sh: #1025: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:22 UTC 2016 ssl.sh: #1026: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:23 UTC 2016 ssl.sh: #1027: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:24 UTC 2016 ssl.sh: #1028: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:25 UTC 2016 ssl.sh: #1029: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:26 UTC 2016 ssl.sh: #1030: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:27 UTC 2016 ssl.sh: #1031: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:28 UTC 2016 ssl.sh: #1032: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:29 UTC 2016 ssl.sh: #1033: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:30 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1034: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:31 UTC 2016 ssl.sh: #1035: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:32 UTC 2016 ssl.sh: #1036: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:33 UTC 2016 ssl.sh: #1037: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:34 UTC 2016 ssl.sh: #1038: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:35 UTC 2016 ssl.sh: #1039: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:35 UTC 2016 ssl.sh: #1040: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:36 UTC 2016 ssl.sh: #1041: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:37 UTC 2016 ssl.sh: #1042: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:38 UTC 2016 ssl.sh: #1043: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:39 UTC 2016 ssl.sh: #1044: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:40 UTC 2016 ssl.sh: #1045: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:41 UTC 2016 ssl.sh: #1046: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 14880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14880 found at Mon Apr 25 14:07:42 UTC 2016 ssl.sh: #1047: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 14880 at Mon Apr 25 14:07:42 UTC 2016 kill -USR1 14880 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14880 killed at Mon Apr 25 14:07:43 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:07:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:07:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:43 UTC 2016 selfserv_9709 with PID 16303 started at Mon Apr 25 14:07:43 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:44 UTC 2016 ssl.sh: #1048: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:45 UTC 2016 ssl.sh: #1049: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:45 UTC 2016 ssl.sh: #1050: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:46 UTC 2016 ssl.sh: #1051: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:47 UTC 2016 ssl.sh: #1052: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:48 UTC 2016 ssl.sh: #1053: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:49 UTC 2016 ssl.sh: #1054: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:50 UTC 2016 ssl.sh: #1055: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:50 UTC 2016 ssl.sh: #1056: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:51 UTC 2016 ssl.sh: #1057: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:52 UTC 2016 ssl.sh: #1058: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:53 UTC 2016 ssl.sh: #1059: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:54 UTC 2016 ssl.sh: #1060: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:55 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1061: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:56 UTC 2016 ssl.sh: #1062: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:57 UTC 2016 ssl.sh: #1063: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:57 UTC 2016 ssl.sh: #1064: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:58 UTC 2016 ssl.sh: #1065: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:07:59 UTC 2016 ssl.sh: #1066: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:00 UTC 2016 ssl.sh: #1067: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:01 UTC 2016 ssl.sh: #1068: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:01 UTC 2016 ssl.sh: #1069: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:02 UTC 2016 ssl.sh: #1070: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:03 UTC 2016 ssl.sh: #1071: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:04 UTC 2016 ssl.sh: #1072: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:05 UTC 2016 ssl.sh: #1073: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:06 UTC 2016 ssl.sh: #1074: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:07 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1075: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:07 UTC 2016 ssl.sh: #1076: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:08 UTC 2016 ssl.sh: #1077: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:09 UTC 2016 ssl.sh: #1078: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:10 UTC 2016 ssl.sh: #1079: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:11 UTC 2016 ssl.sh: #1080: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:11 UTC 2016 ssl.sh: #1081: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:12 UTC 2016 ssl.sh: #1082: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:13 UTC 2016 ssl.sh: #1083: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:14 UTC 2016 ssl.sh: #1084: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:15 UTC 2016 ssl.sh: #1085: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:15 UTC 2016 ssl.sh: #1086: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:16 UTC 2016 ssl.sh: #1087: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16303 found at Mon Apr 25 14:08:17 UTC 2016 ssl.sh: #1088: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 16303 at Mon Apr 25 14:08:17 UTC 2016 kill -USR1 16303 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16303 killed at Mon Apr 25 14:08:18 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:08:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:08:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:18 UTC 2016 selfserv_9709 with PID 17744 started at Mon Apr 25 14:08:18 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:19 UTC 2016 ssl.sh: #1089: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:20 UTC 2016 ssl.sh: #1090: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:21 UTC 2016 ssl.sh: #1091: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:22 UTC 2016 ssl.sh: #1092: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:23 UTC 2016 ssl.sh: #1093: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:24 UTC 2016 ssl.sh: #1094: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:25 UTC 2016 ssl.sh: #1095: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:26 UTC 2016 ssl.sh: #1096: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:27 UTC 2016 ssl.sh: #1097: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:29 UTC 2016 ssl.sh: #1098: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:30 UTC 2016 ssl.sh: #1099: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:31 UTC 2016 ssl.sh: #1100: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:32 UTC 2016 ssl.sh: #1101: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:33 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1102: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:34 UTC 2016 ssl.sh: #1103: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:35 UTC 2016 ssl.sh: #1104: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:36 UTC 2016 ssl.sh: #1105: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:37 UTC 2016 ssl.sh: #1106: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:38 UTC 2016 ssl.sh: #1107: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:39 UTC 2016 ssl.sh: #1108: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:40 UTC 2016 ssl.sh: #1109: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:41 UTC 2016 ssl.sh: #1110: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:41 UTC 2016 ssl.sh: #1111: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:43 UTC 2016 ssl.sh: #1112: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:44 UTC 2016 ssl.sh: #1113: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:45 UTC 2016 ssl.sh: #1114: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:46 UTC 2016 ssl.sh: #1115: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:47 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1116: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:48 UTC 2016 ssl.sh: #1117: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:49 UTC 2016 ssl.sh: #1118: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:50 UTC 2016 ssl.sh: #1119: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:51 UTC 2016 ssl.sh: #1120: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:52 UTC 2016 ssl.sh: #1121: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:53 UTC 2016 ssl.sh: #1122: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:54 UTC 2016 ssl.sh: #1123: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:54 UTC 2016 ssl.sh: #1124: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:55 UTC 2016 ssl.sh: #1125: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:56 UTC 2016 ssl.sh: #1126: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:57 UTC 2016 ssl.sh: #1127: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:58 UTC 2016 ssl.sh: #1128: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17744 found at Mon Apr 25 14:08:59 UTC 2016 ssl.sh: #1129: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 17744 at Mon Apr 25 14:08:59 UTC 2016 kill -USR1 17744 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17744 killed at Mon Apr 25 14:09:00 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:09:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:09:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:00 UTC 2016 selfserv_9709 with PID 19171 started at Mon Apr 25 14:09:00 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:01 UTC 2016 ssl.sh: #1130: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:02 UTC 2016 ssl.sh: #1131: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:03 UTC 2016 ssl.sh: #1132: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:04 UTC 2016 ssl.sh: #1133: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:05 UTC 2016 ssl.sh: #1134: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:06 UTC 2016 ssl.sh: #1135: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:07 UTC 2016 ssl.sh: #1136: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:08 UTC 2016 ssl.sh: #1137: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:09 UTC 2016 ssl.sh: #1138: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:09 UTC 2016 ssl.sh: #1139: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:10 UTC 2016 ssl.sh: #1140: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:11 UTC 2016 ssl.sh: #1141: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:12 UTC 2016 ssl.sh: #1142: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:13 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1143: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:14 UTC 2016 ssl.sh: #1144: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:15 UTC 2016 ssl.sh: #1145: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:16 UTC 2016 ssl.sh: #1146: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:17 UTC 2016 ssl.sh: #1147: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:18 UTC 2016 ssl.sh: #1148: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:19 UTC 2016 ssl.sh: #1149: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:19 UTC 2016 ssl.sh: #1150: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:20 UTC 2016 ssl.sh: #1151: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:21 UTC 2016 ssl.sh: #1152: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:22 UTC 2016 ssl.sh: #1153: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:23 UTC 2016 ssl.sh: #1154: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:24 UTC 2016 ssl.sh: #1155: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:25 UTC 2016 ssl.sh: #1156: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:26 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1157: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:27 UTC 2016 ssl.sh: #1158: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:28 UTC 2016 ssl.sh: #1159: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:29 UTC 2016 ssl.sh: #1160: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:29 UTC 2016 ssl.sh: #1161: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:30 UTC 2016 ssl.sh: #1162: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:31 UTC 2016 ssl.sh: #1163: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:32 UTC 2016 ssl.sh: #1164: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:33 UTC 2016 ssl.sh: #1165: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:34 UTC 2016 ssl.sh: #1166: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:34 UTC 2016 ssl.sh: #1167: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:35 UTC 2016 ssl.sh: #1168: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:36 UTC 2016 ssl.sh: #1169: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19171 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19171 found at Mon Apr 25 14:09:37 UTC 2016 ssl.sh: #1170: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 19171 at Mon Apr 25 14:09:37 UTC 2016 kill -USR1 19171 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19171 killed at Mon Apr 25 14:09:38 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:09:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:09:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20610 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20610 found at Mon Apr 25 14:09:38 UTC 2016 selfserv_9709 with PID 20610 started at Mon Apr 25 14:09:38 UTC 2016 trying to kill selfserv_9709 with PID 20610 at Mon Apr 25 14:09:38 UTC 2016 kill -USR1 20610 ./ssl.sh: line 186: 20610 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20610 killed at Mon Apr 25 14:09:38 UTC 2016 selfserv_9709 starting at Mon Apr 25 14:09:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:09:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:39 UTC 2016 selfserv_9709 with PID 20644 started at Mon Apr 25 14:09:39 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:40 UTC 2016 ssl.sh: #1171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:41 UTC 2016 ssl.sh: #1172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:43 UTC 2016 ssl.sh: #1173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:44 UTC 2016 ssl.sh: #1174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:45 UTC 2016 ssl.sh: #1175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:46 UTC 2016 ssl.sh: #1176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:47 UTC 2016 ssl.sh: #1177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:49 UTC 2016 ssl.sh: #1178: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:50 UTC 2016 ssl.sh: #1179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:51 UTC 2016 ssl.sh: #1180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:52 UTC 2016 ssl.sh: #1181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:54 UTC 2016 ssl.sh: #1182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:55 UTC 2016 ssl.sh: #1183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:56 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1184: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:57 UTC 2016 ssl.sh: #1185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:58 UTC 2016 ssl.sh: #1186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:09:59 UTC 2016 ssl.sh: #1187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:01 UTC 2016 ssl.sh: #1188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:02 UTC 2016 ssl.sh: #1189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:03 UTC 2016 ssl.sh: #1190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:04 UTC 2016 ssl.sh: #1191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:05 UTC 2016 ssl.sh: #1192: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:07 UTC 2016 ssl.sh: #1193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:08 UTC 2016 ssl.sh: #1194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:09 UTC 2016 ssl.sh: #1195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:10 UTC 2016 ssl.sh: #1196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:12 UTC 2016 ssl.sh: #1197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:13 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1198: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:14 UTC 2016 ssl.sh: #1199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:15 UTC 2016 ssl.sh: #1200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:16 UTC 2016 ssl.sh: #1201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:17 UTC 2016 ssl.sh: #1202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:19 UTC 2016 ssl.sh: #1203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:20 UTC 2016 ssl.sh: #1204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:21 UTC 2016 ssl.sh: #1205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:22 UTC 2016 ssl.sh: #1206: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:23 UTC 2016 ssl.sh: #1207: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:24 UTC 2016 ssl.sh: #1208: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:26 UTC 2016 ssl.sh: #1209: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:27 UTC 2016 ssl.sh: #1210: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20644 found at Mon Apr 25 14:10:28 UTC 2016 ssl.sh: #1211: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20644 at Mon Apr 25 14:10:28 UTC 2016 kill -USR1 20644 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20644 killed at Mon Apr 25 14:10:28 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:10:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:10:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:29 UTC 2016 selfserv_9709 with PID 22086 started at Mon Apr 25 14:10:29 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:30 UTC 2016 ssl.sh: #1212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:31 UTC 2016 ssl.sh: #1213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:33 UTC 2016 ssl.sh: #1214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:34 UTC 2016 ssl.sh: #1215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:35 UTC 2016 ssl.sh: #1216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:36 UTC 2016 ssl.sh: #1217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:37 UTC 2016 ssl.sh: #1218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:39 UTC 2016 ssl.sh: #1219: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:40 UTC 2016 ssl.sh: #1220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:41 UTC 2016 ssl.sh: #1221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:42 UTC 2016 ssl.sh: #1222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:44 UTC 2016 ssl.sh: #1223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:45 UTC 2016 ssl.sh: #1224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:46 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1225: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:47 UTC 2016 ssl.sh: #1226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:48 UTC 2016 ssl.sh: #1227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:50 UTC 2016 ssl.sh: #1228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:51 UTC 2016 ssl.sh: #1229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:52 UTC 2016 ssl.sh: #1230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:53 UTC 2016 ssl.sh: #1231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:54 UTC 2016 ssl.sh: #1232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:55 UTC 2016 ssl.sh: #1233: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:57 UTC 2016 ssl.sh: #1234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:58 UTC 2016 ssl.sh: #1235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:10:59 UTC 2016 ssl.sh: #1236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:00 UTC 2016 ssl.sh: #1237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:02 UTC 2016 ssl.sh: #1238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:03 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1239: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:04 UTC 2016 ssl.sh: #1240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:05 UTC 2016 ssl.sh: #1241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:06 UTC 2016 ssl.sh: #1242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:07 UTC 2016 ssl.sh: #1243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:09 UTC 2016 ssl.sh: #1244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:10 UTC 2016 ssl.sh: #1245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:11 UTC 2016 ssl.sh: #1246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:12 UTC 2016 ssl.sh: #1247: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:13 UTC 2016 ssl.sh: #1248: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:14 UTC 2016 ssl.sh: #1249: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:16 UTC 2016 ssl.sh: #1250: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:17 UTC 2016 ssl.sh: #1251: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x09 for socket out_flags. tstclnt: PR_Poll returned 0x09 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22086 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22086 found at Mon Apr 25 14:11:18 UTC 2016 ssl.sh: #1252: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22086 at Mon Apr 25 14:11:18 UTC 2016 kill -USR1 22086 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22086 killed at Mon Apr 25 14:11:19 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:11:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:11:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:19 UTC 2016 selfserv_9709 with PID 23527 started at Mon Apr 25 14:11:19 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:20 UTC 2016 ssl.sh: #1253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:21 UTC 2016 ssl.sh: #1254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:22 UTC 2016 ssl.sh: #1255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:23 UTC 2016 ssl.sh: #1256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:24 UTC 2016 ssl.sh: #1257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:25 UTC 2016 ssl.sh: #1258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:26 UTC 2016 ssl.sh: #1259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:27 UTC 2016 ssl.sh: #1260: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:28 UTC 2016 ssl.sh: #1261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:29 UTC 2016 ssl.sh: #1262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:30 UTC 2016 ssl.sh: #1263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:31 UTC 2016 ssl.sh: #1264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:32 UTC 2016 ssl.sh: #1265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:33 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1266: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:34 UTC 2016 ssl.sh: #1267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:35 UTC 2016 ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:36 UTC 2016 ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:37 UTC 2016 ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:38 UTC 2016 ssl.sh: #1271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:39 UTC 2016 ssl.sh: #1272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:40 UTC 2016 ssl.sh: #1273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:41 UTC 2016 ssl.sh: #1274: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:42 UTC 2016 ssl.sh: #1275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:43 UTC 2016 ssl.sh: #1276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:44 UTC 2016 ssl.sh: #1277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:45 UTC 2016 ssl.sh: #1278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:46 UTC 2016 ssl.sh: #1279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:47 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1280: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:48 UTC 2016 ssl.sh: #1281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:49 UTC 2016 ssl.sh: #1282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:50 UTC 2016 ssl.sh: #1283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:51 UTC 2016 ssl.sh: #1284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:52 UTC 2016 ssl.sh: #1285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:53 UTC 2016 ssl.sh: #1286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:54 UTC 2016 ssl.sh: #1287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:55 UTC 2016 ssl.sh: #1288: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:56 UTC 2016 ssl.sh: #1289: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:57 UTC 2016 ssl.sh: #1290: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:58 UTC 2016 ssl.sh: #1291: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:11:59 UTC 2016 ssl.sh: #1292: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23527 found at Mon Apr 25 14:12:00 UTC 2016 ssl.sh: #1293: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 23527 at Mon Apr 25 14:12:00 UTC 2016 kill -USR1 23527 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23527 killed at Mon Apr 25 14:12:01 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:12:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:12:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:01 UTC 2016 selfserv_9709 with PID 24954 started at Mon Apr 25 14:12:01 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:02 UTC 2016 ssl.sh: #1294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:04 UTC 2016 ssl.sh: #1295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:05 UTC 2016 ssl.sh: #1296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:06 UTC 2016 ssl.sh: #1297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:07 UTC 2016 ssl.sh: #1298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:09 UTC 2016 ssl.sh: #1299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:10 UTC 2016 ssl.sh: #1300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:11 UTC 2016 ssl.sh: #1301: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:13 UTC 2016 ssl.sh: #1302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:14 UTC 2016 ssl.sh: #1303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:15 UTC 2016 ssl.sh: #1304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:17 UTC 2016 ssl.sh: #1305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:18 UTC 2016 ssl.sh: #1306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:19 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1307: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:20 UTC 2016 ssl.sh: #1308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:22 UTC 2016 ssl.sh: #1309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:23 UTC 2016 ssl.sh: #1310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:24 UTC 2016 ssl.sh: #1311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:25 UTC 2016 ssl.sh: #1312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:26 UTC 2016 ssl.sh: #1313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:28 UTC 2016 ssl.sh: #1314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:29 UTC 2016 ssl.sh: #1315: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:30 UTC 2016 ssl.sh: #1316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:31 UTC 2016 ssl.sh: #1317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:33 UTC 2016 ssl.sh: #1318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:34 UTC 2016 ssl.sh: #1319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:35 UTC 2016 ssl.sh: #1320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:37 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1321: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:38 UTC 2016 ssl.sh: #1322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:39 UTC 2016 ssl.sh: #1323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:40 UTC 2016 ssl.sh: #1324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:42 UTC 2016 ssl.sh: #1325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:43 UTC 2016 ssl.sh: #1326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:44 UTC 2016 ssl.sh: #1327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:45 UTC 2016 ssl.sh: #1328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:46 UTC 2016 ssl.sh: #1329: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:48 UTC 2016 ssl.sh: #1330: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:49 UTC 2016 ssl.sh: #1331: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:50 UTC 2016 ssl.sh: #1332: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:51 UTC 2016 ssl.sh: #1333: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24954 found at Mon Apr 25 14:12:53 UTC 2016 ssl.sh: #1334: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24954 at Mon Apr 25 14:12:53 UTC 2016 kill -USR1 24954 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24954 killed at Mon Apr 25 14:12:53 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:12:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:12:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:12:54 UTC 2016 selfserv_9709 with PID 26394 started at Mon Apr 25 14:12:54 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:12:55 UTC 2016 ssl.sh: #1335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:12:56 UTC 2016 ssl.sh: #1336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:12:57 UTC 2016 ssl.sh: #1337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:12:59 UTC 2016 ssl.sh: #1338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:00 UTC 2016 ssl.sh: #1339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:01 UTC 2016 ssl.sh: #1340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:03 UTC 2016 ssl.sh: #1341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:04 UTC 2016 ssl.sh: #1342: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:05 UTC 2016 ssl.sh: #1343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:07 UTC 2016 ssl.sh: #1344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:08 UTC 2016 ssl.sh: #1345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:09 UTC 2016 ssl.sh: #1346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:10 UTC 2016 ssl.sh: #1347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:12 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1348: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:13 UTC 2016 ssl.sh: #1349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:14 UTC 2016 ssl.sh: #1350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:15 UTC 2016 ssl.sh: #1351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:17 UTC 2016 ssl.sh: #1352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:18 UTC 2016 ssl.sh: #1353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:19 UTC 2016 ssl.sh: #1354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:20 UTC 2016 ssl.sh: #1355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:21 UTC 2016 ssl.sh: #1356: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:23 UTC 2016 ssl.sh: #1357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:24 UTC 2016 ssl.sh: #1358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:25 UTC 2016 ssl.sh: #1359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:27 UTC 2016 ssl.sh: #1360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:28 UTC 2016 ssl.sh: #1361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:29 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1362: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:30 UTC 2016 ssl.sh: #1363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:32 UTC 2016 ssl.sh: #1364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:33 UTC 2016 ssl.sh: #1365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:34 UTC 2016 ssl.sh: #1366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:35 UTC 2016 ssl.sh: #1367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:36 UTC 2016 ssl.sh: #1368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:38 UTC 2016 ssl.sh: #1369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:39 UTC 2016 ssl.sh: #1370: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:40 UTC 2016 ssl.sh: #1371: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:41 UTC 2016 ssl.sh: #1372: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:43 UTC 2016 ssl.sh: #1373: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:44 UTC 2016 ssl.sh: #1374: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26394 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26394 found at Mon Apr 25 14:13:45 UTC 2016 ssl.sh: #1375: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26394 at Mon Apr 25 14:13:45 UTC 2016 kill -USR1 26394 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26394 killed at Mon Apr 25 14:13:46 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:13:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:13:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:46 UTC 2016 selfserv_9709 with PID 27835 started at Mon Apr 25 14:13:46 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:47 UTC 2016 ssl.sh: #1376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:48 UTC 2016 ssl.sh: #1377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:49 UTC 2016 ssl.sh: #1378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:50 UTC 2016 ssl.sh: #1379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:51 UTC 2016 ssl.sh: #1380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:52 UTC 2016 ssl.sh: #1381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:54 UTC 2016 ssl.sh: #1382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:55 UTC 2016 ssl.sh: #1383: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:56 UTC 2016 ssl.sh: #1384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:57 UTC 2016 ssl.sh: #1385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:58 UTC 2016 ssl.sh: #1386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:13:59 UTC 2016 ssl.sh: #1387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:00 UTC 2016 ssl.sh: #1388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:02 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1389: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:03 UTC 2016 ssl.sh: #1390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:04 UTC 2016 ssl.sh: #1391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:05 UTC 2016 ssl.sh: #1392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:06 UTC 2016 ssl.sh: #1393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:07 UTC 2016 ssl.sh: #1394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:08 UTC 2016 ssl.sh: #1395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:09 UTC 2016 ssl.sh: #1396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:10 UTC 2016 ssl.sh: #1397: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:11 UTC 2016 ssl.sh: #1398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:12 UTC 2016 ssl.sh: #1399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:13 UTC 2016 ssl.sh: #1400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:14 UTC 2016 ssl.sh: #1401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:15 UTC 2016 ssl.sh: #1402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:16 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1403: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:18 UTC 2016 ssl.sh: #1404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:19 UTC 2016 ssl.sh: #1405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:20 UTC 2016 ssl.sh: #1406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:21 UTC 2016 ssl.sh: #1407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:22 UTC 2016 ssl.sh: #1408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:23 UTC 2016 ssl.sh: #1409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:24 UTC 2016 ssl.sh: #1410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:25 UTC 2016 ssl.sh: #1411: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:26 UTC 2016 ssl.sh: #1412: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:27 UTC 2016 ssl.sh: #1413: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:28 UTC 2016 ssl.sh: #1414: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:29 UTC 2016 ssl.sh: #1415: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27835 found at Mon Apr 25 14:14:30 UTC 2016 ssl.sh: #1416: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 27835 at Mon Apr 25 14:14:30 UTC 2016 kill -USR1 27835 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27835 killed at Mon Apr 25 14:14:30 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:14:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:14:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29280 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29280 found at Mon Apr 25 14:14:31 UTC 2016 selfserv_9709 with PID 29280 started at Mon Apr 25 14:14:31 UTC 2016 trying to kill selfserv_9709 with PID 29280 at Mon Apr 25 14:14:31 UTC 2016 kill -USR1 29280 ./ssl.sh: line 186: 29280 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29280 killed at Mon Apr 25 14:14:31 UTC 2016 selfserv_9709 starting at Mon Apr 25 14:14:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:14:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:32 UTC 2016 selfserv_9709 with PID 29314 started at Mon Apr 25 14:14:32 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:33 UTC 2016 ssl.sh: #1417: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:34 UTC 2016 ssl.sh: #1418: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:35 UTC 2016 ssl.sh: #1419: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:37 UTC 2016 ssl.sh: #1420: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:38 UTC 2016 ssl.sh: #1421: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:39 UTC 2016 ssl.sh: #1422: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:40 UTC 2016 ssl.sh: #1423: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:41 UTC 2016 ssl.sh: #1424: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:43 UTC 2016 ssl.sh: #1425: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:44 UTC 2016 ssl.sh: #1426: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:45 UTC 2016 ssl.sh: #1427: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:46 UTC 2016 ssl.sh: #1428: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:48 UTC 2016 ssl.sh: #1429: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:49 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1430: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:50 UTC 2016 ssl.sh: #1431: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:51 UTC 2016 ssl.sh: #1432: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:52 UTC 2016 ssl.sh: #1433: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:53 UTC 2016 ssl.sh: #1434: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:55 UTC 2016 ssl.sh: #1435: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:56 UTC 2016 ssl.sh: #1436: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:57 UTC 2016 ssl.sh: #1437: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:58 UTC 2016 ssl.sh: #1438: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:14:59 UTC 2016 ssl.sh: #1439: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:01 UTC 2016 ssl.sh: #1440: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:02 UTC 2016 ssl.sh: #1441: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:03 UTC 2016 ssl.sh: #1442: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:04 UTC 2016 ssl.sh: #1443: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:06 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1444: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:07 UTC 2016 ssl.sh: #1445: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:08 UTC 2016 ssl.sh: #1446: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:09 UTC 2016 ssl.sh: #1447: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:10 UTC 2016 ssl.sh: #1448: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:11 UTC 2016 ssl.sh: #1449: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:12 UTC 2016 ssl.sh: #1450: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:14 UTC 2016 ssl.sh: #1451: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:15 UTC 2016 ssl.sh: #1452: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:16 UTC 2016 ssl.sh: #1453: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:17 UTC 2016 ssl.sh: #1454: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:18 UTC 2016 ssl.sh: #1455: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:20 UTC 2016 ssl.sh: #1456: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29314 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29314 found at Mon Apr 25 14:15:21 UTC 2016 ssl.sh: #1457: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29314 at Mon Apr 25 14:15:21 UTC 2016 kill -USR1 29314 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29314 killed at Mon Apr 25 14:15:21 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:15:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:15:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:22 UTC 2016 selfserv_9709 with PID 30757 started at Mon Apr 25 14:15:22 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:23 UTC 2016 ssl.sh: #1458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:24 UTC 2016 ssl.sh: #1459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:25 UTC 2016 ssl.sh: #1460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:27 UTC 2016 ssl.sh: #1461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:28 UTC 2016 ssl.sh: #1462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:29 UTC 2016 ssl.sh: #1463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:30 UTC 2016 ssl.sh: #1464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:31 UTC 2016 ssl.sh: #1465: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:33 UTC 2016 ssl.sh: #1466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:34 UTC 2016 ssl.sh: #1467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:35 UTC 2016 ssl.sh: #1468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:36 UTC 2016 ssl.sh: #1469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:38 UTC 2016 ssl.sh: #1470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:39 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1471: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:40 UTC 2016 ssl.sh: #1472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:41 UTC 2016 ssl.sh: #1473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:42 UTC 2016 ssl.sh: #1474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:44 UTC 2016 ssl.sh: #1475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:45 UTC 2016 ssl.sh: #1476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:46 UTC 2016 ssl.sh: #1477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:47 UTC 2016 ssl.sh: #1478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:48 UTC 2016 ssl.sh: #1479: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:49 UTC 2016 ssl.sh: #1480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:51 UTC 2016 ssl.sh: #1481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:52 UTC 2016 ssl.sh: #1482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:53 UTC 2016 ssl.sh: #1483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:54 UTC 2016 ssl.sh: #1484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:55 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1485: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:57 UTC 2016 ssl.sh: #1486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:58 UTC 2016 ssl.sh: #1487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:15:59 UTC 2016 ssl.sh: #1488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:00 UTC 2016 ssl.sh: #1489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:01 UTC 2016 ssl.sh: #1490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:03 UTC 2016 ssl.sh: #1491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:04 UTC 2016 ssl.sh: #1492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:05 UTC 2016 ssl.sh: #1493: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:06 UTC 2016 ssl.sh: #1494: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:07 UTC 2016 ssl.sh: #1495: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:09 UTC 2016 ssl.sh: #1496: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:10 UTC 2016 ssl.sh: #1497: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30757 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30757 found at Mon Apr 25 14:16:11 UTC 2016 ssl.sh: #1498: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30757 at Mon Apr 25 14:16:11 UTC 2016 kill -USR1 30757 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30757 killed at Mon Apr 25 14:16:11 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:16:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:16:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:12 UTC 2016 selfserv_9709 with PID 32200 started at Mon Apr 25 14:16:12 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:13 UTC 2016 ssl.sh: #1499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:14 UTC 2016 ssl.sh: #1500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:15 UTC 2016 ssl.sh: #1501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:16 UTC 2016 ssl.sh: #1502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:17 UTC 2016 ssl.sh: #1503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:18 UTC 2016 ssl.sh: #1504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:19 UTC 2016 ssl.sh: #1505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:20 UTC 2016 ssl.sh: #1506: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:21 UTC 2016 ssl.sh: #1507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:22 UTC 2016 ssl.sh: #1508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:23 UTC 2016 ssl.sh: #1509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:24 UTC 2016 ssl.sh: #1510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:25 UTC 2016 ssl.sh: #1511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:26 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1512: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:27 UTC 2016 ssl.sh: #1513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:28 UTC 2016 ssl.sh: #1514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:29 UTC 2016 ssl.sh: #1515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:30 UTC 2016 ssl.sh: #1516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:31 UTC 2016 ssl.sh: #1517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:32 UTC 2016 ssl.sh: #1518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:33 UTC 2016 ssl.sh: #1519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:34 UTC 2016 ssl.sh: #1520: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:35 UTC 2016 ssl.sh: #1521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:36 UTC 2016 ssl.sh: #1522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:37 UTC 2016 ssl.sh: #1523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:38 UTC 2016 ssl.sh: #1524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:39 UTC 2016 ssl.sh: #1525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 101 bytes tstclnt: Writing 101 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:40 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1526: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:41 UTC 2016 ssl.sh: #1527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:42 UTC 2016 ssl.sh: #1528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:43 UTC 2016 ssl.sh: #1529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:44 UTC 2016 ssl.sh: #1530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:45 UTC 2016 ssl.sh: #1531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:46 UTC 2016 ssl.sh: #1532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:47 UTC 2016 ssl.sh: #1533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:48 UTC 2016 ssl.sh: #1534: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:49 UTC 2016 ssl.sh: #1535: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:50 UTC 2016 ssl.sh: #1536: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:51 UTC 2016 ssl.sh: #1537: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:52 UTC 2016 ssl.sh: #1538: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32200 found at Mon Apr 25 14:16:53 UTC 2016 ssl.sh: #1539: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32200 at Mon Apr 25 14:16:53 UTC 2016 kill -USR1 32200 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32200 killed at Mon Apr 25 14:16:53 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:16:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:16:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:16:54 UTC 2016 selfserv_9709 with PID 1182 started at Mon Apr 25 14:16:54 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:16:55 UTC 2016 ssl.sh: #1540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:16:57 UTC 2016 ssl.sh: #1541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:16:58 UTC 2016 ssl.sh: #1542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:16:59 UTC 2016 ssl.sh: #1543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:00 UTC 2016 ssl.sh: #1544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:02 UTC 2016 ssl.sh: #1545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:03 UTC 2016 ssl.sh: #1546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:04 UTC 2016 ssl.sh: #1547: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:06 UTC 2016 ssl.sh: #1548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:07 UTC 2016 ssl.sh: #1549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:08 UTC 2016 ssl.sh: #1550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:10 UTC 2016 ssl.sh: #1551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:11 UTC 2016 ssl.sh: #1552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:12 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1553: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:13 UTC 2016 ssl.sh: #1554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:15 UTC 2016 ssl.sh: #1555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:16 UTC 2016 ssl.sh: #1556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:17 UTC 2016 ssl.sh: #1557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:18 UTC 2016 ssl.sh: #1558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:19 UTC 2016 ssl.sh: #1559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:21 UTC 2016 ssl.sh: #1560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:22 UTC 2016 ssl.sh: #1561: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:23 UTC 2016 ssl.sh: #1562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:24 UTC 2016 ssl.sh: #1563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:26 UTC 2016 ssl.sh: #1564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:27 UTC 2016 ssl.sh: #1565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:28 UTC 2016 ssl.sh: #1566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:30 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1567: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:31 UTC 2016 ssl.sh: #1568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:32 UTC 2016 ssl.sh: #1569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:33 UTC 2016 ssl.sh: #1570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:35 UTC 2016 ssl.sh: #1571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:36 UTC 2016 ssl.sh: #1572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:37 UTC 2016 ssl.sh: #1573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:38 UTC 2016 ssl.sh: #1574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:40 UTC 2016 ssl.sh: #1575: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:41 UTC 2016 ssl.sh: #1576: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:42 UTC 2016 ssl.sh: #1577: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:43 UTC 2016 ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:44 UTC 2016 ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1182 found at Mon Apr 25 14:17:46 UTC 2016 ssl.sh: #1580: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1182 at Mon Apr 25 14:17:46 UTC 2016 kill -USR1 1182 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1182 killed at Mon Apr 25 14:17:46 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:17:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:17:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:47 UTC 2016 selfserv_9709 with PID 2635 started at Mon Apr 25 14:17:47 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:48 UTC 2016 ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:49 UTC 2016 ssl.sh: #1582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:50 UTC 2016 ssl.sh: #1583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:52 UTC 2016 ssl.sh: #1584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:53 UTC 2016 ssl.sh: #1585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:54 UTC 2016 ssl.sh: #1586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:56 UTC 2016 ssl.sh: #1587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:57 UTC 2016 ssl.sh: #1588: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:17:58 UTC 2016 ssl.sh: #1589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:00 UTC 2016 ssl.sh: #1590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:01 UTC 2016 ssl.sh: #1591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:02 UTC 2016 ssl.sh: #1592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:04 UTC 2016 ssl.sh: #1593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:05 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1594: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:06 UTC 2016 ssl.sh: #1595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:07 UTC 2016 ssl.sh: #1596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:09 UTC 2016 ssl.sh: #1597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:10 UTC 2016 ssl.sh: #1598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:11 UTC 2016 ssl.sh: #1599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:12 UTC 2016 ssl.sh: #1600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:13 UTC 2016 ssl.sh: #1601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:15 UTC 2016 ssl.sh: #1602: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:16 UTC 2016 ssl.sh: #1603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:17 UTC 2016 ssl.sh: #1604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:18 UTC 2016 ssl.sh: #1605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:20 UTC 2016 ssl.sh: #1606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:21 UTC 2016 ssl.sh: #1607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:22 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1608: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:24 UTC 2016 ssl.sh: #1609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:25 UTC 2016 ssl.sh: #1610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:26 UTC 2016 ssl.sh: #1611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:27 UTC 2016 ssl.sh: #1612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:28 UTC 2016 ssl.sh: #1613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:30 UTC 2016 ssl.sh: #1614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:31 UTC 2016 ssl.sh: #1615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:32 UTC 2016 ssl.sh: #1616: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:33 UTC 2016 ssl.sh: #1617: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:35 UTC 2016 ssl.sh: #1618: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:36 UTC 2016 ssl.sh: #1619: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:37 UTC 2016 ssl.sh: #1620: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2635 found at Mon Apr 25 14:18:38 UTC 2016 ssl.sh: #1621: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 2635 at Mon Apr 25 14:18:38 UTC 2016 kill -USR1 2635 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2635 killed at Mon Apr 25 14:18:39 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:18:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:18:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:39 UTC 2016 selfserv_9709 with PID 4126 started at Mon Apr 25 14:18:39 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:40 UTC 2016 ssl.sh: #1622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:41 UTC 2016 ssl.sh: #1623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:42 UTC 2016 ssl.sh: #1624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:44 UTC 2016 ssl.sh: #1625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:45 UTC 2016 ssl.sh: #1626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:46 UTC 2016 ssl.sh: #1627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:47 UTC 2016 ssl.sh: #1628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:48 UTC 2016 ssl.sh: #1629: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:49 UTC 2016 ssl.sh: #1630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:50 UTC 2016 ssl.sh: #1631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:51 UTC 2016 ssl.sh: #1632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:52 UTC 2016 ssl.sh: #1633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:53 UTC 2016 ssl.sh: #1634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:55 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1635: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:56 UTC 2016 ssl.sh: #1636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:57 UTC 2016 ssl.sh: #1637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:58 UTC 2016 ssl.sh: #1638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:18:59 UTC 2016 ssl.sh: #1639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:00 UTC 2016 ssl.sh: #1640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:01 UTC 2016 ssl.sh: #1641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:02 UTC 2016 ssl.sh: #1642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:03 UTC 2016 ssl.sh: #1643: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:04 UTC 2016 ssl.sh: #1644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:05 UTC 2016 ssl.sh: #1645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:06 UTC 2016 ssl.sh: #1646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:07 UTC 2016 ssl.sh: #1647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:09 UTC 2016 ssl.sh: #1648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 104 bytes tstclnt: Writing 104 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:10 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #1649: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:11 UTC 2016 ssl.sh: #1650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:12 UTC 2016 ssl.sh: #1651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:13 UTC 2016 ssl.sh: #1652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:14 UTC 2016 ssl.sh: #1653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:15 UTC 2016 ssl.sh: #1654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:16 UTC 2016 ssl.sh: #1655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:17 UTC 2016 ssl.sh: #1656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:18 UTC 2016 ssl.sh: #1657: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:19 UTC 2016 ssl.sh: #1658: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:20 UTC 2016 ssl.sh: #1659: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:21 UTC 2016 ssl.sh: #1660: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:22 UTC 2016 ssl.sh: #1661: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4126 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4126 found at Mon Apr 25 14:19:23 UTC 2016 ssl.sh: #1662: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4126 at Mon Apr 25 14:19:23 UTC 2016 kill -USR1 4126 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4126 killed at Mon Apr 25 14:19:24 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:19:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:19:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5567 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5567 found at Mon Apr 25 14:19:24 UTC 2016 selfserv_9709 with PID 5567 started at Mon Apr 25 14:19:24 UTC 2016 trying to kill selfserv_9709 with PID 5567 at Mon Apr 25 14:19:24 UTC 2016 kill -USR1 5567 ./ssl.sh: line 186: 5567 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5567 killed at Mon Apr 25 14:19:25 UTC 2016 ssl.sh: SSL Cipher Coverage - server bypass/client normal - with ECC =============================== selfserv_9709 starting at Mon Apr 25 14:19:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:19:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:25 UTC 2016 selfserv_9709 with PID 5607 started at Mon Apr 25 14:19:25 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1663: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1664: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1665: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1666: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1667: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1668: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1669: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1670: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1671: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1672: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1673: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1674: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1675: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1676: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1677: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1678: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1679: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1680: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1681: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1682: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1683: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1684: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1685: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1686: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1687: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1688: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1689: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1690: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1691: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1692: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1693: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1694: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1695: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1696: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1697: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1698: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1699: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1700: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1701: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1702: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1703: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1704: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1705: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1706: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1707: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1708: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1709: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1710: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1711: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1712: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1713: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:19:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1714: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1715: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1716: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1717: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1718: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1719: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1720: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1721: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1722: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1723: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1724: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1725: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1726: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1727: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1728: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1729: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5607 >/dev/null 2>/dev/null selfserv_9709 with PID 5607 found at Mon Apr 25 14:20:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1730: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 5607 at Mon Apr 25 14:20:12 UTC 2016 kill -USR1 5607 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5607 killed at Mon Apr 25 14:20:12 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:20:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:20:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7523 >/dev/null 2>/dev/null selfserv_9709 with PID 7523 found at Mon Apr 25 14:20:12 UTC 2016 selfserv_9709 with PID 7523 started at Mon Apr 25 14:20:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1731: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7523 >/dev/null 2>/dev/null selfserv_9709 with PID 7523 found at Mon Apr 25 14:20:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1732: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7523 >/dev/null 2>/dev/null selfserv_9709 with PID 7523 found at Mon Apr 25 14:20:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1733: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7523 >/dev/null 2>/dev/null selfserv_9709 with PID 7523 found at Mon Apr 25 14:20:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1734: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7523 >/dev/null 2>/dev/null selfserv_9709 with PID 7523 found at Mon Apr 25 14:20:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1735: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 7523 at Mon Apr 25 14:20:16 UTC 2016 kill -USR1 7523 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7523 killed at Mon Apr 25 14:20:17 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:20:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:20:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:17 UTC 2016 selfserv_9709 with PID 7671 started at Mon Apr 25 14:20:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1736: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1737: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1738: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1739: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1740: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1741: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1742: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1743: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1744: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1745: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1746: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1747: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1748: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1749: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7671 >/dev/null 2>/dev/null selfserv_9709 with PID 7671 found at Mon Apr 25 14:20:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1750: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 7671 at Mon Apr 25 14:20:28 UTC 2016 kill -USR1 7671 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7671 killed at Mon Apr 25 14:20:28 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:20:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:20:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8058 >/dev/null 2>/dev/null selfserv_9709 with PID 8058 found at Mon Apr 25 14:20:29 UTC 2016 selfserv_9709 with PID 8058 started at Mon Apr 25 14:20:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1751: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8058 >/dev/null 2>/dev/null selfserv_9709 with PID 8058 found at Mon Apr 25 14:20:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1752: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8058 >/dev/null 2>/dev/null selfserv_9709 with PID 8058 found at Mon Apr 25 14:20:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1753: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8058 >/dev/null 2>/dev/null selfserv_9709 with PID 8058 found at Mon Apr 25 14:20:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1754: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8058 >/dev/null 2>/dev/null selfserv_9709 with PID 8058 found at Mon Apr 25 14:20:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1755: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 8058 at Mon Apr 25 14:20:33 UTC 2016 kill -USR1 8058 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8058 killed at Mon Apr 25 14:20:33 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:20:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:20:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:33 UTC 2016 selfserv_9709 with PID 8206 started at Mon Apr 25 14:20:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1756: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1757: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1758: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1759: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1760: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1761: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1762: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1763: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1764: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1765: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1766: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1767: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1768: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1769: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8206 >/dev/null 2>/dev/null selfserv_9709 with PID 8206 found at Mon Apr 25 14:20:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1770: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 8206 at Mon Apr 25 14:20:44 UTC 2016 kill -USR1 8206 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8206 killed at Mon Apr 25 14:20:45 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:20:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:20:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8592 >/dev/null 2>/dev/null selfserv_9709 with PID 8592 found at Mon Apr 25 14:20:45 UTC 2016 selfserv_9709 with PID 8592 started at Mon Apr 25 14:20:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1771: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8592 >/dev/null 2>/dev/null selfserv_9709 with PID 8592 found at Mon Apr 25 14:20:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1772: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8592 >/dev/null 2>/dev/null selfserv_9709 with PID 8592 found at Mon Apr 25 14:20:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1773: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8592 >/dev/null 2>/dev/null selfserv_9709 with PID 8592 found at Mon Apr 25 14:20:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1774: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8592 >/dev/null 2>/dev/null selfserv_9709 with PID 8592 found at Mon Apr 25 14:20:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1775: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 8592 at Mon Apr 25 14:20:49 UTC 2016 kill -USR1 8592 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8592 killed at Mon Apr 25 14:20:49 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:20:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:20:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:50 UTC 2016 selfserv_9709 with PID 8740 started at Mon Apr 25 14:20:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1776: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1777: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1778: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1779: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1780: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1781: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1782: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1783: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1784: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1785: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1786: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1787: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 8740 >/dev/null 2>/dev/null selfserv_9709 with PID 8740 found at Mon Apr 25 14:20:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1788: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8740 at Mon Apr 25 14:20:59 UTC 2016 kill -USR1 8740 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8740 killed at Mon Apr 25 14:20:59 UTC 2016 ssl.sh: SSL Client Authentication - server bypass/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:20:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:20:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9123 >/dev/null 2>/dev/null selfserv_9709 with PID 9123 found at Mon Apr 25 14:21:00 UTC 2016 selfserv_9709 with PID 9123 started at Mon Apr 25 14:21:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1789: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9123 at Mon Apr 25 14:21:01 UTC 2016 kill -USR1 9123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9123 killed at Mon Apr 25 14:21:01 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9197 >/dev/null 2>/dev/null selfserv_9709 with PID 9197 found at Mon Apr 25 14:21:02 UTC 2016 selfserv_9709 with PID 9197 started at Mon Apr 25 14:21:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1790: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9197 at Mon Apr 25 14:21:03 UTC 2016 kill -USR1 9197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9197 killed at Mon Apr 25 14:21:03 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9254 >/dev/null 2>/dev/null selfserv_9709 with PID 9254 found at Mon Apr 25 14:21:04 UTC 2016 selfserv_9709 with PID 9254 started at Mon Apr 25 14:21:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1791: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9254 at Mon Apr 25 14:21:05 UTC 2016 kill -USR1 9254 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9254 killed at Mon Apr 25 14:21:05 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9312 >/dev/null 2>/dev/null selfserv_9709 with PID 9312 found at Mon Apr 25 14:21:06 UTC 2016 selfserv_9709 with PID 9312 started at Mon Apr 25 14:21:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1792: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9312 at Mon Apr 25 14:21:07 UTC 2016 kill -USR1 9312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9312 killed at Mon Apr 25 14:21:07 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9369 >/dev/null 2>/dev/null selfserv_9709 with PID 9369 found at Mon Apr 25 14:21:08 UTC 2016 selfserv_9709 with PID 9369 started at Mon Apr 25 14:21:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1793: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9369 at Mon Apr 25 14:21:09 UTC 2016 kill -USR1 9369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9369 killed at Mon Apr 25 14:21:09 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9426 >/dev/null 2>/dev/null selfserv_9709 with PID 9426 found at Mon Apr 25 14:21:10 UTC 2016 selfserv_9709 with PID 9426 started at Mon Apr 25 14:21:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1794: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9426 at Mon Apr 25 14:21:11 UTC 2016 kill -USR1 9426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9426 killed at Mon Apr 25 14:21:11 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9484 >/dev/null 2>/dev/null selfserv_9709 with PID 9484 found at Mon Apr 25 14:21:12 UTC 2016 selfserv_9709 with PID 9484 started at Mon Apr 25 14:21:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1795: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9484 at Mon Apr 25 14:21:13 UTC 2016 kill -USR1 9484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9484 killed at Mon Apr 25 14:21:13 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9541 >/dev/null 2>/dev/null selfserv_9709 with PID 9541 found at Mon Apr 25 14:21:13 UTC 2016 selfserv_9709 with PID 9541 started at Mon Apr 25 14:21:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1796: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9541 at Mon Apr 25 14:21:14 UTC 2016 kill -USR1 9541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9541 killed at Mon Apr 25 14:21:15 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9598 >/dev/null 2>/dev/null selfserv_9709 with PID 9598 found at Mon Apr 25 14:21:15 UTC 2016 selfserv_9709 with PID 9598 started at Mon Apr 25 14:21:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1797: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9598 at Mon Apr 25 14:21:16 UTC 2016 kill -USR1 9598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9598 killed at Mon Apr 25 14:21:16 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9655 >/dev/null 2>/dev/null selfserv_9709 with PID 9655 found at Mon Apr 25 14:21:17 UTC 2016 selfserv_9709 with PID 9655 started at Mon Apr 25 14:21:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1798: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9655 at Mon Apr 25 14:21:18 UTC 2016 kill -USR1 9655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9655 killed at Mon Apr 25 14:21:18 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9712 >/dev/null 2>/dev/null selfserv_9709 with PID 9712 found at Mon Apr 25 14:21:19 UTC 2016 selfserv_9709 with PID 9712 started at Mon Apr 25 14:21:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1799: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9712 at Mon Apr 25 14:21:19 UTC 2016 kill -USR1 9712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9712 killed at Mon Apr 25 14:21:20 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9769 >/dev/null 2>/dev/null selfserv_9709 with PID 9769 found at Mon Apr 25 14:21:20 UTC 2016 selfserv_9709 with PID 9769 started at Mon Apr 25 14:21:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1800: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9769 at Mon Apr 25 14:21:21 UTC 2016 kill -USR1 9769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9769 killed at Mon Apr 25 14:21:22 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9826 >/dev/null 2>/dev/null selfserv_9709 with PID 9826 found at Mon Apr 25 14:21:22 UTC 2016 selfserv_9709 with PID 9826 started at Mon Apr 25 14:21:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1801: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9826 at Mon Apr 25 14:21:23 UTC 2016 kill -USR1 9826 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9826 killed at Mon Apr 25 14:21:24 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9883 >/dev/null 2>/dev/null selfserv_9709 with PID 9883 found at Mon Apr 25 14:21:24 UTC 2016 selfserv_9709 with PID 9883 started at Mon Apr 25 14:21:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1802: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9883 at Mon Apr 25 14:21:26 UTC 2016 kill -USR1 9883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9883 killed at Mon Apr 25 14:21:26 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9941 >/dev/null 2>/dev/null selfserv_9709 with PID 9941 found at Mon Apr 25 14:21:26 UTC 2016 selfserv_9709 with PID 9941 started at Mon Apr 25 14:21:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1803: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9941 at Mon Apr 25 14:21:28 UTC 2016 kill -USR1 9941 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9941 killed at Mon Apr 25 14:21:28 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9998 >/dev/null 2>/dev/null selfserv_9709 with PID 9998 found at Mon Apr 25 14:21:29 UTC 2016 selfserv_9709 with PID 9998 started at Mon Apr 25 14:21:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1804: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9998 at Mon Apr 25 14:21:30 UTC 2016 kill -USR1 9998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9998 killed at Mon Apr 25 14:21:30 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10055 >/dev/null 2>/dev/null selfserv_9709 with PID 10055 found at Mon Apr 25 14:21:31 UTC 2016 selfserv_9709 with PID 10055 started at Mon Apr 25 14:21:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1805: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10055 at Mon Apr 25 14:21:32 UTC 2016 kill -USR1 10055 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10055 killed at Mon Apr 25 14:21:33 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10112 >/dev/null 2>/dev/null selfserv_9709 with PID 10112 found at Mon Apr 25 14:21:33 UTC 2016 selfserv_9709 with PID 10112 started at Mon Apr 25 14:21:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1806: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10112 at Mon Apr 25 14:21:34 UTC 2016 kill -USR1 10112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10112 killed at Mon Apr 25 14:21:35 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10169 >/dev/null 2>/dev/null selfserv_9709 with PID 10169 found at Mon Apr 25 14:21:35 UTC 2016 selfserv_9709 with PID 10169 started at Mon Apr 25 14:21:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1807: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10169 at Mon Apr 25 14:21:37 UTC 2016 kill -USR1 10169 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10169 killed at Mon Apr 25 14:21:37 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10226 >/dev/null 2>/dev/null selfserv_9709 with PID 10226 found at Mon Apr 25 14:21:37 UTC 2016 selfserv_9709 with PID 10226 started at Mon Apr 25 14:21:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1808: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10226 at Mon Apr 25 14:21:39 UTC 2016 kill -USR1 10226 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10226 killed at Mon Apr 25 14:21:39 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10283 >/dev/null 2>/dev/null selfserv_9709 with PID 10283 found at Mon Apr 25 14:21:40 UTC 2016 selfserv_9709 with PID 10283 started at Mon Apr 25 14:21:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1809: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10283 at Mon Apr 25 14:21:41 UTC 2016 kill -USR1 10283 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10283 killed at Mon Apr 25 14:21:42 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10340 >/dev/null 2>/dev/null selfserv_9709 with PID 10340 found at Mon Apr 25 14:21:42 UTC 2016 selfserv_9709 with PID 10340 started at Mon Apr 25 14:21:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1810: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10340 at Mon Apr 25 14:21:43 UTC 2016 kill -USR1 10340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10340 killed at Mon Apr 25 14:21:44 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10397 >/dev/null 2>/dev/null selfserv_9709 with PID 10397 found at Mon Apr 25 14:21:44 UTC 2016 selfserv_9709 with PID 10397 started at Mon Apr 25 14:21:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1811: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10397 at Mon Apr 25 14:21:45 UTC 2016 kill -USR1 10397 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10397 killed at Mon Apr 25 14:21:46 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10455 >/dev/null 2>/dev/null selfserv_9709 with PID 10455 found at Mon Apr 25 14:21:46 UTC 2016 selfserv_9709 with PID 10455 started at Mon Apr 25 14:21:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1812: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10455 at Mon Apr 25 14:21:48 UTC 2016 kill -USR1 10455 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10455 killed at Mon Apr 25 14:21:48 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10512 >/dev/null 2>/dev/null selfserv_9709 with PID 10512 found at Mon Apr 25 14:21:49 UTC 2016 selfserv_9709 with PID 10512 started at Mon Apr 25 14:21:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1813: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10512 at Mon Apr 25 14:21:50 UTC 2016 kill -USR1 10512 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10512 killed at Mon Apr 25 14:21:50 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10569 >/dev/null 2>/dev/null selfserv_9709 with PID 10569 found at Mon Apr 25 14:21:50 UTC 2016 selfserv_9709 with PID 10569 started at Mon Apr 25 14:21:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1814: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10569 at Mon Apr 25 14:21:51 UTC 2016 kill -USR1 10569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10569 killed at Mon Apr 25 14:21:52 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10626 >/dev/null 2>/dev/null selfserv_9709 with PID 10626 found at Mon Apr 25 14:21:52 UTC 2016 selfserv_9709 with PID 10626 started at Mon Apr 25 14:21:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1815: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10626 at Mon Apr 25 14:21:53 UTC 2016 kill -USR1 10626 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10626 killed at Mon Apr 25 14:21:54 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10683 >/dev/null 2>/dev/null selfserv_9709 with PID 10683 found at Mon Apr 25 14:21:54 UTC 2016 selfserv_9709 with PID 10683 started at Mon Apr 25 14:21:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1816: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10683 at Mon Apr 25 14:21:55 UTC 2016 kill -USR1 10683 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10683 killed at Mon Apr 25 14:21:56 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:21:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10740 >/dev/null 2>/dev/null selfserv_9709 with PID 10740 found at Mon Apr 25 14:21:56 UTC 2016 selfserv_9709 with PID 10740 started at Mon Apr 25 14:21:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1817: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10740 at Mon Apr 25 14:21:57 UTC 2016 kill -USR1 10740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10740 killed at Mon Apr 25 14:21:58 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:21:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:21:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10797 >/dev/null 2>/dev/null selfserv_9709 with PID 10797 found at Mon Apr 25 14:21:58 UTC 2016 selfserv_9709 with PID 10797 started at Mon Apr 25 14:21:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1818: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10797 at Mon Apr 25 14:21:59 UTC 2016 kill -USR1 10797 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10797 killed at Mon Apr 25 14:22:00 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10869 >/dev/null 2>/dev/null selfserv_9709 with PID 10869 found at Mon Apr 25 14:22:00 UTC 2016 selfserv_9709 with PID 10869 started at Mon Apr 25 14:22:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1819: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10869 at Mon Apr 25 14:22:01 UTC 2016 kill -USR1 10869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10869 killed at Mon Apr 25 14:22:02 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10942 >/dev/null 2>/dev/null selfserv_9709 with PID 10942 found at Mon Apr 25 14:22:02 UTC 2016 selfserv_9709 with PID 10942 started at Mon Apr 25 14:22:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1820: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10942 at Mon Apr 25 14:22:04 UTC 2016 kill -USR1 10942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10942 killed at Mon Apr 25 14:22:04 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10999 >/dev/null 2>/dev/null selfserv_9709 with PID 10999 found at Mon Apr 25 14:22:04 UTC 2016 selfserv_9709 with PID 10999 started at Mon Apr 25 14:22:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1821: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10999 at Mon Apr 25 14:22:05 UTC 2016 kill -USR1 10999 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10999 killed at Mon Apr 25 14:22:06 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11057 >/dev/null 2>/dev/null selfserv_9709 with PID 11057 found at Mon Apr 25 14:22:06 UTC 2016 selfserv_9709 with PID 11057 started at Mon Apr 25 14:22:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1822: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11057 at Mon Apr 25 14:22:08 UTC 2016 kill -USR1 11057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11057 killed at Mon Apr 25 14:22:08 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11114 >/dev/null 2>/dev/null selfserv_9709 with PID 11114 found at Mon Apr 25 14:22:09 UTC 2016 selfserv_9709 with PID 11114 started at Mon Apr 25 14:22:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1823: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11114 at Mon Apr 25 14:22:09 UTC 2016 kill -USR1 11114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11114 killed at Mon Apr 25 14:22:10 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11171 >/dev/null 2>/dev/null selfserv_9709 with PID 11171 found at Mon Apr 25 14:22:10 UTC 2016 selfserv_9709 with PID 11171 started at Mon Apr 25 14:22:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1824: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11171 at Mon Apr 25 14:22:11 UTC 2016 kill -USR1 11171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11171 killed at Mon Apr 25 14:22:12 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11228 >/dev/null 2>/dev/null selfserv_9709 with PID 11228 found at Mon Apr 25 14:22:12 UTC 2016 selfserv_9709 with PID 11228 started at Mon Apr 25 14:22:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1825: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11228 at Mon Apr 25 14:22:13 UTC 2016 kill -USR1 11228 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11228 killed at Mon Apr 25 14:22:13 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11285 >/dev/null 2>/dev/null selfserv_9709 with PID 11285 found at Mon Apr 25 14:22:14 UTC 2016 selfserv_9709 with PID 11285 started at Mon Apr 25 14:22:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1826: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11285 at Mon Apr 25 14:22:15 UTC 2016 kill -USR1 11285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11285 killed at Mon Apr 25 14:22:15 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11342 >/dev/null 2>/dev/null selfserv_9709 with PID 11342 found at Mon Apr 25 14:22:16 UTC 2016 selfserv_9709 with PID 11342 started at Mon Apr 25 14:22:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1827: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11342 at Mon Apr 25 14:22:17 UTC 2016 kill -USR1 11342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11342 killed at Mon Apr 25 14:22:18 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11399 >/dev/null 2>/dev/null selfserv_9709 with PID 11399 found at Mon Apr 25 14:22:18 UTC 2016 selfserv_9709 with PID 11399 started at Mon Apr 25 14:22:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1828: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11399 at Mon Apr 25 14:22:20 UTC 2016 kill -USR1 11399 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11399 killed at Mon Apr 25 14:22:20 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11456 >/dev/null 2>/dev/null selfserv_9709 with PID 11456 found at Mon Apr 25 14:22:21 UTC 2016 selfserv_9709 with PID 11456 started at Mon Apr 25 14:22:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1829: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11456 at Mon Apr 25 14:22:22 UTC 2016 kill -USR1 11456 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11456 killed at Mon Apr 25 14:22:22 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11513 >/dev/null 2>/dev/null selfserv_9709 with PID 11513 found at Mon Apr 25 14:22:23 UTC 2016 selfserv_9709 with PID 11513 started at Mon Apr 25 14:22:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1830: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11513 at Mon Apr 25 14:22:24 UTC 2016 kill -USR1 11513 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11513 killed at Mon Apr 25 14:22:25 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11570 >/dev/null 2>/dev/null selfserv_9709 with PID 11570 found at Mon Apr 25 14:22:25 UTC 2016 selfserv_9709 with PID 11570 started at Mon Apr 25 14:22:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1831: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11570 at Mon Apr 25 14:22:26 UTC 2016 kill -USR1 11570 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11570 killed at Mon Apr 25 14:22:27 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11628 >/dev/null 2>/dev/null selfserv_9709 with PID 11628 found at Mon Apr 25 14:22:27 UTC 2016 selfserv_9709 with PID 11628 started at Mon Apr 25 14:22:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11628 at Mon Apr 25 14:22:29 UTC 2016 kill -USR1 11628 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11628 killed at Mon Apr 25 14:22:29 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11685 >/dev/null 2>/dev/null selfserv_9709 with PID 11685 found at Mon Apr 25 14:22:30 UTC 2016 selfserv_9709 with PID 11685 started at Mon Apr 25 14:22:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1833: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11685 at Mon Apr 25 14:22:31 UTC 2016 kill -USR1 11685 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11685 killed at Mon Apr 25 14:22:31 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11742 >/dev/null 2>/dev/null selfserv_9709 with PID 11742 found at Mon Apr 25 14:22:32 UTC 2016 selfserv_9709 with PID 11742 started at Mon Apr 25 14:22:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1834: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11742 at Mon Apr 25 14:22:33 UTC 2016 kill -USR1 11742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11742 killed at Mon Apr 25 14:22:34 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11799 >/dev/null 2>/dev/null selfserv_9709 with PID 11799 found at Mon Apr 25 14:22:34 UTC 2016 selfserv_9709 with PID 11799 started at Mon Apr 25 14:22:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1835: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11799 at Mon Apr 25 14:22:36 UTC 2016 kill -USR1 11799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11799 killed at Mon Apr 25 14:22:36 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11856 >/dev/null 2>/dev/null selfserv_9709 with PID 11856 found at Mon Apr 25 14:22:37 UTC 2016 selfserv_9709 with PID 11856 started at Mon Apr 25 14:22:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1836: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11856 at Mon Apr 25 14:22:38 UTC 2016 kill -USR1 11856 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11856 killed at Mon Apr 25 14:22:38 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:22:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11913 >/dev/null 2>/dev/null selfserv_9709 with PID 11913 found at Mon Apr 25 14:22:39 UTC 2016 selfserv_9709 with PID 11913 started at Mon Apr 25 14:22:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1837: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11913 at Mon Apr 25 14:22:40 UTC 2016 kill -USR1 11913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11913 killed at Mon Apr 25 14:22:40 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:22:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11970 >/dev/null 2>/dev/null selfserv_9709 with PID 11970 found at Mon Apr 25 14:22:41 UTC 2016 selfserv_9709 with PID 11970 started at Mon Apr 25 14:22:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1838: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11970 at Mon Apr 25 14:22:42 UTC 2016 kill -USR1 11970 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11970 killed at Mon Apr 25 14:22:42 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 14:22:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12048 >/dev/null 2>/dev/null selfserv_9709 with PID 12048 found at Mon Apr 25 14:22:43 UTC 2016 selfserv_9709 with PID 12048 started at Mon Apr 25 14:22:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1839: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12048 at Mon Apr 25 14:22:44 UTC 2016 kill -USR1 12048 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12048 killed at Mon Apr 25 14:22:44 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 14:22:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12112 >/dev/null 2>/dev/null selfserv_9709 with PID 12112 found at Mon Apr 25 14:22:45 UTC 2016 selfserv_9709 with PID 12112 started at Mon Apr 25 14:22:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1840: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12112 at Mon Apr 25 14:22:46 UTC 2016 kill -USR1 12112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12112 killed at Mon Apr 25 14:22:46 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 14:22:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12176 >/dev/null 2>/dev/null selfserv_9709 with PID 12176 found at Mon Apr 25 14:22:47 UTC 2016 selfserv_9709 with PID 12176 started at Mon Apr 25 14:22:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1841: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12176 at Mon Apr 25 14:22:47 UTC 2016 kill -USR1 12176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12176 killed at Mon Apr 25 14:22:48 UTC 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 14:22:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12239 >/dev/null 2>/dev/null selfserv_9709 with PID 12239 found at Mon Apr 25 14:22:48 UTC 2016 selfserv_9709 with PID 12239 started at Mon Apr 25 14:22:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1842: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12239 at Mon Apr 25 14:22:49 UTC 2016 kill -USR1 12239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12239 killed at Mon Apr 25 14:22:49 UTC 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9709 starting at Mon Apr 25 14:22:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12302 >/dev/null 2>/dev/null selfserv_9709 with PID 12302 found at Mon Apr 25 14:22:50 UTC 2016 selfserv_9709 with PID 12302 started at Mon Apr 25 14:22:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #1843: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12302 at Mon Apr 25 14:22:50 UTC 2016 kill -USR1 12302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12302 killed at Mon Apr 25 14:22:51 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 14:22:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12365 >/dev/null 2>/dev/null selfserv_9709 with PID 12365 found at Mon Apr 25 14:22:51 UTC 2016 selfserv_9709 with PID 12365 started at Mon Apr 25 14:22:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1844: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12365 at Mon Apr 25 14:22:52 UTC 2016 kill -USR1 12365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12365 killed at Mon Apr 25 14:22:53 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 14:22:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12428 >/dev/null 2>/dev/null selfserv_9709 with PID 12428 found at Mon Apr 25 14:22:53 UTC 2016 selfserv_9709 with PID 12428 started at Mon Apr 25 14:22:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1845: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12428 at Mon Apr 25 14:22:54 UTC 2016 kill -USR1 12428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12428 killed at Mon Apr 25 14:22:54 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9709 starting at Mon Apr 25 14:22:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12491 >/dev/null 2>/dev/null selfserv_9709 with PID 12491 found at Mon Apr 25 14:22:55 UTC 2016 selfserv_9709 with PID 12491 started at Mon Apr 25 14:22:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1846: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12491 at Mon Apr 25 14:22:56 UTC 2016 kill -USR1 12491 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12491 killed at Mon Apr 25 14:22:56 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9709 starting at Mon Apr 25 14:22:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12554 >/dev/null 2>/dev/null selfserv_9709 with PID 12554 found at Mon Apr 25 14:22:57 UTC 2016 selfserv_9709 with PID 12554 started at Mon Apr 25 14:22:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1847: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12554 at Mon Apr 25 14:22:57 UTC 2016 kill -USR1 12554 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12554 killed at Mon Apr 25 14:22:58 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 14:22:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12617 >/dev/null 2>/dev/null selfserv_9709 with PID 12617 found at Mon Apr 25 14:22:58 UTC 2016 selfserv_9709 with PID 12617 started at Mon Apr 25 14:22:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1848: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12617 at Mon Apr 25 14:22:59 UTC 2016 kill -USR1 12617 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12617 killed at Mon Apr 25 14:22:59 UTC 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client normal - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9709 starting at Mon Apr 25 14:22:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:22:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12666 >/dev/null 2>/dev/null selfserv_9709 with PID 12666 found at Mon Apr 25 14:23:00 UTC 2016 selfserv_9709 with PID 12666 started at Mon Apr 25 14:23:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 0 ssl.sh: #1849: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12666 at Mon Apr 25 14:23:01 UTC 2016 kill -USR1 12666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12666 killed at Mon Apr 25 14:23:01 UTC 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9709 starting at Mon Apr 25 14:23:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:23:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12720 >/dev/null 2>/dev/null selfserv_9709 with PID 12720 found at Mon Apr 25 14:23:02 UTC 2016 selfserv_9709 with PID 12720 started at Mon Apr 25 14:23:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 3 ssl.sh: #1850: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9709 with PID 12720 at Mon Apr 25 14:23:02 UTC 2016 kill -USR1 12720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12720 killed at Mon Apr 25 14:23:03 UTC 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9709 starting at Mon Apr 25 14:23:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:23:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12781 >/dev/null 2>/dev/null selfserv_9709 with PID 12781 found at Mon Apr 25 14:23:03 UTC 2016 selfserv_9709 with PID 12781 started at Mon Apr 25 14:23:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #1851: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 12781 at Mon Apr 25 14:23:04 UTC 2016 kill -USR1 12781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12781 killed at Mon Apr 25 14:23:05 UTC 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9709 starting at Mon Apr 25 14:23:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:23:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12830 >/dev/null 2>/dev/null selfserv_9709 with PID 12830 found at Mon Apr 25 14:23:05 UTC 2016 selfserv_9709 with PID 12830 started at Mon Apr 25 14:23:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #1852: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 12830 at Mon Apr 25 14:23:06 UTC 2016 kill -USR1 12830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12830 killed at Mon Apr 25 14:23:06 UTC 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9709 starting at Mon Apr 25 14:23:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:23:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12879 >/dev/null 2>/dev/null selfserv_9709 with PID 12879 found at Mon Apr 25 14:23:07 UTC 2016 selfserv_9709 with PID 12879 started at Mon Apr 25 14:23:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #1853: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 12879 at Mon Apr 25 14:23:07 UTC 2016 kill -USR1 12879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12879 killed at Mon Apr 25 14:23:08 UTC 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9709 starting at Mon Apr 25 14:23:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:23:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12929 >/dev/null 2>/dev/null selfserv_9709 with PID 12929 found at Mon Apr 25 14:23:08 UTC 2016 selfserv_9709 with PID 12929 started at Mon Apr 25 14:23:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #1854: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 12929 at Mon Apr 25 14:23:09 UTC 2016 kill -USR1 12929 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12929 killed at Mon Apr 25 14:23:09 UTC 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9709 starting at Mon Apr 25 14:23:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:23:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12978 >/dev/null 2>/dev/null selfserv_9709 with PID 12978 found at Mon Apr 25 14:23:10 UTC 2016 selfserv_9709 with PID 12978 started at Mon Apr 25 14:23:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #1855: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 12978 at Mon Apr 25 14:23:11 UTC 2016 kill -USR1 12978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12978 killed at Mon Apr 25 14:23:11 UTC 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9709 starting at Mon Apr 25 14:23:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:23:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13027 >/dev/null 2>/dev/null selfserv_9709 with PID 13027 found at Mon Apr 25 14:23:11 UTC 2016 selfserv_9709 with PID 13027 started at Mon Apr 25 14:23:11 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Mon Apr 25 14:23:11 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:25:03 UTC 2016 ssl.sh: #1856: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13027 at Mon Apr 25 14:25:03 UTC 2016 kill -USR1 13027 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13027 killed at Mon Apr 25 14:25:03 UTC 2016 ssl.sh: SSL Stress Test - server bypass/client normal - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 14:25:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13213 >/dev/null 2>/dev/null selfserv_9709 with PID 13213 found at Mon Apr 25 14:25:04 UTC 2016 selfserv_9709 with PID 13213 started at Mon Apr 25 14:25:04 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:25:05 UTC 2016 ssl.sh: #1857: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13213 at Mon Apr 25 14:25:05 UTC 2016 kill -USR1 13213 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13213 killed at Mon Apr 25 14:25:06 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 14:25:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13289 >/dev/null 2>/dev/null selfserv_9709 with PID 13289 found at Mon Apr 25 14:25:06 UTC 2016 selfserv_9709 with PID 13289 started at Mon Apr 25 14:25:06 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:25:08 UTC 2016 ssl.sh: #1858: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13289 at Mon Apr 25 14:25:08 UTC 2016 kill -USR1 13289 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13289 killed at Mon Apr 25 14:25:08 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 14:25:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13365 >/dev/null 2>/dev/null selfserv_9709 with PID 13365 found at Mon Apr 25 14:25:09 UTC 2016 selfserv_9709 with PID 13365 started at Mon Apr 25 14:25:09 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:25:10 UTC 2016 ssl.sh: #1859: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13365 at Mon Apr 25 14:25:10 UTC 2016 kill -USR1 13365 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13365 killed at Mon Apr 25 14:25:11 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:25:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13442 >/dev/null 2>/dev/null selfserv_9709 with PID 13442 found at Mon Apr 25 14:25:11 UTC 2016 selfserv_9709 with PID 13442 started at Mon Apr 25 14:25:11 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:11 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:25:13 UTC 2016 ssl.sh: #1860: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13442 at Mon Apr 25 14:25:13 UTC 2016 kill -USR1 13442 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13442 killed at Mon Apr 25 14:25:13 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 14:25:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13518 >/dev/null 2>/dev/null selfserv_9709 with PID 13518 found at Mon Apr 25 14:25:14 UTC 2016 selfserv_9709 with PID 13518 started at Mon Apr 25 14:25:14 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:25:15 UTC 2016 ssl.sh: #1861: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13518 at Mon Apr 25 14:25:15 UTC 2016 kill -USR1 13518 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13518 killed at Mon Apr 25 14:25:16 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 14:25:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13594 >/dev/null 2>/dev/null selfserv_9709 with PID 13594 found at Mon Apr 25 14:25:16 UTC 2016 selfserv_9709 with PID 13594 started at Mon Apr 25 14:25:16 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:25:18 UTC 2016 ssl.sh: #1862: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13594 at Mon Apr 25 14:25:18 UTC 2016 kill -USR1 13594 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13594 killed at Mon Apr 25 14:25:19 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 14:25:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13670 >/dev/null 2>/dev/null selfserv_9709 with PID 13670 found at Mon Apr 25 14:25:19 UTC 2016 selfserv_9709 with PID 13670 started at Mon Apr 25 14:25:19 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:25:21 UTC 2016 ssl.sh: #1863: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13670 at Mon Apr 25 14:25:21 UTC 2016 kill -USR1 13670 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13670 killed at Mon Apr 25 14:25:22 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9709 starting at Mon Apr 25 14:25:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13752 >/dev/null 2>/dev/null selfserv_9709 with PID 13752 found at Mon Apr 25 14:25:22 UTC 2016 selfserv_9709 with PID 13752 started at Mon Apr 25 14:25:22 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:25:24 UTC 2016 ssl.sh: #1864: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13752 at Mon Apr 25 14:25:24 UTC 2016 kill -USR1 13752 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13752 killed at Mon Apr 25 14:25:24 UTC 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:25:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13856 >/dev/null 2>/dev/null selfserv_9709 with PID 13856 found at Mon Apr 25 14:25:25 UTC 2016 selfserv_9709 with PID 13856 started at Mon Apr 25 14:25:25 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:25:29 UTC 2016 ssl.sh: #1865: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13856 at Mon Apr 25 14:25:29 UTC 2016 kill -USR1 13856 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13856 killed at Mon Apr 25 14:25:29 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:25:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13931 >/dev/null 2>/dev/null selfserv_9709 with PID 13931 found at Mon Apr 25 14:25:30 UTC 2016 selfserv_9709 with PID 13931 started at Mon Apr 25 14:25:30 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 100 -C c -V ssl3: -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:30 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:25:34 UTC 2016 ssl.sh: #1866: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13931 at Mon Apr 25 14:25:34 UTC 2016 kill -USR1 13931 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13931 killed at Mon Apr 25 14:25:34 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:25:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14007 >/dev/null 2>/dev/null selfserv_9709 with PID 14007 found at Mon Apr 25 14:25:35 UTC 2016 selfserv_9709 with PID 14007 started at Mon Apr 25 14:25:35 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:25:36 UTC 2016 ssl.sh: #1867: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14007 at Mon Apr 25 14:25:36 UTC 2016 kill -USR1 14007 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14007 killed at Mon Apr 25 14:25:36 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:25:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14083 >/dev/null 2>/dev/null selfserv_9709 with PID 14083 found at Mon Apr 25 14:25:37 UTC 2016 selfserv_9709 with PID 14083 started at Mon Apr 25 14:25:37 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:25:38 UTC 2016 ssl.sh: #1868: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14083 at Mon Apr 25 14:25:38 UTC 2016 kill -USR1 14083 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14083 killed at Mon Apr 25 14:25:38 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 14:25:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14159 >/dev/null 2>/dev/null selfserv_9709 with PID 14159 found at Mon Apr 25 14:25:39 UTC 2016 selfserv_9709 with PID 14159 started at Mon Apr 25 14:25:39 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:25:39 UTC 2016 ssl.sh: #1869: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14159 at Mon Apr 25 14:25:39 UTC 2016 kill -USR1 14159 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14159 killed at Mon Apr 25 14:25:40 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:25:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14235 >/dev/null 2>/dev/null selfserv_9709 with PID 14235 found at Mon Apr 25 14:25:40 UTC 2016 selfserv_9709 with PID 14235 started at Mon Apr 25 14:25:40 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:25:41 UTC 2016 ssl.sh: #1870: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14235 at Mon Apr 25 14:25:41 UTC 2016 kill -USR1 14235 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14235 killed at Mon Apr 25 14:25:42 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 14:25:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14311 >/dev/null 2>/dev/null selfserv_9709 with PID 14311 found at Mon Apr 25 14:25:42 UTC 2016 selfserv_9709 with PID 14311 started at Mon Apr 25 14:25:42 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:25:43 UTC 2016 ssl.sh: #1871: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14311 at Mon Apr 25 14:25:43 UTC 2016 kill -USR1 14311 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14311 killed at Mon Apr 25 14:25:44 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9709 starting at Mon Apr 25 14:25:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14393 >/dev/null 2>/dev/null selfserv_9709 with PID 14393 found at Mon Apr 25 14:25:44 UTC 2016 selfserv_9709 with PID 14393 started at Mon Apr 25 14:25:44 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:44 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:25:46 UTC 2016 ssl.sh: #1872: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14393 at Mon Apr 25 14:25:46 UTC 2016 kill -USR1 14393 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14393 killed at Mon Apr 25 14:25:47 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9709 starting at Mon Apr 25 14:25:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14475 >/dev/null 2>/dev/null selfserv_9709 with PID 14475 found at Mon Apr 25 14:25:47 UTC 2016 selfserv_9709 with PID 14475 started at Mon Apr 25 14:25:47 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:25:49 UTC 2016 ssl.sh: #1873: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14475 at Mon Apr 25 14:25:49 UTC 2016 kill -USR1 14475 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14475 killed at Mon Apr 25 14:25:49 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:25:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14572 >/dev/null 2>/dev/null selfserv_9709 with PID 14572 found at Mon Apr 25 14:25:50 UTC 2016 selfserv_9709 with PID 14572 started at Mon Apr 25 14:25:50 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:50 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:25:57 UTC 2016 ssl.sh: #1874: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14572 at Mon Apr 25 14:25:57 UTC 2016 kill -USR1 14572 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14572 killed at Mon Apr 25 14:25:57 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:25:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:25:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14648 >/dev/null 2>/dev/null selfserv_9709 with PID 14648 found at Mon Apr 25 14:25:58 UTC 2016 selfserv_9709 with PID 14648 started at Mon Apr 25 14:25:58 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:25:58 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:26:05 UTC 2016 ssl.sh: #1875: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14648 at Mon Apr 25 14:26:05 UTC 2016 kill -USR1 14648 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14648 killed at Mon Apr 25 14:26:06 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:26:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14739 >/dev/null 2>/dev/null selfserv_9709 with PID 14739 found at Mon Apr 25 14:26:06 UTC 2016 selfserv_9709 with PID 14739 started at Mon Apr 25 14:26:06 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:26:13 UTC 2016 ssl.sh: #1876: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14739 at Mon Apr 25 14:26:13 UTC 2016 kill -USR1 14739 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14739 killed at Mon Apr 25 14:26:14 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:26:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14815 >/dev/null 2>/dev/null selfserv_9709 with PID 14815 found at Mon Apr 25 14:26:14 UTC 2016 selfserv_9709 with PID 14815 started at Mon Apr 25 14:26:14 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:26:23 UTC 2016 ssl.sh: #1877: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14815 at Mon Apr 25 14:26:23 UTC 2016 kill -USR1 14815 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14815 killed at Mon Apr 25 14:26:24 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:26:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14891 >/dev/null 2>/dev/null selfserv_9709 with PID 14891 found at Mon Apr 25 14:26:24 UTC 2016 selfserv_9709 with PID 14891 started at Mon Apr 25 14:26:24 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:24 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:26:30 UTC 2016 ssl.sh: #1878: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14891 at Mon Apr 25 14:26:30 UTC 2016 kill -USR1 14891 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14891 killed at Mon Apr 25 14:26:31 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 14:26:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14966 >/dev/null 2>/dev/null selfserv_9709 with PID 14966 found at Mon Apr 25 14:26:31 UTC 2016 selfserv_9709 with PID 14966 started at Mon Apr 25 14:26:31 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:31 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:26:33 UTC 2016 ssl.sh: #1879: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14966 at Mon Apr 25 14:26:33 UTC 2016 kill -USR1 14966 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14966 killed at Mon Apr 25 14:26:33 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 14:26:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15043 >/dev/null 2>/dev/null selfserv_9709 with PID 15043 found at Mon Apr 25 14:26:34 UTC 2016 selfserv_9709 with PID 15043 started at Mon Apr 25 14:26:34 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:34 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:26:35 UTC 2016 ssl.sh: #1880: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15043 at Mon Apr 25 14:26:36 UTC 2016 kill -USR1 15043 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15043 killed at Mon Apr 25 14:26:36 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 14:26:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15119 >/dev/null 2>/dev/null selfserv_9709 with PID 15119 found at Mon Apr 25 14:26:36 UTC 2016 selfserv_9709 with PID 15119 started at Mon Apr 25 14:26:36 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:26:38 UTC 2016 ssl.sh: #1881: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15119 at Mon Apr 25 14:26:38 UTC 2016 kill -USR1 15119 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15119 killed at Mon Apr 25 14:26:38 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:26:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15195 >/dev/null 2>/dev/null selfserv_9709 with PID 15195 found at Mon Apr 25 14:26:39 UTC 2016 selfserv_9709 with PID 15195 started at Mon Apr 25 14:26:39 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:26:41 UTC 2016 ssl.sh: #1882: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15195 at Mon Apr 25 14:26:41 UTC 2016 kill -USR1 15195 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15195 killed at Mon Apr 25 14:26:41 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:26:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15271 >/dev/null 2>/dev/null selfserv_9709 with PID 15271 found at Mon Apr 25 14:26:42 UTC 2016 selfserv_9709 with PID 15271 started at Mon Apr 25 14:26:42 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:26:43 UTC 2016 ssl.sh: #1883: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15271 at Mon Apr 25 14:26:43 UTC 2016 kill -USR1 15271 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15271 killed at Mon Apr 25 14:26:43 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:26:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15368 >/dev/null 2>/dev/null selfserv_9709 with PID 15368 found at Mon Apr 25 14:26:44 UTC 2016 selfserv_9709 with PID 15368 started at Mon Apr 25 14:26:44 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:44 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 14:26:46 UTC 2016 ssl.sh: #1884: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15368 at Mon Apr 25 14:26:46 UTC 2016 kill -USR1 15368 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15368 killed at Mon Apr 25 14:26:47 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:26:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15443 >/dev/null 2>/dev/null selfserv_9709 with PID 15443 found at Mon Apr 25 14:26:47 UTC 2016 selfserv_9709 with PID 15443 started at Mon Apr 25 14:26:47 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:26:48 UTC 2016 ssl.sh: #1885: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15443 at Mon Apr 25 14:26:48 UTC 2016 kill -USR1 15443 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15443 killed at Mon Apr 25 14:26:48 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:26:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15519 >/dev/null 2>/dev/null selfserv_9709 with PID 15519 found at Mon Apr 25 14:26:49 UTC 2016 selfserv_9709 with PID 15519 started at Mon Apr 25 14:26:49 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 14:26:51 UTC 2016 ssl.sh: #1886: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15519 at Mon Apr 25 14:26:51 UTC 2016 kill -USR1 15519 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15519 killed at Mon Apr 25 14:26:52 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:26:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15594 >/dev/null 2>/dev/null selfserv_9709 with PID 15594 found at Mon Apr 25 14:26:52 UTC 2016 selfserv_9709 with PID 15594 started at Mon Apr 25 14:26:52 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 14:26:54 UTC 2016 ssl.sh: #1887: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15594 at Mon Apr 25 14:26:54 UTC 2016 kill -USR1 15594 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15594 killed at Mon Apr 25 14:26:55 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 14:26:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15670 >/dev/null 2>/dev/null selfserv_9709 with PID 15670 found at Mon Apr 25 14:26:55 UTC 2016 selfserv_9709 with PID 15670 started at Mon Apr 25 14:26:55 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:26:56 UTC 2016 ssl.sh: #1888: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15670 at Mon Apr 25 14:26:56 UTC 2016 kill -USR1 15670 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15670 killed at Mon Apr 25 14:26:57 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:26:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15746 >/dev/null 2>/dev/null selfserv_9709 with PID 15746 found at Mon Apr 25 14:26:57 UTC 2016 selfserv_9709 with PID 15746 started at Mon Apr 25 14:26:57 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:26:58 UTC 2016 ssl.sh: #1889: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15746 at Mon Apr 25 14:26:58 UTC 2016 kill -USR1 15746 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15746 killed at Mon Apr 25 14:26:59 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:26:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:26:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15843 >/dev/null 2>/dev/null selfserv_9709 with PID 15843 found at Mon Apr 25 14:26:59 UTC 2016 selfserv_9709 with PID 15843 started at Mon Apr 25 14:26:59 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:26:59 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:27:05 UTC 2016 ssl.sh: #1890: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15843 at Mon Apr 25 14:27:05 UTC 2016 kill -USR1 15843 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15843 killed at Mon Apr 25 14:27:05 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 14:27:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:27:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15935 >/dev/null 2>/dev/null selfserv_9709 with PID 15935 found at Mon Apr 25 14:27:06 UTC 2016 selfserv_9709 with PID 15935 started at Mon Apr 25 14:27:06 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 14:27:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:27:07 UTC 2016 ssl.sh: #1891: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15935 at Mon Apr 25 14:27:08 UTC 2016 kill -USR1 15935 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15935 killed at Mon Apr 25 14:27:08 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:27:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:27:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16011 >/dev/null 2>/dev/null selfserv_9709 with PID 16011 found at Mon Apr 25 14:27:08 UTC 2016 selfserv_9709 with PID 16011 started at Mon Apr 25 14:27:08 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:27:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:27:14 UTC 2016 ssl.sh: #1892: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16011 at Mon Apr 25 14:27:14 UTC 2016 kill -USR1 16011 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16011 killed at Mon Apr 25 14:27:14 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:27:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:27:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16087 >/dev/null 2>/dev/null selfserv_9709 with PID 16087 found at Mon Apr 25 14:27:15 UTC 2016 selfserv_9709 with PID 16087 started at Mon Apr 25 14:27:15 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:27:15 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:27:22 UTC 2016 ssl.sh: #1893: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16087 at Mon Apr 25 14:27:22 UTC 2016 kill -USR1 16087 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16087 killed at Mon Apr 25 14:27:23 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:27:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:27:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16176 >/dev/null 2>/dev/null selfserv_9709 with PID 16176 found at Mon Apr 25 14:27:23 UTC 2016 selfserv_9709 with PID 16176 started at Mon Apr 25 14:27:23 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:27:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:28:27 UTC 2016 ssl.sh: #1894: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16176 at Mon Apr 25 14:28:27 UTC 2016 kill -USR1 16176 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16176 killed at Mon Apr 25 14:28:27 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 14:28:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:28:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16285 >/dev/null 2>/dev/null selfserv_9709 with PID 16285 found at Mon Apr 25 14:28:28 UTC 2016 selfserv_9709 with PID 16285 started at Mon Apr 25 14:28:28 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:28:28 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:29:32 UTC 2016 ssl.sh: #1895: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16285 at Mon Apr 25 14:29:32 UTC 2016 kill -USR1 16285 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16285 killed at Mon Apr 25 14:29:33 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:29:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:29:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16380 >/dev/null 2>/dev/null selfserv_9709 with PID 16380 found at Mon Apr 25 14:29:33 UTC 2016 selfserv_9709 with PID 16380 started at Mon Apr 25 14:29:33 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:29:33 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:29:39 UTC 2016 ssl.sh: #1896: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16380 at Mon Apr 25 14:29:39 UTC 2016 kill -USR1 16380 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16380 killed at Mon Apr 25 14:29:39 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:29:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:29:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16456 >/dev/null 2>/dev/null selfserv_9709 with PID 16456 found at Mon Apr 25 14:29:40 UTC 2016 selfserv_9709 with PID 16456 started at Mon Apr 25 14:29:40 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:29:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:29:45 UTC 2016 ssl.sh: #1897: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16456 at Mon Apr 25 14:29:45 UTC 2016 kill -USR1 16456 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16456 killed at Mon Apr 25 14:29:46 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:29:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:29:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16552 >/dev/null 2>/dev/null selfserv_9709 with PID 16552 found at Mon Apr 25 14:29:46 UTC 2016 selfserv_9709 with PID 16552 started at Mon Apr 25 14:29:46 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 14:29:46 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:29:56 UTC 2016 ssl.sh: #1898: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16552 at Mon Apr 25 14:29:56 UTC 2016 kill -USR1 16552 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16552 killed at Mon Apr 25 14:29:57 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:29:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:29:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16627 >/dev/null 2>/dev/null selfserv_9709 with PID 16627 found at Mon Apr 25 14:29:57 UTC 2016 selfserv_9709 with PID 16627 started at Mon Apr 25 14:29:57 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 14:29:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:29:59 UTC 2016 ssl.sh: #1899: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16627 at Mon Apr 25 14:29:59 UTC 2016 kill -USR1 16627 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16627 killed at Mon Apr 25 14:30:00 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:30:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:30:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16718 >/dev/null 2>/dev/null selfserv_9709 with PID 16718 found at Mon Apr 25 14:30:00 UTC 2016 selfserv_9709 with PID 16718 started at Mon Apr 25 14:30:00 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 14:30:00 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:31:34 UTC 2016 ssl.sh: #1900: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16718 at Mon Apr 25 14:31:34 UTC 2016 kill -USR1 16718 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16718 killed at Mon Apr 25 14:31:35 UTC 2016 ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal - with ECC =============================== selfserv_9709 starting at Mon Apr 25 14:31:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:31:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:35 UTC 2016 selfserv_9709 with PID 16818 started at Mon Apr 25 14:31:35 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1901: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1902: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1903: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1904: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1905: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1906: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1907: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1908: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1909: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1910: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1911: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1912: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1913: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1914: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1915: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1916: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1917: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1918: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1919: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1920: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1921: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1922: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1923: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1924: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1925: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1926: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1927: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1928: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1929: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1930: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1931: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1932: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1933: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1934: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1935: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1936: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:31:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1937: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1938: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1939: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1940: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1941: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1942: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1943: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1944: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1945: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1946: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1947: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1948: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1949: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1950: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1951: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1952: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1953: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1954: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1955: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1956: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1957: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1958: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1959: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1960: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1961: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1962: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1963: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1964: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1965: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1966: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1967: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 16818 >/dev/null 2>/dev/null selfserv_9709 with PID 16818 found at Mon Apr 25 14:32:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1968: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 16818 at Mon Apr 25 14:32:23 UTC 2016 kill -USR1 16818 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16818 killed at Mon Apr 25 14:32:23 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:32:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:32:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 18735 >/dev/null 2>/dev/null selfserv_9709 with PID 18735 found at Mon Apr 25 14:32:24 UTC 2016 selfserv_9709 with PID 18735 started at Mon Apr 25 14:32:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1969: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18735 >/dev/null 2>/dev/null selfserv_9709 with PID 18735 found at Mon Apr 25 14:32:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1970: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18735 >/dev/null 2>/dev/null selfserv_9709 with PID 18735 found at Mon Apr 25 14:32:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1971: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18735 >/dev/null 2>/dev/null selfserv_9709 with PID 18735 found at Mon Apr 25 14:32:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1972: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18735 >/dev/null 2>/dev/null selfserv_9709 with PID 18735 found at Mon Apr 25 14:32:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1973: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 18735 at Mon Apr 25 14:32:27 UTC 2016 kill -USR1 18735 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 18735 killed at Mon Apr 25 14:32:27 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:32:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:32:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:28 UTC 2016 selfserv_9709 with PID 18883 started at Mon Apr 25 14:32:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1974: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1975: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1976: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1977: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1978: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1979: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1980: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1981: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1982: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1983: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1984: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1985: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1986: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1987: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18883 >/dev/null 2>/dev/null selfserv_9709 with PID 18883 found at Mon Apr 25 14:32:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1988: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 18883 at Mon Apr 25 14:32:39 UTC 2016 kill -USR1 18883 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 18883 killed at Mon Apr 25 14:32:39 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:32:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:32:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19268 >/dev/null 2>/dev/null selfserv_9709 with PID 19268 found at Mon Apr 25 14:32:40 UTC 2016 selfserv_9709 with PID 19268 started at Mon Apr 25 14:32:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1989: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 19268 >/dev/null 2>/dev/null selfserv_9709 with PID 19268 found at Mon Apr 25 14:32:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1990: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19268 >/dev/null 2>/dev/null selfserv_9709 with PID 19268 found at Mon Apr 25 14:32:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1991: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19268 >/dev/null 2>/dev/null selfserv_9709 with PID 19268 found at Mon Apr 25 14:32:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1992: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19268 >/dev/null 2>/dev/null selfserv_9709 with PID 19268 found at Mon Apr 25 14:32:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1993: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 19268 at Mon Apr 25 14:32:43 UTC 2016 kill -USR1 19268 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19268 killed at Mon Apr 25 14:32:43 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:32:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:32:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:44 UTC 2016 selfserv_9709 with PID 19417 started at Mon Apr 25 14:32:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1994: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1995: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1996: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1997: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1998: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1999: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2000: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2001: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2002: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2003: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2004: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2005: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2006: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2007: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19417 >/dev/null 2>/dev/null selfserv_9709 with PID 19417 found at Mon Apr 25 14:32:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2008: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 19417 at Mon Apr 25 14:32:55 UTC 2016 kill -USR1 19417 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19417 killed at Mon Apr 25 14:32:56 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:32:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:32:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19802 >/dev/null 2>/dev/null selfserv_9709 with PID 19802 found at Mon Apr 25 14:32:56 UTC 2016 selfserv_9709 with PID 19802 started at Mon Apr 25 14:32:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2009: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 19802 >/dev/null 2>/dev/null selfserv_9709 with PID 19802 found at Mon Apr 25 14:32:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2010: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19802 >/dev/null 2>/dev/null selfserv_9709 with PID 19802 found at Mon Apr 25 14:32:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2011: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19802 >/dev/null 2>/dev/null selfserv_9709 with PID 19802 found at Mon Apr 25 14:32:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2012: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19802 >/dev/null 2>/dev/null selfserv_9709 with PID 19802 found at Mon Apr 25 14:32:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2013: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 19802 at Mon Apr 25 14:32:59 UTC 2016 kill -USR1 19802 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19802 killed at Mon Apr 25 14:32:59 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:33:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:00 UTC 2016 selfserv_9709 with PID 19950 started at Mon Apr 25 14:33:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2014: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2015: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2016: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2017: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2018: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2019: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2020: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2021: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2022: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2023: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2024: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2025: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 19950 >/dev/null 2>/dev/null selfserv_9709 with PID 19950 found at Mon Apr 25 14:33:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2026: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19950 at Mon Apr 25 14:33:09 UTC 2016 kill -USR1 19950 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19950 killed at Mon Apr 25 14:33:10 UTC 2016 ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20350 >/dev/null 2>/dev/null selfserv_9709 with PID 20350 found at Mon Apr 25 14:33:10 UTC 2016 selfserv_9709 with PID 20350 started at Mon Apr 25 14:33:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2027: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20350 at Mon Apr 25 14:33:11 UTC 2016 kill -USR1 20350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20350 killed at Mon Apr 25 14:33:12 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:33:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20407 >/dev/null 2>/dev/null selfserv_9709 with PID 20407 found at Mon Apr 25 14:33:12 UTC 2016 selfserv_9709 with PID 20407 started at Mon Apr 25 14:33:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2028: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20407 at Mon Apr 25 14:33:13 UTC 2016 kill -USR1 20407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20407 killed at Mon Apr 25 14:33:13 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20464 >/dev/null 2>/dev/null selfserv_9709 with PID 20464 found at Mon Apr 25 14:33:14 UTC 2016 selfserv_9709 with PID 20464 started at Mon Apr 25 14:33:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2029: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20464 at Mon Apr 25 14:33:15 UTC 2016 kill -USR1 20464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20464 killed at Mon Apr 25 14:33:15 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20523 >/dev/null 2>/dev/null selfserv_9709 with PID 20523 found at Mon Apr 25 14:33:16 UTC 2016 selfserv_9709 with PID 20523 started at Mon Apr 25 14:33:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2030: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20523 at Mon Apr 25 14:33:17 UTC 2016 kill -USR1 20523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20523 killed at Mon Apr 25 14:33:17 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:33:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20580 >/dev/null 2>/dev/null selfserv_9709 with PID 20580 found at Mon Apr 25 14:33:18 UTC 2016 selfserv_9709 with PID 20580 started at Mon Apr 25 14:33:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2031: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20580 at Mon Apr 25 14:33:18 UTC 2016 kill -USR1 20580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20580 killed at Mon Apr 25 14:33:19 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20637 >/dev/null 2>/dev/null selfserv_9709 with PID 20637 found at Mon Apr 25 14:33:19 UTC 2016 selfserv_9709 with PID 20637 started at Mon Apr 25 14:33:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2032: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20637 at Mon Apr 25 14:33:20 UTC 2016 kill -USR1 20637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20637 killed at Mon Apr 25 14:33:21 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20694 >/dev/null 2>/dev/null selfserv_9709 with PID 20694 found at Mon Apr 25 14:33:21 UTC 2016 selfserv_9709 with PID 20694 started at Mon Apr 25 14:33:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2033: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20694 at Mon Apr 25 14:33:22 UTC 2016 kill -USR1 20694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20694 killed at Mon Apr 25 14:33:22 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:33:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20752 >/dev/null 2>/dev/null selfserv_9709 with PID 20752 found at Mon Apr 25 14:33:23 UTC 2016 selfserv_9709 with PID 20752 started at Mon Apr 25 14:33:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2034: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20752 at Mon Apr 25 14:33:24 UTC 2016 kill -USR1 20752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20752 killed at Mon Apr 25 14:33:24 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20810 >/dev/null 2>/dev/null selfserv_9709 with PID 20810 found at Mon Apr 25 14:33:25 UTC 2016 selfserv_9709 with PID 20810 started at Mon Apr 25 14:33:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2035: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20810 at Mon Apr 25 14:33:26 UTC 2016 kill -USR1 20810 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20810 killed at Mon Apr 25 14:33:26 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20867 >/dev/null 2>/dev/null selfserv_9709 with PID 20867 found at Mon Apr 25 14:33:27 UTC 2016 selfserv_9709 with PID 20867 started at Mon Apr 25 14:33:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2036: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20867 at Mon Apr 25 14:33:27 UTC 2016 kill -USR1 20867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20867 killed at Mon Apr 25 14:33:28 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:33:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20924 >/dev/null 2>/dev/null selfserv_9709 with PID 20924 found at Mon Apr 25 14:33:28 UTC 2016 selfserv_9709 with PID 20924 started at Mon Apr 25 14:33:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2037: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20924 at Mon Apr 25 14:33:29 UTC 2016 kill -USR1 20924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20924 killed at Mon Apr 25 14:33:29 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20981 >/dev/null 2>/dev/null selfserv_9709 with PID 20981 found at Mon Apr 25 14:33:30 UTC 2016 selfserv_9709 with PID 20981 started at Mon Apr 25 14:33:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2038: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20981 at Mon Apr 25 14:33:31 UTC 2016 kill -USR1 20981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20981 killed at Mon Apr 25 14:33:31 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21038 >/dev/null 2>/dev/null selfserv_9709 with PID 21038 found at Mon Apr 25 14:33:32 UTC 2016 selfserv_9709 with PID 21038 started at Mon Apr 25 14:33:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2039: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21038 at Mon Apr 25 14:33:33 UTC 2016 kill -USR1 21038 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21038 killed at Mon Apr 25 14:33:33 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:33:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21095 >/dev/null 2>/dev/null selfserv_9709 with PID 21095 found at Mon Apr 25 14:33:34 UTC 2016 selfserv_9709 with PID 21095 started at Mon Apr 25 14:33:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2040: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21095 at Mon Apr 25 14:33:35 UTC 2016 kill -USR1 21095 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21095 killed at Mon Apr 25 14:33:36 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21152 >/dev/null 2>/dev/null selfserv_9709 with PID 21152 found at Mon Apr 25 14:33:36 UTC 2016 selfserv_9709 with PID 21152 started at Mon Apr 25 14:33:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2041: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21152 at Mon Apr 25 14:33:37 UTC 2016 kill -USR1 21152 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21152 killed at Mon Apr 25 14:33:38 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21209 >/dev/null 2>/dev/null selfserv_9709 with PID 21209 found at Mon Apr 25 14:33:38 UTC 2016 selfserv_9709 with PID 21209 started at Mon Apr 25 14:33:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2042: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21209 at Mon Apr 25 14:33:39 UTC 2016 kill -USR1 21209 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21209 killed at Mon Apr 25 14:33:40 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:33:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21266 >/dev/null 2>/dev/null selfserv_9709 with PID 21266 found at Mon Apr 25 14:33:40 UTC 2016 selfserv_9709 with PID 21266 started at Mon Apr 25 14:33:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2043: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21266 at Mon Apr 25 14:33:41 UTC 2016 kill -USR1 21266 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21266 killed at Mon Apr 25 14:33:42 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21323 >/dev/null 2>/dev/null selfserv_9709 with PID 21323 found at Mon Apr 25 14:33:42 UTC 2016 selfserv_9709 with PID 21323 started at Mon Apr 25 14:33:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2044: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21323 at Mon Apr 25 14:33:43 UTC 2016 kill -USR1 21323 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21323 killed at Mon Apr 25 14:33:44 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21381 >/dev/null 2>/dev/null selfserv_9709 with PID 21381 found at Mon Apr 25 14:33:44 UTC 2016 selfserv_9709 with PID 21381 started at Mon Apr 25 14:33:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2045: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21381 at Mon Apr 25 14:33:45 UTC 2016 kill -USR1 21381 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21381 killed at Mon Apr 25 14:33:46 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:33:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21438 >/dev/null 2>/dev/null selfserv_9709 with PID 21438 found at Mon Apr 25 14:33:46 UTC 2016 selfserv_9709 with PID 21438 started at Mon Apr 25 14:33:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2046: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21438 at Mon Apr 25 14:33:48 UTC 2016 kill -USR1 21438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21438 killed at Mon Apr 25 14:33:48 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21495 >/dev/null 2>/dev/null selfserv_9709 with PID 21495 found at Mon Apr 25 14:33:48 UTC 2016 selfserv_9709 with PID 21495 started at Mon Apr 25 14:33:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2047: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21495 at Mon Apr 25 14:33:50 UTC 2016 kill -USR1 21495 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21495 killed at Mon Apr 25 14:33:50 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21552 >/dev/null 2>/dev/null selfserv_9709 with PID 21552 found at Mon Apr 25 14:33:51 UTC 2016 selfserv_9709 with PID 21552 started at Mon Apr 25 14:33:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2048: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21552 at Mon Apr 25 14:33:52 UTC 2016 kill -USR1 21552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21552 killed at Mon Apr 25 14:33:52 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:33:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21609 >/dev/null 2>/dev/null selfserv_9709 with PID 21609 found at Mon Apr 25 14:33:53 UTC 2016 selfserv_9709 with PID 21609 started at Mon Apr 25 14:33:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2049: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21609 at Mon Apr 25 14:33:54 UTC 2016 kill -USR1 21609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21609 killed at Mon Apr 25 14:33:54 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21666 >/dev/null 2>/dev/null selfserv_9709 with PID 21666 found at Mon Apr 25 14:33:55 UTC 2016 selfserv_9709 with PID 21666 started at Mon Apr 25 14:33:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2050: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21666 at Mon Apr 25 14:33:56 UTC 2016 kill -USR1 21666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21666 killed at Mon Apr 25 14:33:56 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:33:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21723 >/dev/null 2>/dev/null selfserv_9709 with PID 21723 found at Mon Apr 25 14:33:57 UTC 2016 selfserv_9709 with PID 21723 started at Mon Apr 25 14:33:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2051: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21723 at Mon Apr 25 14:33:58 UTC 2016 kill -USR1 21723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21723 killed at Mon Apr 25 14:33:58 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:33:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:33:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21780 >/dev/null 2>/dev/null selfserv_9709 with PID 21780 found at Mon Apr 25 14:33:59 UTC 2016 selfserv_9709 with PID 21780 started at Mon Apr 25 14:33:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2052: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21780 at Mon Apr 25 14:34:00 UTC 2016 kill -USR1 21780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21780 killed at Mon Apr 25 14:34:00 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21837 >/dev/null 2>/dev/null selfserv_9709 with PID 21837 found at Mon Apr 25 14:34:00 UTC 2016 selfserv_9709 with PID 21837 started at Mon Apr 25 14:34:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2053: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21837 at Mon Apr 25 14:34:02 UTC 2016 kill -USR1 21837 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21837 killed at Mon Apr 25 14:34:02 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21907 >/dev/null 2>/dev/null selfserv_9709 with PID 21907 found at Mon Apr 25 14:34:02 UTC 2016 selfserv_9709 with PID 21907 started at Mon Apr 25 14:34:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2054: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21907 at Mon Apr 25 14:34:03 UTC 2016 kill -USR1 21907 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21907 killed at Mon Apr 25 14:34:04 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21968 >/dev/null 2>/dev/null selfserv_9709 with PID 21968 found at Mon Apr 25 14:34:04 UTC 2016 selfserv_9709 with PID 21968 started at Mon Apr 25 14:34:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2055: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21968 at Mon Apr 25 14:34:05 UTC 2016 kill -USR1 21968 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21968 killed at Mon Apr 25 14:34:06 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22025 >/dev/null 2>/dev/null selfserv_9709 with PID 22025 found at Mon Apr 25 14:34:06 UTC 2016 selfserv_9709 with PID 22025 started at Mon Apr 25 14:34:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2056: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22025 at Mon Apr 25 14:34:07 UTC 2016 kill -USR1 22025 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22025 killed at Mon Apr 25 14:34:08 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22097 >/dev/null 2>/dev/null selfserv_9709 with PID 22097 found at Mon Apr 25 14:34:08 UTC 2016 selfserv_9709 with PID 22097 started at Mon Apr 25 14:34:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2057: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22097 at Mon Apr 25 14:34:09 UTC 2016 kill -USR1 22097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22097 killed at Mon Apr 25 14:34:10 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22154 >/dev/null 2>/dev/null selfserv_9709 with PID 22154 found at Mon Apr 25 14:34:10 UTC 2016 selfserv_9709 with PID 22154 started at Mon Apr 25 14:34:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2058: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22154 at Mon Apr 25 14:34:11 UTC 2016 kill -USR1 22154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22154 killed at Mon Apr 25 14:34:12 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22211 >/dev/null 2>/dev/null selfserv_9709 with PID 22211 found at Mon Apr 25 14:34:12 UTC 2016 selfserv_9709 with PID 22211 started at Mon Apr 25 14:34:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2059: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22211 at Mon Apr 25 14:34:13 UTC 2016 kill -USR1 22211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22211 killed at Mon Apr 25 14:34:14 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22268 >/dev/null 2>/dev/null selfserv_9709 with PID 22268 found at Mon Apr 25 14:34:14 UTC 2016 selfserv_9709 with PID 22268 started at Mon Apr 25 14:34:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2060: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22268 at Mon Apr 25 14:34:15 UTC 2016 kill -USR1 22268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22268 killed at Mon Apr 25 14:34:16 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22325 >/dev/null 2>/dev/null selfserv_9709 with PID 22325 found at Mon Apr 25 14:34:16 UTC 2016 selfserv_9709 with PID 22325 started at Mon Apr 25 14:34:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2061: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22325 at Mon Apr 25 14:34:17 UTC 2016 kill -USR1 22325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22325 killed at Mon Apr 25 14:34:18 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22382 >/dev/null 2>/dev/null selfserv_9709 with PID 22382 found at Mon Apr 25 14:34:18 UTC 2016 selfserv_9709 with PID 22382 started at Mon Apr 25 14:34:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2062: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22382 at Mon Apr 25 14:34:19 UTC 2016 kill -USR1 22382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22382 killed at Mon Apr 25 14:34:19 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22439 >/dev/null 2>/dev/null selfserv_9709 with PID 22439 found at Mon Apr 25 14:34:20 UTC 2016 selfserv_9709 with PID 22439 started at Mon Apr 25 14:34:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2063: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22439 at Mon Apr 25 14:34:21 UTC 2016 kill -USR1 22439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22439 killed at Mon Apr 25 14:34:21 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22496 >/dev/null 2>/dev/null selfserv_9709 with PID 22496 found at Mon Apr 25 14:34:22 UTC 2016 selfserv_9709 with PID 22496 started at Mon Apr 25 14:34:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2064: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22496 at Mon Apr 25 14:34:23 UTC 2016 kill -USR1 22496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22496 killed at Mon Apr 25 14:34:23 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22553 >/dev/null 2>/dev/null selfserv_9709 with PID 22553 found at Mon Apr 25 14:34:24 UTC 2016 selfserv_9709 with PID 22553 started at Mon Apr 25 14:34:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2065: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22553 at Mon Apr 25 14:34:25 UTC 2016 kill -USR1 22553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22553 killed at Mon Apr 25 14:34:25 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22611 >/dev/null 2>/dev/null selfserv_9709 with PID 22611 found at Mon Apr 25 14:34:26 UTC 2016 selfserv_9709 with PID 22611 started at Mon Apr 25 14:34:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2066: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22611 at Mon Apr 25 14:34:27 UTC 2016 kill -USR1 22611 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22611 killed at Mon Apr 25 14:34:27 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22668 >/dev/null 2>/dev/null selfserv_9709 with PID 22668 found at Mon Apr 25 14:34:28 UTC 2016 selfserv_9709 with PID 22668 started at Mon Apr 25 14:34:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2067: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22668 at Mon Apr 25 14:34:29 UTC 2016 kill -USR1 22668 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22668 killed at Mon Apr 25 14:34:29 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22725 >/dev/null 2>/dev/null selfserv_9709 with PID 22725 found at Mon Apr 25 14:34:30 UTC 2016 selfserv_9709 with PID 22725 started at Mon Apr 25 14:34:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2068: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22725 at Mon Apr 25 14:34:31 UTC 2016 kill -USR1 22725 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22725 killed at Mon Apr 25 14:34:32 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22782 >/dev/null 2>/dev/null selfserv_9709 with PID 22782 found at Mon Apr 25 14:34:32 UTC 2016 selfserv_9709 with PID 22782 started at Mon Apr 25 14:34:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2069: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22782 at Mon Apr 25 14:34:33 UTC 2016 kill -USR1 22782 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22782 killed at Mon Apr 25 14:34:34 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22839 >/dev/null 2>/dev/null selfserv_9709 with PID 22839 found at Mon Apr 25 14:34:34 UTC 2016 selfserv_9709 with PID 22839 started at Mon Apr 25 14:34:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2070: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22839 at Mon Apr 25 14:34:36 UTC 2016 kill -USR1 22839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22839 killed at Mon Apr 25 14:34:36 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22896 >/dev/null 2>/dev/null selfserv_9709 with PID 22896 found at Mon Apr 25 14:34:37 UTC 2016 selfserv_9709 with PID 22896 started at Mon Apr 25 14:34:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2071: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22896 at Mon Apr 25 14:34:38 UTC 2016 kill -USR1 22896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22896 killed at Mon Apr 25 14:34:38 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22953 >/dev/null 2>/dev/null selfserv_9709 with PID 22953 found at Mon Apr 25 14:34:39 UTC 2016 selfserv_9709 with PID 22953 started at Mon Apr 25 14:34:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2072: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22953 at Mon Apr 25 14:34:40 UTC 2016 kill -USR1 22953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22953 killed at Mon Apr 25 14:34:40 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23010 >/dev/null 2>/dev/null selfserv_9709 with PID 23010 found at Mon Apr 25 14:34:41 UTC 2016 selfserv_9709 with PID 23010 started at Mon Apr 25 14:34:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2073: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23010 at Mon Apr 25 14:34:42 UTC 2016 kill -USR1 23010 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23010 killed at Mon Apr 25 14:34:42 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23067 >/dev/null 2>/dev/null selfserv_9709 with PID 23067 found at Mon Apr 25 14:34:43 UTC 2016 selfserv_9709 with PID 23067 started at Mon Apr 25 14:34:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2074: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23067 at Mon Apr 25 14:34:44 UTC 2016 kill -USR1 23067 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23067 killed at Mon Apr 25 14:34:44 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:34:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23124 >/dev/null 2>/dev/null selfserv_9709 with PID 23124 found at Mon Apr 25 14:34:45 UTC 2016 selfserv_9709 with PID 23124 started at Mon Apr 25 14:34:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2075: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 23124 at Mon Apr 25 14:34:46 UTC 2016 kill -USR1 23124 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23124 killed at Mon Apr 25 14:34:46 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:34:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23182 >/dev/null 2>/dev/null selfserv_9709 with PID 23182 found at Mon Apr 25 14:34:47 UTC 2016 selfserv_9709 with PID 23182 started at Mon Apr 25 14:34:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2076: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23182 at Mon Apr 25 14:34:48 UTC 2016 kill -USR1 23182 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23182 killed at Mon Apr 25 14:34:48 UTC 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client normal - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 14:34:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23353 >/dev/null 2>/dev/null selfserv_9709 with PID 23353 found at Mon Apr 25 14:34:49 UTC 2016 selfserv_9709 with PID 23353 started at Mon Apr 25 14:34:49 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 14:34:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:34:51 UTC 2016 ssl.sh: #2077: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23353 at Mon Apr 25 14:34:51 UTC 2016 kill -USR1 23353 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23353 killed at Mon Apr 25 14:34:51 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 14:34:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23429 >/dev/null 2>/dev/null selfserv_9709 with PID 23429 found at Mon Apr 25 14:34:52 UTC 2016 selfserv_9709 with PID 23429 started at Mon Apr 25 14:34:52 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 14:34:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:34:53 UTC 2016 ssl.sh: #2078: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23429 at Mon Apr 25 14:34:53 UTC 2016 kill -USR1 23429 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23429 killed at Mon Apr 25 14:34:54 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 14:34:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23505 >/dev/null 2>/dev/null selfserv_9709 with PID 23505 found at Mon Apr 25 14:34:54 UTC 2016 selfserv_9709 with PID 23505 started at Mon Apr 25 14:34:54 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:34:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:34:56 UTC 2016 ssl.sh: #2079: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23505 at Mon Apr 25 14:34:56 UTC 2016 kill -USR1 23505 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23505 killed at Mon Apr 25 14:34:56 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:34:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23581 >/dev/null 2>/dev/null selfserv_9709 with PID 23581 found at Mon Apr 25 14:34:57 UTC 2016 selfserv_9709 with PID 23581 started at Mon Apr 25 14:34:57 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:34:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:34:58 UTC 2016 ssl.sh: #2080: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23581 at Mon Apr 25 14:34:58 UTC 2016 kill -USR1 23581 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23581 killed at Mon Apr 25 14:34:59 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 14:34:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:34:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23657 >/dev/null 2>/dev/null selfserv_9709 with PID 23657 found at Mon Apr 25 14:34:59 UTC 2016 selfserv_9709 with PID 23657 started at Mon Apr 25 14:34:59 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:34:59 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:35:01 UTC 2016 ssl.sh: #2081: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23657 at Mon Apr 25 14:35:01 UTC 2016 kill -USR1 23657 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23657 killed at Mon Apr 25 14:35:02 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 14:35:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23748 >/dev/null 2>/dev/null selfserv_9709 with PID 23748 found at Mon Apr 25 14:35:02 UTC 2016 selfserv_9709 with PID 23748 started at Mon Apr 25 14:35:02 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:02 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:35:04 UTC 2016 ssl.sh: #2082: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23748 at Mon Apr 25 14:35:04 UTC 2016 kill -USR1 23748 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23748 killed at Mon Apr 25 14:35:05 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 14:35:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23827 >/dev/null 2>/dev/null selfserv_9709 with PID 23827 found at Mon Apr 25 14:35:05 UTC 2016 selfserv_9709 with PID 23827 started at Mon Apr 25 14:35:05 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:05 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:35:07 UTC 2016 ssl.sh: #2083: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23827 at Mon Apr 25 14:35:07 UTC 2016 kill -USR1 23827 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23827 killed at Mon Apr 25 14:35:08 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:35:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23933 >/dev/null 2>/dev/null selfserv_9709 with PID 23933 found at Mon Apr 25 14:35:08 UTC 2016 selfserv_9709 with PID 23933 started at Mon Apr 25 14:35:08 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:35:13 UTC 2016 ssl.sh: #2084: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23933 at Mon Apr 25 14:35:13 UTC 2016 kill -USR1 23933 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23933 killed at Mon Apr 25 14:35:13 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:35:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24008 >/dev/null 2>/dev/null selfserv_9709 with PID 24008 found at Mon Apr 25 14:35:14 UTC 2016 selfserv_9709 with PID 24008 started at Mon Apr 25 14:35:14 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 100 -C c -V ssl3: -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:35:18 UTC 2016 ssl.sh: #2085: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24008 at Mon Apr 25 14:35:18 UTC 2016 kill -USR1 24008 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24008 killed at Mon Apr 25 14:35:19 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:35:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24083 >/dev/null 2>/dev/null selfserv_9709 with PID 24083 found at Mon Apr 25 14:35:19 UTC 2016 selfserv_9709 with PID 24083 started at Mon Apr 25 14:35:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:35:20 UTC 2016 ssl.sh: #2086: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24083 at Mon Apr 25 14:35:20 UTC 2016 kill -USR1 24083 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24083 killed at Mon Apr 25 14:35:20 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:35:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24159 >/dev/null 2>/dev/null selfserv_9709 with PID 24159 found at Mon Apr 25 14:35:21 UTC 2016 selfserv_9709 with PID 24159 started at Mon Apr 25 14:35:21 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:21 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:35:22 UTC 2016 ssl.sh: #2087: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24159 at Mon Apr 25 14:35:22 UTC 2016 kill -USR1 24159 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24159 killed at Mon Apr 25 14:35:22 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 14:35:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24235 >/dev/null 2>/dev/null selfserv_9709 with PID 24235 found at Mon Apr 25 14:35:23 UTC 2016 selfserv_9709 with PID 24235 started at Mon Apr 25 14:35:23 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:35:24 UTC 2016 ssl.sh: #2088: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24235 at Mon Apr 25 14:35:24 UTC 2016 kill -USR1 24235 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24235 killed at Mon Apr 25 14:35:24 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:35:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24311 >/dev/null 2>/dev/null selfserv_9709 with PID 24311 found at Mon Apr 25 14:35:25 UTC 2016 selfserv_9709 with PID 24311 started at Mon Apr 25 14:35:25 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:35:26 UTC 2016 ssl.sh: #2089: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24311 at Mon Apr 25 14:35:26 UTC 2016 kill -USR1 24311 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24311 killed at Mon Apr 25 14:35:26 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 14:35:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24388 >/dev/null 2>/dev/null selfserv_9709 with PID 24388 found at Mon Apr 25 14:35:27 UTC 2016 selfserv_9709 with PID 24388 started at Mon Apr 25 14:35:27 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:35:28 UTC 2016 ssl.sh: #2090: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24388 at Mon Apr 25 14:35:28 UTC 2016 kill -USR1 24388 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24388 killed at Mon Apr 25 14:35:28 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:35:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24493 >/dev/null 2>/dev/null selfserv_9709 with PID 24493 found at Mon Apr 25 14:35:29 UTC 2016 selfserv_9709 with PID 24493 started at Mon Apr 25 14:35:29 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:35:39 UTC 2016 ssl.sh: #2091: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24493 at Mon Apr 25 14:35:39 UTC 2016 kill -USR1 24493 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24493 killed at Mon Apr 25 14:35:39 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:35:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24568 >/dev/null 2>/dev/null selfserv_9709 with PID 24568 found at Mon Apr 25 14:35:40 UTC 2016 selfserv_9709 with PID 24568 started at Mon Apr 25 14:35:40 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:35:50 UTC 2016 ssl.sh: #2092: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24568 at Mon Apr 25 14:35:50 UTC 2016 kill -USR1 24568 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24568 killed at Mon Apr 25 14:35:50 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:35:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:35:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24644 >/dev/null 2>/dev/null selfserv_9709 with PID 24644 found at Mon Apr 25 14:35:51 UTC 2016 selfserv_9709 with PID 24644 started at Mon Apr 25 14:35:51 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:35:51 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:36:01 UTC 2016 ssl.sh: #2093: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24644 at Mon Apr 25 14:36:01 UTC 2016 kill -USR1 24644 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24644 killed at Mon Apr 25 14:36:02 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:36:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24733 >/dev/null 2>/dev/null selfserv_9709 with PID 24733 found at Mon Apr 25 14:36:02 UTC 2016 selfserv_9709 with PID 24733 started at Mon Apr 25 14:36:02 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:02 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:36:12 UTC 2016 ssl.sh: #2094: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24733 at Mon Apr 25 14:36:12 UTC 2016 kill -USR1 24733 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24733 killed at Mon Apr 25 14:36:13 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:36:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24812 >/dev/null 2>/dev/null selfserv_9709 with PID 24812 found at Mon Apr 25 14:36:13 UTC 2016 selfserv_9709 with PID 24812 started at Mon Apr 25 14:36:13 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:13 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:36:15 UTC 2016 ssl.sh: #2095: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24812 at Mon Apr 25 14:36:15 UTC 2016 kill -USR1 24812 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24812 killed at Mon Apr 25 14:36:15 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 14:36:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24887 >/dev/null 2>/dev/null selfserv_9709 with PID 24887 found at Mon Apr 25 14:36:16 UTC 2016 selfserv_9709 with PID 24887 started at Mon Apr 25 14:36:16 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:36:18 UTC 2016 ssl.sh: #2096: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24887 at Mon Apr 25 14:36:18 UTC 2016 kill -USR1 24887 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24887 killed at Mon Apr 25 14:36:18 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 14:36:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24963 >/dev/null 2>/dev/null selfserv_9709 with PID 24963 found at Mon Apr 25 14:36:19 UTC 2016 selfserv_9709 with PID 24963 started at Mon Apr 25 14:36:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:36:20 UTC 2016 ssl.sh: #2097: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24963 at Mon Apr 25 14:36:20 UTC 2016 kill -USR1 24963 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24963 killed at Mon Apr 25 14:36:21 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 14:36:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25039 >/dev/null 2>/dev/null selfserv_9709 with PID 25039 found at Mon Apr 25 14:36:21 UTC 2016 selfserv_9709 with PID 25039 started at Mon Apr 25 14:36:21 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:21 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:36:23 UTC 2016 ssl.sh: #2098: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25039 at Mon Apr 25 14:36:23 UTC 2016 kill -USR1 25039 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25039 killed at Mon Apr 25 14:36:23 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:36:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25115 >/dev/null 2>/dev/null selfserv_9709 with PID 25115 found at Mon Apr 25 14:36:24 UTC 2016 selfserv_9709 with PID 25115 started at Mon Apr 25 14:36:24 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:24 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:36:26 UTC 2016 ssl.sh: #2099: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25115 at Mon Apr 25 14:36:26 UTC 2016 kill -USR1 25115 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25115 killed at Mon Apr 25 14:36:26 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:36:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25191 >/dev/null 2>/dev/null selfserv_9709 with PID 25191 found at Mon Apr 25 14:36:27 UTC 2016 selfserv_9709 with PID 25191 started at Mon Apr 25 14:36:27 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:36:28 UTC 2016 ssl.sh: #2100: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25191 at Mon Apr 25 14:36:28 UTC 2016 kill -USR1 25191 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25191 killed at Mon Apr 25 14:36:28 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:36:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25289 >/dev/null 2>/dev/null selfserv_9709 with PID 25289 found at Mon Apr 25 14:36:29 UTC 2016 selfserv_9709 with PID 25289 started at Mon Apr 25 14:36:29 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 14:36:31 UTC 2016 ssl.sh: #2101: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25289 at Mon Apr 25 14:36:32 UTC 2016 kill -USR1 25289 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25289 killed at Mon Apr 25 14:36:32 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:36:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25364 >/dev/null 2>/dev/null selfserv_9709 with PID 25364 found at Mon Apr 25 14:36:32 UTC 2016 selfserv_9709 with PID 25364 started at Mon Apr 25 14:36:32 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:36:33 UTC 2016 ssl.sh: #2102: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25364 at Mon Apr 25 14:36:34 UTC 2016 kill -USR1 25364 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25364 killed at Mon Apr 25 14:36:34 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:36:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25440 >/dev/null 2>/dev/null selfserv_9709 with PID 25440 found at Mon Apr 25 14:36:34 UTC 2016 selfserv_9709 with PID 25440 started at Mon Apr 25 14:36:34 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 14:36:37 UTC 2016 ssl.sh: #2103: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25440 at Mon Apr 25 14:36:37 UTC 2016 kill -USR1 25440 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25440 killed at Mon Apr 25 14:36:38 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:36:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25515 >/dev/null 2>/dev/null selfserv_9709 with PID 25515 found at Mon Apr 25 14:36:38 UTC 2016 selfserv_9709 with PID 25515 started at Mon Apr 25 14:36:38 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:38 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 14:36:39 UTC 2016 ssl.sh: #2104: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25515 at Mon Apr 25 14:36:39 UTC 2016 kill -USR1 25515 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25515 killed at Mon Apr 25 14:36:39 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 14:36:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25591 >/dev/null 2>/dev/null selfserv_9709 with PID 25591 found at Mon Apr 25 14:36:40 UTC 2016 selfserv_9709 with PID 25591 started at Mon Apr 25 14:36:40 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:36:41 UTC 2016 ssl.sh: #2105: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25591 at Mon Apr 25 14:36:41 UTC 2016 kill -USR1 25591 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25591 killed at Mon Apr 25 14:36:42 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:36:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25667 >/dev/null 2>/dev/null selfserv_9709 with PID 25667 found at Mon Apr 25 14:36:42 UTC 2016 selfserv_9709 with PID 25667 started at Mon Apr 25 14:36:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:36:43 UTC 2016 ssl.sh: #2106: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25667 at Mon Apr 25 14:36:43 UTC 2016 kill -USR1 25667 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25667 killed at Mon Apr 25 14:36:44 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:36:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25764 >/dev/null 2>/dev/null selfserv_9709 with PID 25764 found at Mon Apr 25 14:36:44 UTC 2016 selfserv_9709 with PID 25764 started at Mon Apr 25 14:36:44 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:44 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:36:50 UTC 2016 ssl.sh: #2107: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25764 at Mon Apr 25 14:36:50 UTC 2016 kill -USR1 25764 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25764 killed at Mon Apr 25 14:36:51 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 14:36:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25840 >/dev/null 2>/dev/null selfserv_9709 with PID 25840 found at Mon Apr 25 14:36:51 UTC 2016 selfserv_9709 with PID 25840 started at Mon Apr 25 14:36:51 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:51 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:36:53 UTC 2016 ssl.sh: #2108: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25840 at Mon Apr 25 14:36:53 UTC 2016 kill -USR1 25840 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25840 killed at Mon Apr 25 14:36:53 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:36:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:36:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25916 >/dev/null 2>/dev/null selfserv_9709 with PID 25916 found at Mon Apr 25 14:36:54 UTC 2016 selfserv_9709 with PID 25916 started at Mon Apr 25 14:36:54 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:36:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:36:59 UTC 2016 ssl.sh: #2109: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25916 at Mon Apr 25 14:36:59 UTC 2016 kill -USR1 25916 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25916 killed at Mon Apr 25 14:37:00 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:37:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:37:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25991 >/dev/null 2>/dev/null selfserv_9709 with PID 25991 found at Mon Apr 25 14:37:00 UTC 2016 selfserv_9709 with PID 25991 started at Mon Apr 25 14:37:00 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:37:00 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:37:10 UTC 2016 ssl.sh: #2110: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25991 at Mon Apr 25 14:37:10 UTC 2016 kill -USR1 25991 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25991 killed at Mon Apr 25 14:37:10 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:37:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:37:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26097 >/dev/null 2>/dev/null selfserv_9709 with PID 26097 found at Mon Apr 25 14:37:11 UTC 2016 selfserv_9709 with PID 26097 started at Mon Apr 25 14:37:11 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:37:11 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:38:41 UTC 2016 ssl.sh: #2111: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26097 at Mon Apr 25 14:38:41 UTC 2016 kill -USR1 26097 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26097 killed at Mon Apr 25 14:38:41 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 14:38:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:38:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26208 >/dev/null 2>/dev/null selfserv_9709 with PID 26208 found at Mon Apr 25 14:38:42 UTC 2016 selfserv_9709 with PID 26208 started at Mon Apr 25 14:38:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:38:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:40:11 UTC 2016 ssl.sh: #2112: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26208 at Mon Apr 25 14:40:11 UTC 2016 kill -USR1 26208 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26208 killed at Mon Apr 25 14:40:12 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:40:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:40:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26323 >/dev/null 2>/dev/null selfserv_9709 with PID 26323 found at Mon Apr 25 14:40:12 UTC 2016 selfserv_9709 with PID 26323 started at Mon Apr 25 14:40:12 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:40:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:40:18 UTC 2016 ssl.sh: #2113: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26323 at Mon Apr 25 14:40:18 UTC 2016 kill -USR1 26323 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26323 killed at Mon Apr 25 14:40:18 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:40:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:40:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26399 >/dev/null 2>/dev/null selfserv_9709 with PID 26399 found at Mon Apr 25 14:40:19 UTC 2016 selfserv_9709 with PID 26399 started at Mon Apr 25 14:40:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:40:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:40:25 UTC 2016 ssl.sh: #2114: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26399 at Mon Apr 25 14:40:25 UTC 2016 kill -USR1 26399 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26399 killed at Mon Apr 25 14:40:25 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:40:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:40:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26495 >/dev/null 2>/dev/null selfserv_9709 with PID 26495 found at Mon Apr 25 14:40:26 UTC 2016 selfserv_9709 with PID 26495 started at Mon Apr 25 14:40:26 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 14:40:26 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:40:41 UTC 2016 ssl.sh: #2115: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26495 at Mon Apr 25 14:40:41 UTC 2016 kill -USR1 26495 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26495 killed at Mon Apr 25 14:40:42 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:40:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:40:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26571 >/dev/null 2>/dev/null selfserv_9709 with PID 26571 found at Mon Apr 25 14:40:42 UTC 2016 selfserv_9709 with PID 26571 started at Mon Apr 25 14:40:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 14:40:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:40:44 UTC 2016 ssl.sh: #2116: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26571 at Mon Apr 25 14:40:44 UTC 2016 kill -USR1 26571 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26571 killed at Mon Apr 25 14:40:45 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:40:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:40:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26661 >/dev/null 2>/dev/null selfserv_9709 with PID 26661 found at Mon Apr 25 14:40:45 UTC 2016 selfserv_9709 with PID 26661 started at Mon Apr 25 14:40:45 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 14:40:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:43:10 UTC 2016 ssl.sh: #2117: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26661 at Mon Apr 25 14:43:11 UTC 2016 kill -USR1 26661 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26661 killed at Mon Apr 25 14:43:11 UTC 2016 ssl.sh: SSL Cipher Coverage - server normal/client bypass - with ECC =============================== selfserv_9709 starting at Mon Apr 25 14:43:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:43:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:11 UTC 2016 selfserv_9709 with PID 26791 started at Mon Apr 25 14:43:11 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2118: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2119: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2120: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2121: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2122: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2123: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2124: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2125: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2126: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2127: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2128: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2129: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2130: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2131: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2132: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2133: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2134: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2135: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2136: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2137: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2138: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2139: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2140: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2141: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2142: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2143: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2144: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2145: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2146: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2147: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2148: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2149: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2150: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2151: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2152: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2153: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2154: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2155: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2156: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2157: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2158: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2159: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2160: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2161: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2162: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2163: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2164: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2165: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2166: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2167: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2168: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2169: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2170: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2171: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2172: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2173: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2174: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2175: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2176: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2177: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2178: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2179: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2180: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2181: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2182: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2183: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2184: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26791 >/dev/null 2>/dev/null selfserv_9709 with PID 26791 found at Mon Apr 25 14:43:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2185: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 26791 at Mon Apr 25 14:43:58 UTC 2016 kill -USR1 26791 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26791 killed at Mon Apr 25 14:43:59 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:43:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:43:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28693 >/dev/null 2>/dev/null selfserv_9709 with PID 28693 found at Mon Apr 25 14:43:59 UTC 2016 selfserv_9709 with PID 28693 started at Mon Apr 25 14:43:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2186: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28693 >/dev/null 2>/dev/null selfserv_9709 with PID 28693 found at Mon Apr 25 14:44:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2187: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28693 >/dev/null 2>/dev/null selfserv_9709 with PID 28693 found at Mon Apr 25 14:44:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2188: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28693 >/dev/null 2>/dev/null selfserv_9709 with PID 28693 found at Mon Apr 25 14:44:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2189: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28693 >/dev/null 2>/dev/null selfserv_9709 with PID 28693 found at Mon Apr 25 14:44:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2190: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 28693 at Mon Apr 25 14:44:03 UTC 2016 kill -USR1 28693 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28693 killed at Mon Apr 25 14:44:03 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:44:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:04 UTC 2016 selfserv_9709 with PID 28855 started at Mon Apr 25 14:44:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2191: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2192: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2193: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2194: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2195: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2196: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2197: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2198: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2199: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2200: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2201: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2202: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2203: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2204: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28855 >/dev/null 2>/dev/null selfserv_9709 with PID 28855 found at Mon Apr 25 14:44:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2205: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 28855 at Mon Apr 25 14:44:15 UTC 2016 kill -USR1 28855 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28855 killed at Mon Apr 25 14:44:15 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:44:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29243 >/dev/null 2>/dev/null selfserv_9709 with PID 29243 found at Mon Apr 25 14:44:15 UTC 2016 selfserv_9709 with PID 29243 started at Mon Apr 25 14:44:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2206: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29243 >/dev/null 2>/dev/null selfserv_9709 with PID 29243 found at Mon Apr 25 14:44:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2207: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29243 >/dev/null 2>/dev/null selfserv_9709 with PID 29243 found at Mon Apr 25 14:44:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2208: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29243 >/dev/null 2>/dev/null selfserv_9709 with PID 29243 found at Mon Apr 25 14:44:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2209: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29243 >/dev/null 2>/dev/null selfserv_9709 with PID 29243 found at Mon Apr 25 14:44:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2210: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 29243 at Mon Apr 25 14:44:19 UTC 2016 kill -USR1 29243 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29243 killed at Mon Apr 25 14:44:19 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:44:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:20 UTC 2016 selfserv_9709 with PID 29392 started at Mon Apr 25 14:44:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2211: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2212: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2213: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2214: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2215: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2216: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2217: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2218: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2219: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2220: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2221: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2222: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2223: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2224: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29392 >/dev/null 2>/dev/null selfserv_9709 with PID 29392 found at Mon Apr 25 14:44:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2225: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 29392 at Mon Apr 25 14:44:31 UTC 2016 kill -USR1 29392 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29392 killed at Mon Apr 25 14:44:31 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:44:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29777 >/dev/null 2>/dev/null selfserv_9709 with PID 29777 found at Mon Apr 25 14:44:32 UTC 2016 selfserv_9709 with PID 29777 started at Mon Apr 25 14:44:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2226: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29777 >/dev/null 2>/dev/null selfserv_9709 with PID 29777 found at Mon Apr 25 14:44:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2227: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29777 >/dev/null 2>/dev/null selfserv_9709 with PID 29777 found at Mon Apr 25 14:44:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2228: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29777 >/dev/null 2>/dev/null selfserv_9709 with PID 29777 found at Mon Apr 25 14:44:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2229: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29777 >/dev/null 2>/dev/null selfserv_9709 with PID 29777 found at Mon Apr 25 14:44:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2230: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 29777 at Mon Apr 25 14:44:35 UTC 2016 kill -USR1 29777 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29777 killed at Mon Apr 25 14:44:36 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:44:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:36 UTC 2016 selfserv_9709 with PID 29925 started at Mon Apr 25 14:44:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2231: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2232: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2233: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2234: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2235: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2236: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2237: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2238: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2239: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2240: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2241: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2242: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 29925 >/dev/null 2>/dev/null selfserv_9709 with PID 29925 found at Mon Apr 25 14:44:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2243: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29925 at Mon Apr 25 14:44:45 UTC 2016 kill -USR1 29925 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29925 killed at Mon Apr 25 14:44:46 UTC 2016 ssl.sh: SSL Client Authentication - server normal/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:44:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30309 >/dev/null 2>/dev/null selfserv_9709 with PID 30309 found at Mon Apr 25 14:44:46 UTC 2016 selfserv_9709 with PID 30309 started at Mon Apr 25 14:44:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30309 at Mon Apr 25 14:44:47 UTC 2016 kill -USR1 30309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30309 killed at Mon Apr 25 14:44:48 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:44:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30366 >/dev/null 2>/dev/null selfserv_9709 with PID 30366 found at Mon Apr 25 14:44:48 UTC 2016 selfserv_9709 with PID 30366 started at Mon Apr 25 14:44:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30366 at Mon Apr 25 14:44:49 UTC 2016 kill -USR1 30366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30366 killed at Mon Apr 25 14:44:50 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:44:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30423 >/dev/null 2>/dev/null selfserv_9709 with PID 30423 found at Mon Apr 25 14:44:50 UTC 2016 selfserv_9709 with PID 30423 started at Mon Apr 25 14:44:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30423 at Mon Apr 25 14:44:51 UTC 2016 kill -USR1 30423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30423 killed at Mon Apr 25 14:44:52 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:44:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30480 >/dev/null 2>/dev/null selfserv_9709 with PID 30480 found at Mon Apr 25 14:44:52 UTC 2016 selfserv_9709 with PID 30480 started at Mon Apr 25 14:44:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30480 at Mon Apr 25 14:44:53 UTC 2016 kill -USR1 30480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30480 killed at Mon Apr 25 14:44:54 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:44:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30537 >/dev/null 2>/dev/null selfserv_9709 with PID 30537 found at Mon Apr 25 14:44:54 UTC 2016 selfserv_9709 with PID 30537 started at Mon Apr 25 14:44:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30537 at Mon Apr 25 14:44:55 UTC 2016 kill -USR1 30537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30537 killed at Mon Apr 25 14:44:56 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:44:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30594 >/dev/null 2>/dev/null selfserv_9709 with PID 30594 found at Mon Apr 25 14:44:56 UTC 2016 selfserv_9709 with PID 30594 started at Mon Apr 25 14:44:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30594 at Mon Apr 25 14:44:57 UTC 2016 kill -USR1 30594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30594 killed at Mon Apr 25 14:44:58 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:44:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30651 >/dev/null 2>/dev/null selfserv_9709 with PID 30651 found at Mon Apr 25 14:44:58 UTC 2016 selfserv_9709 with PID 30651 started at Mon Apr 25 14:44:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30651 at Mon Apr 25 14:44:59 UTC 2016 kill -USR1 30651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30651 killed at Mon Apr 25 14:44:59 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:44:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:44:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30708 >/dev/null 2>/dev/null selfserv_9709 with PID 30708 found at Mon Apr 25 14:45:00 UTC 2016 selfserv_9709 with PID 30708 started at Mon Apr 25 14:45:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30708 at Mon Apr 25 14:45:01 UTC 2016 kill -USR1 30708 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30708 killed at Mon Apr 25 14:45:01 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30779 >/dev/null 2>/dev/null selfserv_9709 with PID 30779 found at Mon Apr 25 14:45:02 UTC 2016 selfserv_9709 with PID 30779 started at Mon Apr 25 14:45:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30779 at Mon Apr 25 14:45:02 UTC 2016 kill -USR1 30779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30779 killed at Mon Apr 25 14:45:03 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30838 >/dev/null 2>/dev/null selfserv_9709 with PID 30838 found at Mon Apr 25 14:45:03 UTC 2016 selfserv_9709 with PID 30838 started at Mon Apr 25 14:45:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30838 at Mon Apr 25 14:45:04 UTC 2016 kill -USR1 30838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30838 killed at Mon Apr 25 14:45:05 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30895 >/dev/null 2>/dev/null selfserv_9709 with PID 30895 found at Mon Apr 25 14:45:05 UTC 2016 selfserv_9709 with PID 30895 started at Mon Apr 25 14:45:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30895 at Mon Apr 25 14:45:06 UTC 2016 kill -USR1 30895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30895 killed at Mon Apr 25 14:45:06 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30955 >/dev/null 2>/dev/null selfserv_9709 with PID 30955 found at Mon Apr 25 14:45:07 UTC 2016 selfserv_9709 with PID 30955 started at Mon Apr 25 14:45:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30955 at Mon Apr 25 14:45:08 UTC 2016 kill -USR1 30955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30955 killed at Mon Apr 25 14:45:08 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31012 >/dev/null 2>/dev/null selfserv_9709 with PID 31012 found at Mon Apr 25 14:45:09 UTC 2016 selfserv_9709 with PID 31012 started at Mon Apr 25 14:45:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31012 at Mon Apr 25 14:45:10 UTC 2016 kill -USR1 31012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31012 killed at Mon Apr 25 14:45:10 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31069 >/dev/null 2>/dev/null selfserv_9709 with PID 31069 found at Mon Apr 25 14:45:11 UTC 2016 selfserv_9709 with PID 31069 started at Mon Apr 25 14:45:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31069 at Mon Apr 25 14:45:12 UTC 2016 kill -USR1 31069 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31069 killed at Mon Apr 25 14:45:12 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31126 >/dev/null 2>/dev/null selfserv_9709 with PID 31126 found at Mon Apr 25 14:45:13 UTC 2016 selfserv_9709 with PID 31126 started at Mon Apr 25 14:45:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31126 at Mon Apr 25 14:45:14 UTC 2016 kill -USR1 31126 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31126 killed at Mon Apr 25 14:45:15 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31183 >/dev/null 2>/dev/null selfserv_9709 with PID 31183 found at Mon Apr 25 14:45:15 UTC 2016 selfserv_9709 with PID 31183 started at Mon Apr 25 14:45:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31183 at Mon Apr 25 14:45:16 UTC 2016 kill -USR1 31183 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31183 killed at Mon Apr 25 14:45:17 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31240 >/dev/null 2>/dev/null selfserv_9709 with PID 31240 found at Mon Apr 25 14:45:17 UTC 2016 selfserv_9709 with PID 31240 started at Mon Apr 25 14:45:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31240 at Mon Apr 25 14:45:19 UTC 2016 kill -USR1 31240 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31240 killed at Mon Apr 25 14:45:19 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31297 >/dev/null 2>/dev/null selfserv_9709 with PID 31297 found at Mon Apr 25 14:45:19 UTC 2016 selfserv_9709 with PID 31297 started at Mon Apr 25 14:45:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31297 at Mon Apr 25 14:45:21 UTC 2016 kill -USR1 31297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31297 killed at Mon Apr 25 14:45:21 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31355 >/dev/null 2>/dev/null selfserv_9709 with PID 31355 found at Mon Apr 25 14:45:22 UTC 2016 selfserv_9709 with PID 31355 started at Mon Apr 25 14:45:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31355 at Mon Apr 25 14:45:23 UTC 2016 kill -USR1 31355 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31355 killed at Mon Apr 25 14:45:23 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31412 >/dev/null 2>/dev/null selfserv_9709 with PID 31412 found at Mon Apr 25 14:45:24 UTC 2016 selfserv_9709 with PID 31412 started at Mon Apr 25 14:45:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31412 at Mon Apr 25 14:45:25 UTC 2016 kill -USR1 31412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31412 killed at Mon Apr 25 14:45:26 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31469 >/dev/null 2>/dev/null selfserv_9709 with PID 31469 found at Mon Apr 25 14:45:26 UTC 2016 selfserv_9709 with PID 31469 started at Mon Apr 25 14:45:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31469 at Mon Apr 25 14:45:27 UTC 2016 kill -USR1 31469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31469 killed at Mon Apr 25 14:45:28 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31526 >/dev/null 2>/dev/null selfserv_9709 with PID 31526 found at Mon Apr 25 14:45:28 UTC 2016 selfserv_9709 with PID 31526 started at Mon Apr 25 14:45:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31526 at Mon Apr 25 14:45:30 UTC 2016 kill -USR1 31526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31526 killed at Mon Apr 25 14:45:30 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31583 >/dev/null 2>/dev/null selfserv_9709 with PID 31583 found at Mon Apr 25 14:45:31 UTC 2016 selfserv_9709 with PID 31583 started at Mon Apr 25 14:45:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31583 at Mon Apr 25 14:45:32 UTC 2016 kill -USR1 31583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31583 killed at Mon Apr 25 14:45:32 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31640 >/dev/null 2>/dev/null selfserv_9709 with PID 31640 found at Mon Apr 25 14:45:33 UTC 2016 selfserv_9709 with PID 31640 started at Mon Apr 25 14:45:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31640 at Mon Apr 25 14:45:34 UTC 2016 kill -USR1 31640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31640 killed at Mon Apr 25 14:45:35 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31697 >/dev/null 2>/dev/null selfserv_9709 with PID 31697 found at Mon Apr 25 14:45:35 UTC 2016 selfserv_9709 with PID 31697 started at Mon Apr 25 14:45:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31697 at Mon Apr 25 14:45:36 UTC 2016 kill -USR1 31697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31697 killed at Mon Apr 25 14:45:36 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31754 >/dev/null 2>/dev/null selfserv_9709 with PID 31754 found at Mon Apr 25 14:45:37 UTC 2016 selfserv_9709 with PID 31754 started at Mon Apr 25 14:45:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31754 at Mon Apr 25 14:45:38 UTC 2016 kill -USR1 31754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31754 killed at Mon Apr 25 14:45:38 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31811 >/dev/null 2>/dev/null selfserv_9709 with PID 31811 found at Mon Apr 25 14:45:39 UTC 2016 selfserv_9709 with PID 31811 started at Mon Apr 25 14:45:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31811 at Mon Apr 25 14:45:40 UTC 2016 kill -USR1 31811 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31811 killed at Mon Apr 25 14:45:40 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31868 >/dev/null 2>/dev/null selfserv_9709 with PID 31868 found at Mon Apr 25 14:45:41 UTC 2016 selfserv_9709 with PID 31868 started at Mon Apr 25 14:45:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31868 at Mon Apr 25 14:45:42 UTC 2016 kill -USR1 31868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31868 killed at Mon Apr 25 14:45:42 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31926 >/dev/null 2>/dev/null selfserv_9709 with PID 31926 found at Mon Apr 25 14:45:43 UTC 2016 selfserv_9709 with PID 31926 started at Mon Apr 25 14:45:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31926 at Mon Apr 25 14:45:44 UTC 2016 kill -USR1 31926 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31926 killed at Mon Apr 25 14:45:44 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31983 >/dev/null 2>/dev/null selfserv_9709 with PID 31983 found at Mon Apr 25 14:45:45 UTC 2016 selfserv_9709 with PID 31983 started at Mon Apr 25 14:45:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31983 at Mon Apr 25 14:45:46 UTC 2016 kill -USR1 31983 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31983 killed at Mon Apr 25 14:45:46 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32055 >/dev/null 2>/dev/null selfserv_9709 with PID 32055 found at Mon Apr 25 14:45:47 UTC 2016 selfserv_9709 with PID 32055 started at Mon Apr 25 14:45:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2274: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32055 at Mon Apr 25 14:45:48 UTC 2016 kill -USR1 32055 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32055 killed at Mon Apr 25 14:45:48 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32112 >/dev/null 2>/dev/null selfserv_9709 with PID 32112 found at Mon Apr 25 14:45:49 UTC 2016 selfserv_9709 with PID 32112 started at Mon Apr 25 14:45:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2275: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32112 at Mon Apr 25 14:45:50 UTC 2016 kill -USR1 32112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32112 killed at Mon Apr 25 14:45:50 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32169 >/dev/null 2>/dev/null selfserv_9709 with PID 32169 found at Mon Apr 25 14:45:51 UTC 2016 selfserv_9709 with PID 32169 started at Mon Apr 25 14:45:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2276: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32169 at Mon Apr 25 14:45:52 UTC 2016 kill -USR1 32169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32169 killed at Mon Apr 25 14:45:52 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32226 >/dev/null 2>/dev/null selfserv_9709 with PID 32226 found at Mon Apr 25 14:45:53 UTC 2016 selfserv_9709 with PID 32226 started at Mon Apr 25 14:45:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2277: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32226 at Mon Apr 25 14:45:54 UTC 2016 kill -USR1 32226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32226 killed at Mon Apr 25 14:45:54 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32283 >/dev/null 2>/dev/null selfserv_9709 with PID 32283 found at Mon Apr 25 14:45:55 UTC 2016 selfserv_9709 with PID 32283 started at Mon Apr 25 14:45:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2278: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32283 at Mon Apr 25 14:45:56 UTC 2016 kill -USR1 32283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32283 killed at Mon Apr 25 14:45:56 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:45:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32340 >/dev/null 2>/dev/null selfserv_9709 with PID 32340 found at Mon Apr 25 14:45:56 UTC 2016 selfserv_9709 with PID 32340 started at Mon Apr 25 14:45:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2279: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32340 at Mon Apr 25 14:45:58 UTC 2016 kill -USR1 32340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32340 killed at Mon Apr 25 14:45:58 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:45:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:45:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32397 >/dev/null 2>/dev/null selfserv_9709 with PID 32397 found at Mon Apr 25 14:45:58 UTC 2016 selfserv_9709 with PID 32397 started at Mon Apr 25 14:45:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2280: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32397 at Mon Apr 25 14:45:59 UTC 2016 kill -USR1 32397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32397 killed at Mon Apr 25 14:46:00 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:46:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32454 >/dev/null 2>/dev/null selfserv_9709 with PID 32454 found at Mon Apr 25 14:46:00 UTC 2016 selfserv_9709 with PID 32454 started at Mon Apr 25 14:46:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2281: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32454 at Mon Apr 25 14:46:01 UTC 2016 kill -USR1 32454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32454 killed at Mon Apr 25 14:46:02 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:46:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32524 >/dev/null 2>/dev/null selfserv_9709 with PID 32524 found at Mon Apr 25 14:46:02 UTC 2016 selfserv_9709 with PID 32524 started at Mon Apr 25 14:46:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2282: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32524 at Mon Apr 25 14:46:03 UTC 2016 kill -USR1 32524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32524 killed at Mon Apr 25 14:46:04 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:46:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32582 >/dev/null 2>/dev/null selfserv_9709 with PID 32582 found at Mon Apr 25 14:46:04 UTC 2016 selfserv_9709 with PID 32582 started at Mon Apr 25 14:46:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2283: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32582 at Mon Apr 25 14:46:06 UTC 2016 kill -USR1 32582 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32582 killed at Mon Apr 25 14:46:06 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:46:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32642 >/dev/null 2>/dev/null selfserv_9709 with PID 32642 found at Mon Apr 25 14:46:07 UTC 2016 selfserv_9709 with PID 32642 started at Mon Apr 25 14:46:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2284: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32642 at Mon Apr 25 14:46:08 UTC 2016 kill -USR1 32642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32642 killed at Mon Apr 25 14:46:08 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:46:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32699 >/dev/null 2>/dev/null selfserv_9709 with PID 32699 found at Mon Apr 25 14:46:09 UTC 2016 selfserv_9709 with PID 32699 started at Mon Apr 25 14:46:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2285: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32699 at Mon Apr 25 14:46:10 UTC 2016 kill -USR1 32699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32699 killed at Mon Apr 25 14:46:11 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:46:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32756 >/dev/null 2>/dev/null selfserv_9709 with PID 32756 found at Mon Apr 25 14:46:11 UTC 2016 selfserv_9709 with PID 32756 started at Mon Apr 25 14:46:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2286: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32756 at Mon Apr 25 14:46:13 UTC 2016 kill -USR1 32756 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32756 killed at Mon Apr 25 14:46:13 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:46:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 345 >/dev/null 2>/dev/null selfserv_9709 with PID 345 found at Mon Apr 25 14:46:13 UTC 2016 selfserv_9709 with PID 345 started at Mon Apr 25 14:46:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2287: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 345 at Mon Apr 25 14:46:15 UTC 2016 kill -USR1 345 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 345 killed at Mon Apr 25 14:46:15 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:46:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 404 >/dev/null 2>/dev/null selfserv_9709 with PID 404 found at Mon Apr 25 14:46:16 UTC 2016 selfserv_9709 with PID 404 started at Mon Apr 25 14:46:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2288: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 404 at Mon Apr 25 14:46:17 UTC 2016 kill -USR1 404 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 404 killed at Mon Apr 25 14:46:17 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:46:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 463 >/dev/null 2>/dev/null selfserv_9709 with PID 463 found at Mon Apr 25 14:46:18 UTC 2016 selfserv_9709 with PID 463 started at Mon Apr 25 14:46:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2289: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 463 at Mon Apr 25 14:46:19 UTC 2016 kill -USR1 463 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 463 killed at Mon Apr 25 14:46:20 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:46:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 520 >/dev/null 2>/dev/null selfserv_9709 with PID 520 found at Mon Apr 25 14:46:20 UTC 2016 selfserv_9709 with PID 520 started at Mon Apr 25 14:46:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2290: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 520 at Mon Apr 25 14:46:21 UTC 2016 kill -USR1 520 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 520 killed at Mon Apr 25 14:46:22 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:46:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 577 >/dev/null 2>/dev/null selfserv_9709 with PID 577 found at Mon Apr 25 14:46:22 UTC 2016 selfserv_9709 with PID 577 started at Mon Apr 25 14:46:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2291: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 577 at Mon Apr 25 14:46:24 UTC 2016 kill -USR1 577 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 577 killed at Mon Apr 25 14:46:24 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:46:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 635 >/dev/null 2>/dev/null selfserv_9709 with PID 635 found at Mon Apr 25 14:46:24 UTC 2016 selfserv_9709 with PID 635 started at Mon Apr 25 14:46:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2292: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 635 at Mon Apr 25 14:46:25 UTC 2016 kill -USR1 635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 635 killed at Mon Apr 25 14:46:26 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:46:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 692 >/dev/null 2>/dev/null selfserv_9709 with PID 692 found at Mon Apr 25 14:46:26 UTC 2016 selfserv_9709 with PID 692 started at Mon Apr 25 14:46:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2293: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 692 at Mon Apr 25 14:46:28 UTC 2016 kill -USR1 692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 692 killed at Mon Apr 25 14:46:28 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 14:46:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 770 >/dev/null 2>/dev/null selfserv_9709 with PID 770 found at Mon Apr 25 14:46:28 UTC 2016 selfserv_9709 with PID 770 started at Mon Apr 25 14:46:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2294: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 770 at Mon Apr 25 14:46:29 UTC 2016 kill -USR1 770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 770 killed at Mon Apr 25 14:46:30 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 14:46:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 833 >/dev/null 2>/dev/null selfserv_9709 with PID 833 found at Mon Apr 25 14:46:30 UTC 2016 selfserv_9709 with PID 833 started at Mon Apr 25 14:46:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2295: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 833 at Mon Apr 25 14:46:31 UTC 2016 kill -USR1 833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 833 killed at Mon Apr 25 14:46:31 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 14:46:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 896 >/dev/null 2>/dev/null selfserv_9709 with PID 896 found at Mon Apr 25 14:46:32 UTC 2016 selfserv_9709 with PID 896 started at Mon Apr 25 14:46:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2296: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 896 at Mon Apr 25 14:46:33 UTC 2016 kill -USR1 896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 896 killed at Mon Apr 25 14:46:33 UTC 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 14:46:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 959 >/dev/null 2>/dev/null selfserv_9709 with PID 959 found at Mon Apr 25 14:46:34 UTC 2016 selfserv_9709 with PID 959 started at Mon Apr 25 14:46:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2297: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 959 at Mon Apr 25 14:46:34 UTC 2016 kill -USR1 959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 959 killed at Mon Apr 25 14:46:35 UTC 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9709 starting at Mon Apr 25 14:46:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1038 >/dev/null 2>/dev/null selfserv_9709 with PID 1038 found at Mon Apr 25 14:46:35 UTC 2016 selfserv_9709 with PID 1038 started at Mon Apr 25 14:46:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #2298: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1038 at Mon Apr 25 14:46:36 UTC 2016 kill -USR1 1038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1038 killed at Mon Apr 25 14:46:36 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 14:46:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1102 >/dev/null 2>/dev/null selfserv_9709 with PID 1102 found at Mon Apr 25 14:46:37 UTC 2016 selfserv_9709 with PID 1102 started at Mon Apr 25 14:46:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2299: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1102 at Mon Apr 25 14:46:38 UTC 2016 kill -USR1 1102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1102 killed at Mon Apr 25 14:46:38 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 14:46:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1166 >/dev/null 2>/dev/null selfserv_9709 with PID 1166 found at Mon Apr 25 14:46:39 UTC 2016 selfserv_9709 with PID 1166 started at Mon Apr 25 14:46:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2300: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1166 at Mon Apr 25 14:46:39 UTC 2016 kill -USR1 1166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1166 killed at Mon Apr 25 14:46:40 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9709 starting at Mon Apr 25 14:46:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1229 >/dev/null 2>/dev/null selfserv_9709 with PID 1229 found at Mon Apr 25 14:46:40 UTC 2016 selfserv_9709 with PID 1229 started at Mon Apr 25 14:46:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #2301: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1229 at Mon Apr 25 14:46:41 UTC 2016 kill -USR1 1229 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1229 killed at Mon Apr 25 14:46:42 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9709 starting at Mon Apr 25 14:46:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1292 >/dev/null 2>/dev/null selfserv_9709 with PID 1292 found at Mon Apr 25 14:46:42 UTC 2016 selfserv_9709 with PID 1292 started at Mon Apr 25 14:46:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #2302: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1292 at Mon Apr 25 14:46:43 UTC 2016 kill -USR1 1292 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1292 killed at Mon Apr 25 14:46:43 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 14:46:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1356 >/dev/null 2>/dev/null selfserv_9709 with PID 1356 found at Mon Apr 25 14:46:44 UTC 2016 selfserv_9709 with PID 1356 started at Mon Apr 25 14:46:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2303: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1356 at Mon Apr 25 14:46:44 UTC 2016 kill -USR1 1356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1356 killed at Mon Apr 25 14:46:45 UTC 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9709 starting at Mon Apr 25 14:46:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1405 >/dev/null 2>/dev/null selfserv_9709 with PID 1405 found at Mon Apr 25 14:46:45 UTC 2016 selfserv_9709 with PID 1405 started at Mon Apr 25 14:46:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 0 ssl.sh: #2304: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1405 at Mon Apr 25 14:46:46 UTC 2016 kill -USR1 1405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1405 killed at Mon Apr 25 14:46:47 UTC 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9709 starting at Mon Apr 25 14:46:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1454 >/dev/null 2>/dev/null selfserv_9709 with PID 1454 found at Mon Apr 25 14:46:47 UTC 2016 selfserv_9709 with PID 1454 started at Mon Apr 25 14:46:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 3 ssl.sh: #2305: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9709 with PID 1454 at Mon Apr 25 14:46:48 UTC 2016 kill -USR1 1454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1454 killed at Mon Apr 25 14:46:48 UTC 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9709 starting at Mon Apr 25 14:46:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1503 >/dev/null 2>/dev/null selfserv_9709 with PID 1503 found at Mon Apr 25 14:46:49 UTC 2016 selfserv_9709 with PID 1503 started at Mon Apr 25 14:46:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #2306: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 1503 at Mon Apr 25 14:46:50 UTC 2016 kill -USR1 1503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1503 killed at Mon Apr 25 14:46:50 UTC 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9709 starting at Mon Apr 25 14:46:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1552 >/dev/null 2>/dev/null selfserv_9709 with PID 1552 found at Mon Apr 25 14:46:51 UTC 2016 selfserv_9709 with PID 1552 started at Mon Apr 25 14:46:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #2307: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 1552 at Mon Apr 25 14:46:51 UTC 2016 kill -USR1 1552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1552 killed at Mon Apr 25 14:46:52 UTC 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9709 starting at Mon Apr 25 14:46:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1601 >/dev/null 2>/dev/null selfserv_9709 with PID 1601 found at Mon Apr 25 14:46:52 UTC 2016 selfserv_9709 with PID 1601 started at Mon Apr 25 14:46:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #2308: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 1601 at Mon Apr 25 14:46:53 UTC 2016 kill -USR1 1601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1601 killed at Mon Apr 25 14:46:53 UTC 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9709 starting at Mon Apr 25 14:46:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1654 >/dev/null 2>/dev/null selfserv_9709 with PID 1654 found at Mon Apr 25 14:46:54 UTC 2016 selfserv_9709 with PID 1654 started at Mon Apr 25 14:46:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #2309: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 1654 at Mon Apr 25 14:46:55 UTC 2016 kill -USR1 1654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1654 killed at Mon Apr 25 14:46:55 UTC 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9709 starting at Mon Apr 25 14:46:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1703 >/dev/null 2>/dev/null selfserv_9709 with PID 1703 found at Mon Apr 25 14:46:56 UTC 2016 selfserv_9709 with PID 1703 started at Mon Apr 25 14:46:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #2310: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 1703 at Mon Apr 25 14:46:56 UTC 2016 kill -USR1 1703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1703 killed at Mon Apr 25 14:46:57 UTC 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9709 starting at Mon Apr 25 14:46:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:46:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1752 >/dev/null 2>/dev/null selfserv_9709 with PID 1752 found at Mon Apr 25 14:46:57 UTC 2016 selfserv_9709 with PID 1752 started at Mon Apr 25 14:46:57 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Mon Apr 25 14:46:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:48:49 UTC 2016 ssl.sh: #2311: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1752 at Mon Apr 25 14:48:49 UTC 2016 kill -USR1 1752 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1752 killed at Mon Apr 25 14:48:50 UTC 2016 ssl.sh: SSL Stress Test - server normal/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 14:48:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:48:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1939 >/dev/null 2>/dev/null selfserv_9709 with PID 1939 found at Mon Apr 25 14:48:50 UTC 2016 selfserv_9709 with PID 1939 started at Mon Apr 25 14:48:50 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 14:48:50 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:48:52 UTC 2016 ssl.sh: #2312: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1939 at Mon Apr 25 14:48:52 UTC 2016 kill -USR1 1939 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1939 killed at Mon Apr 25 14:48:52 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 14:48:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:48:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2019 >/dev/null 2>/dev/null selfserv_9709 with PID 2019 found at Mon Apr 25 14:48:53 UTC 2016 selfserv_9709 with PID 2019 started at Mon Apr 25 14:48:53 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 14:48:53 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:48:54 UTC 2016 ssl.sh: #2313: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2019 at Mon Apr 25 14:48:54 UTC 2016 kill -USR1 2019 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2019 killed at Mon Apr 25 14:48:55 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 14:48:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:48:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2097 >/dev/null 2>/dev/null selfserv_9709 with PID 2097 found at Mon Apr 25 14:48:55 UTC 2016 selfserv_9709 with PID 2097 started at Mon Apr 25 14:48:55 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:48:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:48:57 UTC 2016 ssl.sh: #2314: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2097 at Mon Apr 25 14:48:57 UTC 2016 kill -USR1 2097 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2097 killed at Mon Apr 25 14:48:57 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:48:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:48:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2173 >/dev/null 2>/dev/null selfserv_9709 with PID 2173 found at Mon Apr 25 14:48:58 UTC 2016 selfserv_9709 with PID 2173 started at Mon Apr 25 14:48:58 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:48:58 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:48:59 UTC 2016 ssl.sh: #2315: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2173 at Mon Apr 25 14:48:59 UTC 2016 kill -USR1 2173 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2173 killed at Mon Apr 25 14:49:00 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 14:49:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2250 >/dev/null 2>/dev/null selfserv_9709 with PID 2250 found at Mon Apr 25 14:49:00 UTC 2016 selfserv_9709 with PID 2250 started at Mon Apr 25 14:49:00 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:00 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:49:02 UTC 2016 ssl.sh: #2316: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2250 at Mon Apr 25 14:49:02 UTC 2016 kill -USR1 2250 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2250 killed at Mon Apr 25 14:49:03 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 14:49:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2339 >/dev/null 2>/dev/null selfserv_9709 with PID 2339 found at Mon Apr 25 14:49:03 UTC 2016 selfserv_9709 with PID 2339 started at Mon Apr 25 14:49:03 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:49:05 UTC 2016 ssl.sh: #2317: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2339 at Mon Apr 25 14:49:05 UTC 2016 kill -USR1 2339 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2339 killed at Mon Apr 25 14:49:06 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 14:49:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2418 >/dev/null 2>/dev/null selfserv_9709 with PID 2418 found at Mon Apr 25 14:49:06 UTC 2016 selfserv_9709 with PID 2418 started at Mon Apr 25 14:49:06 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:49:08 UTC 2016 ssl.sh: #2318: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2418 at Mon Apr 25 14:49:08 UTC 2016 kill -USR1 2418 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2418 killed at Mon Apr 25 14:49:09 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9709 starting at Mon Apr 25 14:49:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2501 >/dev/null 2>/dev/null selfserv_9709 with PID 2501 found at Mon Apr 25 14:49:09 UTC 2016 selfserv_9709 with PID 2501 started at Mon Apr 25 14:49:09 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:49:11 UTC 2016 ssl.sh: #2319: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2501 at Mon Apr 25 14:49:11 UTC 2016 kill -USR1 2501 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2501 killed at Mon Apr 25 14:49:11 UTC 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:49:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2605 >/dev/null 2>/dev/null selfserv_9709 with PID 2605 found at Mon Apr 25 14:49:12 UTC 2016 selfserv_9709 with PID 2605 started at Mon Apr 25 14:49:12 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:49:16 UTC 2016 ssl.sh: #2320: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2605 at Mon Apr 25 14:49:16 UTC 2016 kill -USR1 2605 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2605 killed at Mon Apr 25 14:49:16 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:49:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2680 >/dev/null 2>/dev/null selfserv_9709 with PID 2680 found at Mon Apr 25 14:49:17 UTC 2016 selfserv_9709 with PID 2680 started at Mon Apr 25 14:49:17 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 100 -C c -V ssl3: -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:49:21 UTC 2016 ssl.sh: #2321: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2680 at Mon Apr 25 14:49:21 UTC 2016 kill -USR1 2680 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2680 killed at Mon Apr 25 14:49:21 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:49:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2755 >/dev/null 2>/dev/null selfserv_9709 with PID 2755 found at Mon Apr 25 14:49:22 UTC 2016 selfserv_9709 with PID 2755 started at Mon Apr 25 14:49:22 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:49:23 UTC 2016 ssl.sh: #2322: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2755 at Mon Apr 25 14:49:23 UTC 2016 kill -USR1 2755 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2755 killed at Mon Apr 25 14:49:23 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:49:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2831 >/dev/null 2>/dev/null selfserv_9709 with PID 2831 found at Mon Apr 25 14:49:24 UTC 2016 selfserv_9709 with PID 2831 started at Mon Apr 25 14:49:24 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:24 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:49:25 UTC 2016 ssl.sh: #2323: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2831 at Mon Apr 25 14:49:25 UTC 2016 kill -USR1 2831 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2831 killed at Mon Apr 25 14:49:25 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 14:49:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2908 >/dev/null 2>/dev/null selfserv_9709 with PID 2908 found at Mon Apr 25 14:49:26 UTC 2016 selfserv_9709 with PID 2908 started at Mon Apr 25 14:49:26 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:26 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:49:27 UTC 2016 ssl.sh: #2324: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2908 at Mon Apr 25 14:49:27 UTC 2016 kill -USR1 2908 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2908 killed at Mon Apr 25 14:49:27 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:49:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2999 >/dev/null 2>/dev/null selfserv_9709 with PID 2999 found at Mon Apr 25 14:49:28 UTC 2016 selfserv_9709 with PID 2999 started at Mon Apr 25 14:49:28 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:28 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:49:29 UTC 2016 ssl.sh: #2325: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2999 at Mon Apr 25 14:49:29 UTC 2016 kill -USR1 2999 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2999 killed at Mon Apr 25 14:49:29 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 14:49:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3090 >/dev/null 2>/dev/null selfserv_9709 with PID 3090 found at Mon Apr 25 14:49:29 UTC 2016 selfserv_9709 with PID 3090 started at Mon Apr 25 14:49:30 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:30 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:49:30 UTC 2016 ssl.sh: #2326: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3090 at Mon Apr 25 14:49:31 UTC 2016 kill -USR1 3090 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3090 killed at Mon Apr 25 14:49:31 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9709 starting at Mon Apr 25 14:49:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3181 >/dev/null 2>/dev/null selfserv_9709 with PID 3181 found at Mon Apr 25 14:49:31 UTC 2016 selfserv_9709 with PID 3181 started at Mon Apr 25 14:49:31 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:49:33 UTC 2016 ssl.sh: #2327: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3181 at Mon Apr 25 14:49:33 UTC 2016 kill -USR1 3181 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3181 killed at Mon Apr 25 14:49:34 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9709 starting at Mon Apr 25 14:49:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3263 >/dev/null 2>/dev/null selfserv_9709 with PID 3263 found at Mon Apr 25 14:49:34 UTC 2016 selfserv_9709 with PID 3263 started at Mon Apr 25 14:49:34 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:34 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:49:36 UTC 2016 ssl.sh: #2328: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3263 at Mon Apr 25 14:49:36 UTC 2016 kill -USR1 3263 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3263 killed at Mon Apr 25 14:49:37 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:49:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3360 >/dev/null 2>/dev/null selfserv_9709 with PID 3360 found at Mon Apr 25 14:49:37 UTC 2016 selfserv_9709 with PID 3360 started at Mon Apr 25 14:49:37 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:49:44 UTC 2016 ssl.sh: #2329: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3360 at Mon Apr 25 14:49:44 UTC 2016 kill -USR1 3360 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3360 killed at Mon Apr 25 14:49:45 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:49:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3439 >/dev/null 2>/dev/null selfserv_9709 with PID 3439 found at Mon Apr 25 14:49:45 UTC 2016 selfserv_9709 with PID 3439 started at Mon Apr 25 14:49:45 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:49:52 UTC 2016 ssl.sh: #2330: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3439 at Mon Apr 25 14:49:52 UTC 2016 kill -USR1 3439 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3439 killed at Mon Apr 25 14:49:53 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:49:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:49:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3515 >/dev/null 2>/dev/null selfserv_9709 with PID 3515 found at Mon Apr 25 14:49:53 UTC 2016 selfserv_9709 with PID 3515 started at Mon Apr 25 14:49:53 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:49:53 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:50:00 UTC 2016 ssl.sh: #2331: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3515 at Mon Apr 25 14:50:00 UTC 2016 kill -USR1 3515 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3515 killed at Mon Apr 25 14:50:01 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:50:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3590 >/dev/null 2>/dev/null selfserv_9709 with PID 3590 found at Mon Apr 25 14:50:01 UTC 2016 selfserv_9709 with PID 3590 started at Mon Apr 25 14:50:01 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:50:11 UTC 2016 ssl.sh: #2332: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3590 at Mon Apr 25 14:50:11 UTC 2016 kill -USR1 3590 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3590 killed at Mon Apr 25 14:50:11 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:50:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3684 >/dev/null 2>/dev/null selfserv_9709 with PID 3684 found at Mon Apr 25 14:50:12 UTC 2016 selfserv_9709 with PID 3684 started at Mon Apr 25 14:50:12 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:50:18 UTC 2016 ssl.sh: #2333: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3684 at Mon Apr 25 14:50:18 UTC 2016 kill -USR1 3684 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3684 killed at Mon Apr 25 14:50:18 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 14:50:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3762 >/dev/null 2>/dev/null selfserv_9709 with PID 3762 found at Mon Apr 25 14:50:19 UTC 2016 selfserv_9709 with PID 3762 started at Mon Apr 25 14:50:19 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:50:20 UTC 2016 ssl.sh: #2334: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3762 at Mon Apr 25 14:50:20 UTC 2016 kill -USR1 3762 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3762 killed at Mon Apr 25 14:50:21 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 14:50:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3838 >/dev/null 2>/dev/null selfserv_9709 with PID 3838 found at Mon Apr 25 14:50:21 UTC 2016 selfserv_9709 with PID 3838 started at Mon Apr 25 14:50:21 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:21 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:50:23 UTC 2016 ssl.sh: #2335: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3838 at Mon Apr 25 14:50:23 UTC 2016 kill -USR1 3838 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3838 killed at Mon Apr 25 14:50:23 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 14:50:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3914 >/dev/null 2>/dev/null selfserv_9709 with PID 3914 found at Mon Apr 25 14:50:24 UTC 2016 selfserv_9709 with PID 3914 started at Mon Apr 25 14:50:24 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:24 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:50:26 UTC 2016 ssl.sh: #2336: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3914 at Mon Apr 25 14:50:26 UTC 2016 kill -USR1 3914 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3914 killed at Mon Apr 25 14:50:26 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:50:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3993 >/dev/null 2>/dev/null selfserv_9709 with PID 3993 found at Mon Apr 25 14:50:27 UTC 2016 selfserv_9709 with PID 3993 started at Mon Apr 25 14:50:27 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:50:28 UTC 2016 ssl.sh: #2337: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3993 at Mon Apr 25 14:50:29 UTC 2016 kill -USR1 3993 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3993 killed at Mon Apr 25 14:50:29 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:50:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4070 >/dev/null 2>/dev/null selfserv_9709 with PID 4070 found at Mon Apr 25 14:50:29 UTC 2016 selfserv_9709 with PID 4070 started at Mon Apr 25 14:50:29 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:30 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:50:30 UTC 2016 ssl.sh: #2338: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4070 at Mon Apr 25 14:50:31 UTC 2016 kill -USR1 4070 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4070 killed at Mon Apr 25 14:50:31 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:50:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4167 >/dev/null 2>/dev/null selfserv_9709 with PID 4167 found at Mon Apr 25 14:50:32 UTC 2016 selfserv_9709 with PID 4167 started at Mon Apr 25 14:50:32 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 14:50:34 UTC 2016 ssl.sh: #2339: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4167 at Mon Apr 25 14:50:34 UTC 2016 kill -USR1 4167 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4167 killed at Mon Apr 25 14:50:34 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:50:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4242 >/dev/null 2>/dev/null selfserv_9709 with PID 4242 found at Mon Apr 25 14:50:35 UTC 2016 selfserv_9709 with PID 4242 started at Mon Apr 25 14:50:35 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:50:36 UTC 2016 ssl.sh: #2340: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4242 at Mon Apr 25 14:50:36 UTC 2016 kill -USR1 4242 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4242 killed at Mon Apr 25 14:50:36 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:50:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4318 >/dev/null 2>/dev/null selfserv_9709 with PID 4318 found at Mon Apr 25 14:50:37 UTC 2016 selfserv_9709 with PID 4318 started at Mon Apr 25 14:50:37 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 14:50:39 UTC 2016 ssl.sh: #2341: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4318 at Mon Apr 25 14:50:39 UTC 2016 kill -USR1 4318 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4318 killed at Mon Apr 25 14:50:40 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:50:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4393 >/dev/null 2>/dev/null selfserv_9709 with PID 4393 found at Mon Apr 25 14:50:40 UTC 2016 selfserv_9709 with PID 4393 started at Mon Apr 25 14:50:40 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 14:50:42 UTC 2016 ssl.sh: #2342: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4393 at Mon Apr 25 14:50:42 UTC 2016 kill -USR1 4393 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4393 killed at Mon Apr 25 14:50:42 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 14:50:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4468 >/dev/null 2>/dev/null selfserv_9709 with PID 4468 found at Mon Apr 25 14:50:43 UTC 2016 selfserv_9709 with PID 4468 started at Mon Apr 25 14:50:43 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:43 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:50:44 UTC 2016 ssl.sh: #2343: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4468 at Mon Apr 25 14:50:44 UTC 2016 kill -USR1 4468 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4468 killed at Mon Apr 25 14:50:44 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:50:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4544 >/dev/null 2>/dev/null selfserv_9709 with PID 4544 found at Mon Apr 25 14:50:45 UTC 2016 selfserv_9709 with PID 4544 started at Mon Apr 25 14:50:45 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:50:46 UTC 2016 ssl.sh: #2344: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4544 at Mon Apr 25 14:50:46 UTC 2016 kill -USR1 4544 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4544 killed at Mon Apr 25 14:50:46 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:50:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4641 >/dev/null 2>/dev/null selfserv_9709 with PID 4641 found at Mon Apr 25 14:50:47 UTC 2016 selfserv_9709 with PID 4641 started at Mon Apr 25 14:50:47 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:50:53 UTC 2016 ssl.sh: #2345: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4641 at Mon Apr 25 14:50:53 UTC 2016 kill -USR1 4641 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4641 killed at Mon Apr 25 14:50:53 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 14:50:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4717 >/dev/null 2>/dev/null selfserv_9709 with PID 4717 found at Mon Apr 25 14:50:54 UTC 2016 selfserv_9709 with PID 4717 started at Mon Apr 25 14:50:54 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:50:55 UTC 2016 ssl.sh: #2346: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4717 at Mon Apr 25 14:50:55 UTC 2016 kill -USR1 4717 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4717 killed at Mon Apr 25 14:50:56 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:50:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:50:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4793 >/dev/null 2>/dev/null selfserv_9709 with PID 4793 found at Mon Apr 25 14:50:56 UTC 2016 selfserv_9709 with PID 4793 started at Mon Apr 25 14:50:56 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:50:56 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:51:02 UTC 2016 ssl.sh: #2347: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4793 at Mon Apr 25 14:51:02 UTC 2016 kill -USR1 4793 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4793 killed at Mon Apr 25 14:51:03 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:51:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:51:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4881 >/dev/null 2>/dev/null selfserv_9709 with PID 4881 found at Mon Apr 25 14:51:03 UTC 2016 selfserv_9709 with PID 4881 started at Mon Apr 25 14:51:03 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:51:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:51:10 UTC 2016 ssl.sh: #2348: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4881 at Mon Apr 25 14:51:10 UTC 2016 kill -USR1 4881 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4881 killed at Mon Apr 25 14:51:11 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:51:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:51:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4974 >/dev/null 2>/dev/null selfserv_9709 with PID 4974 found at Mon Apr 25 14:51:11 UTC 2016 selfserv_9709 with PID 4974 started at Mon Apr 25 14:51:11 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:51:11 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:52:16 UTC 2016 ssl.sh: #2349: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4974 at Mon Apr 25 14:52:16 UTC 2016 kill -USR1 4974 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4974 killed at Mon Apr 25 14:52:16 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 14:52:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:52:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5083 >/dev/null 2>/dev/null selfserv_9709 with PID 5083 found at Mon Apr 25 14:52:17 UTC 2016 selfserv_9709 with PID 5083 started at Mon Apr 25 14:52:17 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:52:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:53:21 UTC 2016 ssl.sh: #2350: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5083 at Mon Apr 25 14:53:21 UTC 2016 kill -USR1 5083 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5083 killed at Mon Apr 25 14:53:22 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:53:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:53:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5181 >/dev/null 2>/dev/null selfserv_9709 with PID 5181 found at Mon Apr 25 14:53:22 UTC 2016 selfserv_9709 with PID 5181 started at Mon Apr 25 14:53:22 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:53:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:53:28 UTC 2016 ssl.sh: #2351: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5181 at Mon Apr 25 14:53:28 UTC 2016 kill -USR1 5181 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5181 killed at Mon Apr 25 14:53:28 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:53:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:53:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5256 >/dev/null 2>/dev/null selfserv_9709 with PID 5256 found at Mon Apr 25 14:53:29 UTC 2016 selfserv_9709 with PID 5256 started at Mon Apr 25 14:53:29 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:53:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:53:35 UTC 2016 ssl.sh: #2352: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5256 at Mon Apr 25 14:53:35 UTC 2016 kill -USR1 5256 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5256 killed at Mon Apr 25 14:53:35 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:53:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:53:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5353 >/dev/null 2>/dev/null selfserv_9709 with PID 5353 found at Mon Apr 25 14:53:36 UTC 2016 selfserv_9709 with PID 5353 started at Mon Apr 25 14:53:36 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 14:53:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:53:46 UTC 2016 ssl.sh: #2353: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5353 at Mon Apr 25 14:53:46 UTC 2016 kill -USR1 5353 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5353 killed at Mon Apr 25 14:53:46 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:53:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:53:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5428 >/dev/null 2>/dev/null selfserv_9709 with PID 5428 found at Mon Apr 25 14:53:47 UTC 2016 selfserv_9709 with PID 5428 started at Mon Apr 25 14:53:47 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 14:53:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:53:48 UTC 2016 ssl.sh: #2354: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5428 at Mon Apr 25 14:53:49 UTC 2016 kill -USR1 5428 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5428 killed at Mon Apr 25 14:53:49 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:53:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:53:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5518 >/dev/null 2>/dev/null selfserv_9709 with PID 5518 found at Mon Apr 25 14:53:49 UTC 2016 selfserv_9709 with PID 5518 started at Mon Apr 25 14:53:50 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 14:53:50 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 14:55:23 UTC 2016 ssl.sh: #2355: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5518 at Mon Apr 25 14:55:24 UTC 2016 kill -USR1 5518 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5518 killed at Mon Apr 25 14:55:24 UTC 2016 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass - with ECC =============================== selfserv_9709 starting at Mon Apr 25 14:55:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:55:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:24 UTC 2016 selfserv_9709 with PID 5618 started at Mon Apr 25 14:55:24 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2356: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2357: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2358: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2359: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2360: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2361: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2362: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2363: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2364: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2365: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2366: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2367: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2368: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2369: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2370: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2371: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2372: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2373: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2374: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2375: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2376: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2377: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2378: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2379: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2380: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2381: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2382: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2383: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2384: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2385: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2386: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2387: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2388: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2389: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2390: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2391: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2392: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2393: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2394: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2395: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2396: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2397: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2398: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2399: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2400: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2401: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2402: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2403: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2404: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2405: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2406: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:55:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2407: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2408: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2409: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2410: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2411: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2412: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2413: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2414: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2415: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2416: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2417: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2418: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2419: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2420: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2421: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2422: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 5618 >/dev/null 2>/dev/null selfserv_9709 with PID 5618 found at Mon Apr 25 14:56:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2423: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 5618 at Mon Apr 25 14:56:12 UTC 2016 kill -USR1 5618 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5618 killed at Mon Apr 25 14:56:13 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:56:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:56:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7535 >/dev/null 2>/dev/null selfserv_9709 with PID 7535 found at Mon Apr 25 14:56:13 UTC 2016 selfserv_9709 with PID 7535 started at Mon Apr 25 14:56:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2424: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7535 >/dev/null 2>/dev/null selfserv_9709 with PID 7535 found at Mon Apr 25 14:56:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2425: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7535 >/dev/null 2>/dev/null selfserv_9709 with PID 7535 found at Mon Apr 25 14:56:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2426: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7535 >/dev/null 2>/dev/null selfserv_9709 with PID 7535 found at Mon Apr 25 14:56:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2427: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7535 >/dev/null 2>/dev/null selfserv_9709 with PID 7535 found at Mon Apr 25 14:56:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2428: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 7535 at Mon Apr 25 14:56:16 UTC 2016 kill -USR1 7535 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7535 killed at Mon Apr 25 14:56:17 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:56:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:56:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:17 UTC 2016 selfserv_9709 with PID 7683 started at Mon Apr 25 14:56:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2429: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2430: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2431: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2432: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2433: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2434: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2435: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2436: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2437: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2438: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2439: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2440: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2441: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2442: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7683 >/dev/null 2>/dev/null selfserv_9709 with PID 7683 found at Mon Apr 25 14:56:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2443: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 7683 at Mon Apr 25 14:56:29 UTC 2016 kill -USR1 7683 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7683 killed at Mon Apr 25 14:56:29 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:56:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:56:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8069 >/dev/null 2>/dev/null selfserv_9709 with PID 8069 found at Mon Apr 25 14:56:29 UTC 2016 selfserv_9709 with PID 8069 started at Mon Apr 25 14:56:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2444: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8069 >/dev/null 2>/dev/null selfserv_9709 with PID 8069 found at Mon Apr 25 14:56:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2445: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8069 >/dev/null 2>/dev/null selfserv_9709 with PID 8069 found at Mon Apr 25 14:56:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2446: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8069 >/dev/null 2>/dev/null selfserv_9709 with PID 8069 found at Mon Apr 25 14:56:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2447: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8069 >/dev/null 2>/dev/null selfserv_9709 with PID 8069 found at Mon Apr 25 14:56:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2448: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 8069 at Mon Apr 25 14:56:33 UTC 2016 kill -USR1 8069 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8069 killed at Mon Apr 25 14:56:33 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:56:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:56:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:33 UTC 2016 selfserv_9709 with PID 8217 started at Mon Apr 25 14:56:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2449: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2450: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2451: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2452: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2453: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2454: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2455: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2456: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2457: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2458: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2459: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2460: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2461: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2462: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8217 >/dev/null 2>/dev/null selfserv_9709 with PID 8217 found at Mon Apr 25 14:56:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2463: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 8217 at Mon Apr 25 14:56:45 UTC 2016 kill -USR1 8217 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8217 killed at Mon Apr 25 14:56:45 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:56:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:56:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8603 >/dev/null 2>/dev/null selfserv_9709 with PID 8603 found at Mon Apr 25 14:56:46 UTC 2016 selfserv_9709 with PID 8603 started at Mon Apr 25 14:56:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2464: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8603 >/dev/null 2>/dev/null selfserv_9709 with PID 8603 found at Mon Apr 25 14:56:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2465: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8603 >/dev/null 2>/dev/null selfserv_9709 with PID 8603 found at Mon Apr 25 14:56:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2466: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8603 >/dev/null 2>/dev/null selfserv_9709 with PID 8603 found at Mon Apr 25 14:56:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2467: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8603 >/dev/null 2>/dev/null selfserv_9709 with PID 8603 found at Mon Apr 25 14:56:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2468: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 8603 at Mon Apr 25 14:56:49 UTC 2016 kill -USR1 8603 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8603 killed at Mon Apr 25 14:56:49 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 14:56:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:56:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:50 UTC 2016 selfserv_9709 with PID 8751 started at Mon Apr 25 14:56:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2469: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2470: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2471: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2472: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2473: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2474: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2475: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2476: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2477: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2478: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2479: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2480: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 14:56:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2481: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8751 at Mon Apr 25 14:56:59 UTC 2016 kill -USR1 8751 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8751 killed at Mon Apr 25 14:56:59 UTC 2016 ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:56:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:56:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9135 >/dev/null 2>/dev/null selfserv_9709 with PID 9135 found at Mon Apr 25 14:57:00 UTC 2016 selfserv_9709 with PID 9135 started at Mon Apr 25 14:57:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2482: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9135 at Mon Apr 25 14:57:01 UTC 2016 kill -USR1 9135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9135 killed at Mon Apr 25 14:57:01 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9205 >/dev/null 2>/dev/null selfserv_9709 with PID 9205 found at Mon Apr 25 14:57:02 UTC 2016 selfserv_9709 with PID 9205 started at Mon Apr 25 14:57:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2483: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9205 at Mon Apr 25 14:57:03 UTC 2016 kill -USR1 9205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9205 killed at Mon Apr 25 14:57:03 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9262 >/dev/null 2>/dev/null selfserv_9709 with PID 9262 found at Mon Apr 25 14:57:04 UTC 2016 selfserv_9709 with PID 9262 started at Mon Apr 25 14:57:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2484: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9262 at Mon Apr 25 14:57:05 UTC 2016 kill -USR1 9262 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9262 killed at Mon Apr 25 14:57:05 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9319 >/dev/null 2>/dev/null selfserv_9709 with PID 9319 found at Mon Apr 25 14:57:06 UTC 2016 selfserv_9709 with PID 9319 started at Mon Apr 25 14:57:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2485: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9319 at Mon Apr 25 14:57:06 UTC 2016 kill -USR1 9319 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9319 killed at Mon Apr 25 14:57:07 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9379 >/dev/null 2>/dev/null selfserv_9709 with PID 9379 found at Mon Apr 25 14:57:07 UTC 2016 selfserv_9709 with PID 9379 started at Mon Apr 25 14:57:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2486: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9379 at Mon Apr 25 14:57:08 UTC 2016 kill -USR1 9379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9379 killed at Mon Apr 25 14:57:09 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9436 >/dev/null 2>/dev/null selfserv_9709 with PID 9436 found at Mon Apr 25 14:57:09 UTC 2016 selfserv_9709 with PID 9436 started at Mon Apr 25 14:57:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2487: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9436 at Mon Apr 25 14:57:10 UTC 2016 kill -USR1 9436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9436 killed at Mon Apr 25 14:57:11 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9493 >/dev/null 2>/dev/null selfserv_9709 with PID 9493 found at Mon Apr 25 14:57:11 UTC 2016 selfserv_9709 with PID 9493 started at Mon Apr 25 14:57:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2488: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9493 at Mon Apr 25 14:57:12 UTC 2016 kill -USR1 9493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9493 killed at Mon Apr 25 14:57:12 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9550 >/dev/null 2>/dev/null selfserv_9709 with PID 9550 found at Mon Apr 25 14:57:13 UTC 2016 selfserv_9709 with PID 9550 started at Mon Apr 25 14:57:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2489: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9550 at Mon Apr 25 14:57:14 UTC 2016 kill -USR1 9550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9550 killed at Mon Apr 25 14:57:14 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9607 >/dev/null 2>/dev/null selfserv_9709 with PID 9607 found at Mon Apr 25 14:57:15 UTC 2016 selfserv_9709 with PID 9607 started at Mon Apr 25 14:57:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2490: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9607 at Mon Apr 25 14:57:16 UTC 2016 kill -USR1 9607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9607 killed at Mon Apr 25 14:57:16 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9664 >/dev/null 2>/dev/null selfserv_9709 with PID 9664 found at Mon Apr 25 14:57:16 UTC 2016 selfserv_9709 with PID 9664 started at Mon Apr 25 14:57:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2491: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9664 at Mon Apr 25 14:57:17 UTC 2016 kill -USR1 9664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9664 killed at Mon Apr 25 14:57:18 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9721 >/dev/null 2>/dev/null selfserv_9709 with PID 9721 found at Mon Apr 25 14:57:18 UTC 2016 selfserv_9709 with PID 9721 started at Mon Apr 25 14:57:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2492: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9721 at Mon Apr 25 14:57:19 UTC 2016 kill -USR1 9721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9721 killed at Mon Apr 25 14:57:19 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9779 >/dev/null 2>/dev/null selfserv_9709 with PID 9779 found at Mon Apr 25 14:57:20 UTC 2016 selfserv_9709 with PID 9779 started at Mon Apr 25 14:57:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2493: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9779 at Mon Apr 25 14:57:21 UTC 2016 kill -USR1 9779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9779 killed at Mon Apr 25 14:57:21 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9836 >/dev/null 2>/dev/null selfserv_9709 with PID 9836 found at Mon Apr 25 14:57:22 UTC 2016 selfserv_9709 with PID 9836 started at Mon Apr 25 14:57:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2494: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9836 at Mon Apr 25 14:57:23 UTC 2016 kill -USR1 9836 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9836 killed at Mon Apr 25 14:57:23 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9893 >/dev/null 2>/dev/null selfserv_9709 with PID 9893 found at Mon Apr 25 14:57:24 UTC 2016 selfserv_9709 with PID 9893 started at Mon Apr 25 14:57:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2495: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9893 at Mon Apr 25 14:57:25 UTC 2016 kill -USR1 9893 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9893 killed at Mon Apr 25 14:57:25 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9950 >/dev/null 2>/dev/null selfserv_9709 with PID 9950 found at Mon Apr 25 14:57:26 UTC 2016 selfserv_9709 with PID 9950 started at Mon Apr 25 14:57:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2496: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9950 at Mon Apr 25 14:57:27 UTC 2016 kill -USR1 9950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9950 killed at Mon Apr 25 14:57:28 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10007 >/dev/null 2>/dev/null selfserv_9709 with PID 10007 found at Mon Apr 25 14:57:28 UTC 2016 selfserv_9709 with PID 10007 started at Mon Apr 25 14:57:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2497: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10007 at Mon Apr 25 14:57:29 UTC 2016 kill -USR1 10007 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10007 killed at Mon Apr 25 14:57:30 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10064 >/dev/null 2>/dev/null selfserv_9709 with PID 10064 found at Mon Apr 25 14:57:30 UTC 2016 selfserv_9709 with PID 10064 started at Mon Apr 25 14:57:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2498: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10064 at Mon Apr 25 14:57:31 UTC 2016 kill -USR1 10064 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10064 killed at Mon Apr 25 14:57:32 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10121 >/dev/null 2>/dev/null selfserv_9709 with PID 10121 found at Mon Apr 25 14:57:32 UTC 2016 selfserv_9709 with PID 10121 started at Mon Apr 25 14:57:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2499: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10121 at Mon Apr 25 14:57:33 UTC 2016 kill -USR1 10121 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10121 killed at Mon Apr 25 14:57:34 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10178 >/dev/null 2>/dev/null selfserv_9709 with PID 10178 found at Mon Apr 25 14:57:34 UTC 2016 selfserv_9709 with PID 10178 started at Mon Apr 25 14:57:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2500: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10178 at Mon Apr 25 14:57:36 UTC 2016 kill -USR1 10178 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10178 killed at Mon Apr 25 14:57:36 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10235 >/dev/null 2>/dev/null selfserv_9709 with PID 10235 found at Mon Apr 25 14:57:37 UTC 2016 selfserv_9709 with PID 10235 started at Mon Apr 25 14:57:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2501: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10235 at Mon Apr 25 14:57:38 UTC 2016 kill -USR1 10235 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10235 killed at Mon Apr 25 14:57:38 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10292 >/dev/null 2>/dev/null selfserv_9709 with PID 10292 found at Mon Apr 25 14:57:39 UTC 2016 selfserv_9709 with PID 10292 started at Mon Apr 25 14:57:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2502: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10292 at Mon Apr 25 14:57:40 UTC 2016 kill -USR1 10292 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10292 killed at Mon Apr 25 14:57:40 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10350 >/dev/null 2>/dev/null selfserv_9709 with PID 10350 found at Mon Apr 25 14:57:41 UTC 2016 selfserv_9709 with PID 10350 started at Mon Apr 25 14:57:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2503: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10350 at Mon Apr 25 14:57:42 UTC 2016 kill -USR1 10350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10350 killed at Mon Apr 25 14:57:42 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10407 >/dev/null 2>/dev/null selfserv_9709 with PID 10407 found at Mon Apr 25 14:57:43 UTC 2016 selfserv_9709 with PID 10407 started at Mon Apr 25 14:57:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2504: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10407 at Mon Apr 25 14:57:44 UTC 2016 kill -USR1 10407 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10407 killed at Mon Apr 25 14:57:44 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10464 >/dev/null 2>/dev/null selfserv_9709 with PID 10464 found at Mon Apr 25 14:57:45 UTC 2016 selfserv_9709 with PID 10464 started at Mon Apr 25 14:57:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2505: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10464 at Mon Apr 25 14:57:46 UTC 2016 kill -USR1 10464 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10464 killed at Mon Apr 25 14:57:47 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10521 >/dev/null 2>/dev/null selfserv_9709 with PID 10521 found at Mon Apr 25 14:57:47 UTC 2016 selfserv_9709 with PID 10521 started at Mon Apr 25 14:57:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2506: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10521 at Mon Apr 25 14:57:48 UTC 2016 kill -USR1 10521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10521 killed at Mon Apr 25 14:57:48 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10578 >/dev/null 2>/dev/null selfserv_9709 with PID 10578 found at Mon Apr 25 14:57:49 UTC 2016 selfserv_9709 with PID 10578 started at Mon Apr 25 14:57:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2507: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10578 at Mon Apr 25 14:57:50 UTC 2016 kill -USR1 10578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10578 killed at Mon Apr 25 14:57:50 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10635 >/dev/null 2>/dev/null selfserv_9709 with PID 10635 found at Mon Apr 25 14:57:51 UTC 2016 selfserv_9709 with PID 10635 started at Mon Apr 25 14:57:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2508: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10635 at Mon Apr 25 14:57:52 UTC 2016 kill -USR1 10635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10635 killed at Mon Apr 25 14:57:52 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10692 >/dev/null 2>/dev/null selfserv_9709 with PID 10692 found at Mon Apr 25 14:57:53 UTC 2016 selfserv_9709 with PID 10692 started at Mon Apr 25 14:57:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2509: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10692 at Mon Apr 25 14:57:54 UTC 2016 kill -USR1 10692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10692 killed at Mon Apr 25 14:57:54 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10749 >/dev/null 2>/dev/null selfserv_9709 with PID 10749 found at Mon Apr 25 14:57:55 UTC 2016 selfserv_9709 with PID 10749 started at Mon Apr 25 14:57:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2510: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10749 at Mon Apr 25 14:57:56 UTC 2016 kill -USR1 10749 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10749 killed at Mon Apr 25 14:57:56 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:57:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10806 >/dev/null 2>/dev/null selfserv_9709 with PID 10806 found at Mon Apr 25 14:57:57 UTC 2016 selfserv_9709 with PID 10806 started at Mon Apr 25 14:57:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2511: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10806 at Mon Apr 25 14:57:58 UTC 2016 kill -USR1 10806 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10806 killed at Mon Apr 25 14:57:58 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:57:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:57:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10878 >/dev/null 2>/dev/null selfserv_9709 with PID 10878 found at Mon Apr 25 14:57:59 UTC 2016 selfserv_9709 with PID 10878 started at Mon Apr 25 14:57:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2512: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10878 at Mon Apr 25 14:57:59 UTC 2016 kill -USR1 10878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10878 killed at Mon Apr 25 14:58:00 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10935 >/dev/null 2>/dev/null selfserv_9709 with PID 10935 found at Mon Apr 25 14:58:00 UTC 2016 selfserv_9709 with PID 10935 started at Mon Apr 25 14:58:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2513: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10935 at Mon Apr 25 14:58:02 UTC 2016 kill -USR1 10935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10935 killed at Mon Apr 25 14:58:02 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:58:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11006 >/dev/null 2>/dev/null selfserv_9709 with PID 11006 found at Mon Apr 25 14:58:03 UTC 2016 selfserv_9709 with PID 11006 started at Mon Apr 25 14:58:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2514: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11006 at Mon Apr 25 14:58:03 UTC 2016 kill -USR1 11006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11006 killed at Mon Apr 25 14:58:04 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11063 >/dev/null 2>/dev/null selfserv_9709 with PID 11063 found at Mon Apr 25 14:58:04 UTC 2016 selfserv_9709 with PID 11063 started at Mon Apr 25 14:58:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2515: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11063 at Mon Apr 25 14:58:05 UTC 2016 kill -USR1 11063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11063 killed at Mon Apr 25 14:58:06 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:58:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11120 >/dev/null 2>/dev/null selfserv_9709 with PID 11120 found at Mon Apr 25 14:58:06 UTC 2016 selfserv_9709 with PID 11120 started at Mon Apr 25 14:58:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2516: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11120 at Mon Apr 25 14:58:07 UTC 2016 kill -USR1 11120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11120 killed at Mon Apr 25 14:58:08 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11180 >/dev/null 2>/dev/null selfserv_9709 with PID 11180 found at Mon Apr 25 14:58:08 UTC 2016 selfserv_9709 with PID 11180 started at Mon Apr 25 14:58:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2517: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11180 at Mon Apr 25 14:58:09 UTC 2016 kill -USR1 11180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11180 killed at Mon Apr 25 14:58:10 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:58:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11237 >/dev/null 2>/dev/null selfserv_9709 with PID 11237 found at Mon Apr 25 14:58:10 UTC 2016 selfserv_9709 with PID 11237 started at Mon Apr 25 14:58:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2518: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11237 at Mon Apr 25 14:58:11 UTC 2016 kill -USR1 11237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11237 killed at Mon Apr 25 14:58:11 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11294 >/dev/null 2>/dev/null selfserv_9709 with PID 11294 found at Mon Apr 25 14:58:12 UTC 2016 selfserv_9709 with PID 11294 started at Mon Apr 25 14:58:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2519: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11294 at Mon Apr 25 14:58:13 UTC 2016 kill -USR1 11294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11294 killed at Mon Apr 25 14:58:13 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:58:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11351 >/dev/null 2>/dev/null selfserv_9709 with PID 11351 found at Mon Apr 25 14:58:14 UTC 2016 selfserv_9709 with PID 11351 started at Mon Apr 25 14:58:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2520: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11351 at Mon Apr 25 14:58:15 UTC 2016 kill -USR1 11351 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11351 killed at Mon Apr 25 14:58:15 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11408 >/dev/null 2>/dev/null selfserv_9709 with PID 11408 found at Mon Apr 25 14:58:16 UTC 2016 selfserv_9709 with PID 11408 started at Mon Apr 25 14:58:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2521: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11408 at Mon Apr 25 14:58:17 UTC 2016 kill -USR1 11408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11408 killed at Mon Apr 25 14:58:18 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:58:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11465 >/dev/null 2>/dev/null selfserv_9709 with PID 11465 found at Mon Apr 25 14:58:18 UTC 2016 selfserv_9709 with PID 11465 started at Mon Apr 25 14:58:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2522: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11465 at Mon Apr 25 14:58:19 UTC 2016 kill -USR1 11465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11465 killed at Mon Apr 25 14:58:20 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11522 >/dev/null 2>/dev/null selfserv_9709 with PID 11522 found at Mon Apr 25 14:58:20 UTC 2016 selfserv_9709 with PID 11522 started at Mon Apr 25 14:58:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2523: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11522 at Mon Apr 25 14:58:22 UTC 2016 kill -USR1 11522 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11522 killed at Mon Apr 25 14:58:22 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:58:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11580 >/dev/null 2>/dev/null selfserv_9709 with PID 11580 found at Mon Apr 25 14:58:22 UTC 2016 selfserv_9709 with PID 11580 started at Mon Apr 25 14:58:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2524: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11580 at Mon Apr 25 14:58:24 UTC 2016 kill -USR1 11580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11580 killed at Mon Apr 25 14:58:24 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11637 >/dev/null 2>/dev/null selfserv_9709 with PID 11637 found at Mon Apr 25 14:58:25 UTC 2016 selfserv_9709 with PID 11637 started at Mon Apr 25 14:58:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2525: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11637 at Mon Apr 25 14:58:26 UTC 2016 kill -USR1 11637 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11637 killed at Mon Apr 25 14:58:26 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:58:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11694 >/dev/null 2>/dev/null selfserv_9709 with PID 11694 found at Mon Apr 25 14:58:27 UTC 2016 selfserv_9709 with PID 11694 started at Mon Apr 25 14:58:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2526: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11694 at Mon Apr 25 14:58:28 UTC 2016 kill -USR1 11694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11694 killed at Mon Apr 25 14:58:28 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11751 >/dev/null 2>/dev/null selfserv_9709 with PID 11751 found at Mon Apr 25 14:58:29 UTC 2016 selfserv_9709 with PID 11751 started at Mon Apr 25 14:58:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2527: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11751 at Mon Apr 25 14:58:30 UTC 2016 kill -USR1 11751 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11751 killed at Mon Apr 25 14:58:31 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:58:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11808 >/dev/null 2>/dev/null selfserv_9709 with PID 11808 found at Mon Apr 25 14:58:31 UTC 2016 selfserv_9709 with PID 11808 started at Mon Apr 25 14:58:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2528: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11808 at Mon Apr 25 14:58:32 UTC 2016 kill -USR1 11808 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11808 killed at Mon Apr 25 14:58:33 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11865 >/dev/null 2>/dev/null selfserv_9709 with PID 11865 found at Mon Apr 25 14:58:33 UTC 2016 selfserv_9709 with PID 11865 started at Mon Apr 25 14:58:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2529: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11865 at Mon Apr 25 14:58:34 UTC 2016 kill -USR1 11865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11865 killed at Mon Apr 25 14:58:35 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 14:58:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11922 >/dev/null 2>/dev/null selfserv_9709 with PID 11922 found at Mon Apr 25 14:58:35 UTC 2016 selfserv_9709 with PID 11922 started at Mon Apr 25 14:58:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2530: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11922 at Mon Apr 25 14:58:36 UTC 2016 kill -USR1 11922 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11922 killed at Mon Apr 25 14:58:37 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11979 >/dev/null 2>/dev/null selfserv_9709 with PID 11979 found at Mon Apr 25 14:58:37 UTC 2016 selfserv_9709 with PID 11979 started at Mon Apr 25 14:58:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2531: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11979 at Mon Apr 25 14:58:38 UTC 2016 kill -USR1 11979 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11979 killed at Mon Apr 25 14:58:39 UTC 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 14:58:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12151 >/dev/null 2>/dev/null selfserv_9709 with PID 12151 found at Mon Apr 25 14:58:40 UTC 2016 selfserv_9709 with PID 12151 started at Mon Apr 25 14:58:40 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 14:58:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:58:41 UTC 2016 ssl.sh: #2532: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12151 at Mon Apr 25 14:58:41 UTC 2016 kill -USR1 12151 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12151 killed at Mon Apr 25 14:58:42 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 14:58:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12228 >/dev/null 2>/dev/null selfserv_9709 with PID 12228 found at Mon Apr 25 14:58:42 UTC 2016 selfserv_9709 with PID 12228 started at Mon Apr 25 14:58:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 14:58:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:58:44 UTC 2016 ssl.sh: #2533: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12228 at Mon Apr 25 14:58:44 UTC 2016 kill -USR1 12228 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12228 killed at Mon Apr 25 14:58:44 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 14:58:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12304 >/dev/null 2>/dev/null selfserv_9709 with PID 12304 found at Mon Apr 25 14:58:45 UTC 2016 selfserv_9709 with PID 12304 started at Mon Apr 25 14:58:45 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:58:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:58:46 UTC 2016 ssl.sh: #2534: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12304 at Mon Apr 25 14:58:46 UTC 2016 kill -USR1 12304 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12304 killed at Mon Apr 25 14:58:47 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 14:58:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12380 >/dev/null 2>/dev/null selfserv_9709 with PID 12380 found at Mon Apr 25 14:58:47 UTC 2016 selfserv_9709 with PID 12380 started at Mon Apr 25 14:58:47 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:58:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:58:49 UTC 2016 ssl.sh: #2535: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12380 at Mon Apr 25 14:58:49 UTC 2016 kill -USR1 12380 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12380 killed at Mon Apr 25 14:58:49 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 14:58:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12456 >/dev/null 2>/dev/null selfserv_9709 with PID 12456 found at Mon Apr 25 14:58:50 UTC 2016 selfserv_9709 with PID 12456 started at Mon Apr 25 14:58:50 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:58:50 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:58:52 UTC 2016 ssl.sh: #2536: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12456 at Mon Apr 25 14:58:52 UTC 2016 kill -USR1 12456 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12456 killed at Mon Apr 25 14:58:52 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 14:58:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12532 >/dev/null 2>/dev/null selfserv_9709 with PID 12532 found at Mon Apr 25 14:58:53 UTC 2016 selfserv_9709 with PID 12532 started at Mon Apr 25 14:58:53 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:58:53 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:58:55 UTC 2016 ssl.sh: #2537: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12532 at Mon Apr 25 14:58:55 UTC 2016 kill -USR1 12532 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12532 killed at Mon Apr 25 14:58:55 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 14:58:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12608 >/dev/null 2>/dev/null selfserv_9709 with PID 12608 found at Mon Apr 25 14:58:56 UTC 2016 selfserv_9709 with PID 12608 started at Mon Apr 25 14:58:56 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:58:56 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 14:58:58 UTC 2016 ssl.sh: #2538: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12608 at Mon Apr 25 14:58:58 UTC 2016 kill -USR1 12608 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12608 killed at Mon Apr 25 14:58:58 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:58:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:58:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12713 >/dev/null 2>/dev/null selfserv_9709 with PID 12713 found at Mon Apr 25 14:58:59 UTC 2016 selfserv_9709 with PID 12713 started at Mon Apr 25 14:58:59 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 14:58:59 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:59:03 UTC 2016 ssl.sh: #2539: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12713 at Mon Apr 25 14:59:03 UTC 2016 kill -USR1 12713 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12713 killed at Mon Apr 25 14:59:04 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:59:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12803 >/dev/null 2>/dev/null selfserv_9709 with PID 12803 found at Mon Apr 25 14:59:04 UTC 2016 selfserv_9709 with PID 12803 started at Mon Apr 25 14:59:04 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3: -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:59:09 UTC 2016 ssl.sh: #2540: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12803 at Mon Apr 25 14:59:09 UTC 2016 kill -USR1 12803 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12803 killed at Mon Apr 25 14:59:09 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:59:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12881 >/dev/null 2>/dev/null selfserv_9709 with PID 12881 found at Mon Apr 25 14:59:10 UTC 2016 selfserv_9709 with PID 12881 started at Mon Apr 25 14:59:10 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:59:11 UTC 2016 ssl.sh: #2541: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12881 at Mon Apr 25 14:59:11 UTC 2016 kill -USR1 12881 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12881 killed at Mon Apr 25 14:59:11 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:59:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12957 >/dev/null 2>/dev/null selfserv_9709 with PID 12957 found at Mon Apr 25 14:59:12 UTC 2016 selfserv_9709 with PID 12957 started at Mon Apr 25 14:59:12 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:59:13 UTC 2016 ssl.sh: #2542: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12957 at Mon Apr 25 14:59:13 UTC 2016 kill -USR1 12957 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12957 killed at Mon Apr 25 14:59:13 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 14:59:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13033 >/dev/null 2>/dev/null selfserv_9709 with PID 13033 found at Mon Apr 25 14:59:14 UTC 2016 selfserv_9709 with PID 13033 started at Mon Apr 25 14:59:14 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 14:59:15 UTC 2016 ssl.sh: #2543: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13033 at Mon Apr 25 14:59:15 UTC 2016 kill -USR1 13033 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13033 killed at Mon Apr 25 14:59:15 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 14:59:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13109 >/dev/null 2>/dev/null selfserv_9709 with PID 13109 found at Mon Apr 25 14:59:15 UTC 2016 selfserv_9709 with PID 13109 started at Mon Apr 25 14:59:16 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:59:16 UTC 2016 ssl.sh: #2544: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13109 at Mon Apr 25 14:59:16 UTC 2016 kill -USR1 13109 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13109 killed at Mon Apr 25 14:59:17 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 14:59:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13185 >/dev/null 2>/dev/null selfserv_9709 with PID 13185 found at Mon Apr 25 14:59:17 UTC 2016 selfserv_9709 with PID 13185 started at Mon Apr 25 14:59:17 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 14:59:18 UTC 2016 ssl.sh: #2545: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13185 at Mon Apr 25 14:59:18 UTC 2016 kill -USR1 13185 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13185 killed at Mon Apr 25 14:59:19 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:59:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13290 >/dev/null 2>/dev/null selfserv_9709 with PID 13290 found at Mon Apr 25 14:59:19 UTC 2016 selfserv_9709 with PID 13290 started at Mon Apr 25 14:59:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:59:30 UTC 2016 ssl.sh: #2546: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13290 at Mon Apr 25 14:59:30 UTC 2016 kill -USR1 13290 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13290 killed at Mon Apr 25 14:59:30 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:59:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13366 >/dev/null 2>/dev/null selfserv_9709 with PID 13366 found at Mon Apr 25 14:59:31 UTC 2016 selfserv_9709 with PID 13366 started at Mon Apr 25 14:59:31 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:31 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:59:41 UTC 2016 ssl.sh: #2547: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13366 at Mon Apr 25 14:59:41 UTC 2016 kill -USR1 13366 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13366 killed at Mon Apr 25 14:59:41 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:59:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13441 >/dev/null 2>/dev/null selfserv_9709 with PID 13441 found at Mon Apr 25 14:59:42 UTC 2016 selfserv_9709 with PID 13441 started at Mon Apr 25 14:59:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 14:59:52 UTC 2016 ssl.sh: #2548: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13441 at Mon Apr 25 14:59:52 UTC 2016 kill -USR1 13441 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13441 killed at Mon Apr 25 14:59:52 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 14:59:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 14:59:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13517 >/dev/null 2>/dev/null selfserv_9709 with PID 13517 found at Mon Apr 25 14:59:53 UTC 2016 selfserv_9709 with PID 13517 started at Mon Apr 25 14:59:53 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 14:59:53 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:00:03 UTC 2016 ssl.sh: #2549: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13517 at Mon Apr 25 15:00:03 UTC 2016 kill -USR1 13517 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13517 killed at Mon Apr 25 15:00:03 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:00:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13605 >/dev/null 2>/dev/null selfserv_9709 with PID 13605 found at Mon Apr 25 15:00:04 UTC 2016 selfserv_9709 with PID 13605 started at Mon Apr 25 15:00:04 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:00:06 UTC 2016 ssl.sh: #2550: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13605 at Mon Apr 25 15:00:06 UTC 2016 kill -USR1 13605 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13605 killed at Mon Apr 25 15:00:06 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 15:00:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13681 >/dev/null 2>/dev/null selfserv_9709 with PID 13681 found at Mon Apr 25 15:00:07 UTC 2016 selfserv_9709 with PID 13681 started at Mon Apr 25 15:00:07 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:07 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:00:08 UTC 2016 ssl.sh: #2551: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13681 at Mon Apr 25 15:00:08 UTC 2016 kill -USR1 13681 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13681 killed at Mon Apr 25 15:00:09 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 15:00:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13760 >/dev/null 2>/dev/null selfserv_9709 with PID 13760 found at Mon Apr 25 15:00:09 UTC 2016 selfserv_9709 with PID 13760 started at Mon Apr 25 15:00:09 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:00:11 UTC 2016 ssl.sh: #2552: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13760 at Mon Apr 25 15:00:11 UTC 2016 kill -USR1 13760 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13760 killed at Mon Apr 25 15:00:11 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 15:00:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13836 >/dev/null 2>/dev/null selfserv_9709 with PID 13836 found at Mon Apr 25 15:00:12 UTC 2016 selfserv_9709 with PID 13836 started at Mon Apr 25 15:00:12 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:00:13 UTC 2016 ssl.sh: #2553: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13836 at Mon Apr 25 15:00:14 UTC 2016 kill -USR1 13836 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13836 killed at Mon Apr 25 15:00:14 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 15:00:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13912 >/dev/null 2>/dev/null selfserv_9709 with PID 13912 found at Mon Apr 25 15:00:14 UTC 2016 selfserv_9709 with PID 13912 started at Mon Apr 25 15:00:14 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:00:16 UTC 2016 ssl.sh: #2554: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13912 at Mon Apr 25 15:00:16 UTC 2016 kill -USR1 13912 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13912 killed at Mon Apr 25 15:00:17 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 15:00:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13988 >/dev/null 2>/dev/null selfserv_9709 with PID 13988 found at Mon Apr 25 15:00:17 UTC 2016 selfserv_9709 with PID 13988 started at Mon Apr 25 15:00:17 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:00:18 UTC 2016 ssl.sh: #2555: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13988 at Mon Apr 25 15:00:18 UTC 2016 kill -USR1 13988 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13988 killed at Mon Apr 25 15:00:19 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:00:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14085 >/dev/null 2>/dev/null selfserv_9709 with PID 14085 found at Mon Apr 25 15:00:19 UTC 2016 selfserv_9709 with PID 14085 started at Mon Apr 25 15:00:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:00:22 UTC 2016 ssl.sh: #2556: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14085 at Mon Apr 25 15:00:22 UTC 2016 kill -USR1 14085 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14085 killed at Mon Apr 25 15:00:22 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:00:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14160 >/dev/null 2>/dev/null selfserv_9709 with PID 14160 found at Mon Apr 25 15:00:23 UTC 2016 selfserv_9709 with PID 14160 started at Mon Apr 25 15:00:23 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:00:24 UTC 2016 ssl.sh: #2557: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14160 at Mon Apr 25 15:00:24 UTC 2016 kill -USR1 14160 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14160 killed at Mon Apr 25 15:00:25 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:00:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14237 >/dev/null 2>/dev/null selfserv_9709 with PID 14237 found at Mon Apr 25 15:00:25 UTC 2016 selfserv_9709 with PID 14237 started at Mon Apr 25 15:00:25 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:00:28 UTC 2016 ssl.sh: #2558: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14237 at Mon Apr 25 15:00:28 UTC 2016 kill -USR1 14237 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14237 killed at Mon Apr 25 15:00:28 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:00:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14312 >/dev/null 2>/dev/null selfserv_9709 with PID 14312 found at Mon Apr 25 15:00:29 UTC 2016 selfserv_9709 with PID 14312 started at Mon Apr 25 15:00:29 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:00:29 UTC 2016 ssl.sh: #2559: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14312 at Mon Apr 25 15:00:30 UTC 2016 kill -USR1 14312 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14312 killed at Mon Apr 25 15:00:30 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 15:00:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14387 >/dev/null 2>/dev/null selfserv_9709 with PID 14387 found at Mon Apr 25 15:00:30 UTC 2016 selfserv_9709 with PID 14387 started at Mon Apr 25 15:00:30 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:30 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:00:31 UTC 2016 ssl.sh: #2560: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14387 at Mon Apr 25 15:00:32 UTC 2016 kill -USR1 14387 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14387 killed at Mon Apr 25 15:00:32 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:00:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14463 >/dev/null 2>/dev/null selfserv_9709 with PID 14463 found at Mon Apr 25 15:00:32 UTC 2016 selfserv_9709 with PID 14463 started at Mon Apr 25 15:00:32 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:00:34 UTC 2016 ssl.sh: #2561: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14463 at Mon Apr 25 15:00:34 UTC 2016 kill -USR1 14463 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14463 killed at Mon Apr 25 15:00:34 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:00:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14560 >/dev/null 2>/dev/null selfserv_9709 with PID 14560 found at Mon Apr 25 15:00:35 UTC 2016 selfserv_9709 with PID 14560 started at Mon Apr 25 15:00:35 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:00:40 UTC 2016 ssl.sh: #2562: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14560 at Mon Apr 25 15:00:40 UTC 2016 kill -USR1 14560 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14560 killed at Mon Apr 25 15:00:41 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 15:00:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14636 >/dev/null 2>/dev/null selfserv_9709 with PID 14636 found at Mon Apr 25 15:00:41 UTC 2016 selfserv_9709 with PID 14636 started at Mon Apr 25 15:00:41 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:41 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:00:43 UTC 2016 ssl.sh: #2563: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14636 at Mon Apr 25 15:00:43 UTC 2016 kill -USR1 14636 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14636 killed at Mon Apr 25 15:00:44 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:00:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14712 >/dev/null 2>/dev/null selfserv_9709 with PID 14712 found at Mon Apr 25 15:00:44 UTC 2016 selfserv_9709 with PID 14712 started at Mon Apr 25 15:00:44 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:44 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:00:50 UTC 2016 ssl.sh: #2564: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14712 at Mon Apr 25 15:00:50 UTC 2016 kill -USR1 14712 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14712 killed at Mon Apr 25 15:00:50 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:00:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:00:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14788 >/dev/null 2>/dev/null selfserv_9709 with PID 14788 found at Mon Apr 25 15:00:51 UTC 2016 selfserv_9709 with PID 14788 started at Mon Apr 25 15:00:51 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:00:51 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:01:01 UTC 2016 ssl.sh: #2565: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14788 at Mon Apr 25 15:01:01 UTC 2016 kill -USR1 14788 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14788 killed at Mon Apr 25 15:01:01 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:01:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:01:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14877 >/dev/null 2>/dev/null selfserv_9709 with PID 14877 found at Mon Apr 25 15:01:02 UTC 2016 selfserv_9709 with PID 14877 started at Mon Apr 25 15:01:02 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:01:02 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:02:31 UTC 2016 ssl.sh: #2566: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14877 at Mon Apr 25 15:02:31 UTC 2016 kill -USR1 14877 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14877 killed at Mon Apr 25 15:02:31 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 15:02:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:02:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15023 >/dev/null 2>/dev/null selfserv_9709 with PID 15023 found at Mon Apr 25 15:02:32 UTC 2016 selfserv_9709 with PID 15023 started at Mon Apr 25 15:02:32 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:02:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:04:02 UTC 2016 ssl.sh: #2567: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15023 at Mon Apr 25 15:04:02 UTC 2016 kill -USR1 15023 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15023 killed at Mon Apr 25 15:04:02 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:04:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:04:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15131 >/dev/null 2>/dev/null selfserv_9709 with PID 15131 found at Mon Apr 25 15:04:03 UTC 2016 selfserv_9709 with PID 15131 started at Mon Apr 25 15:04:03 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:04:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:04:08 UTC 2016 ssl.sh: #2568: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15131 at Mon Apr 25 15:04:08 UTC 2016 kill -USR1 15131 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15131 killed at Mon Apr 25 15:04:09 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:04:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:04:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15209 >/dev/null 2>/dev/null selfserv_9709 with PID 15209 found at Mon Apr 25 15:04:09 UTC 2016 selfserv_9709 with PID 15209 started at Mon Apr 25 15:04:09 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:04:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:04:15 UTC 2016 ssl.sh: #2569: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15209 at Mon Apr 25 15:04:15 UTC 2016 kill -USR1 15209 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15209 killed at Mon Apr 25 15:04:16 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:04:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:04:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15306 >/dev/null 2>/dev/null selfserv_9709 with PID 15306 found at Mon Apr 25 15:04:16 UTC 2016 selfserv_9709 with PID 15306 started at Mon Apr 25 15:04:16 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:04:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:04:31 UTC 2016 ssl.sh: #2570: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15306 at Mon Apr 25 15:04:31 UTC 2016 kill -USR1 15306 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15306 killed at Mon Apr 25 15:04:32 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:04:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:04:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15382 >/dev/null 2>/dev/null selfserv_9709 with PID 15382 found at Mon Apr 25 15:04:32 UTC 2016 selfserv_9709 with PID 15382 started at Mon Apr 25 15:04:32 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:04:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:04:34 UTC 2016 ssl.sh: #2571: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15382 at Mon Apr 25 15:04:34 UTC 2016 kill -USR1 15382 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15382 killed at Mon Apr 25 15:04:35 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:04:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:04:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15472 >/dev/null 2>/dev/null selfserv_9709 with PID 15472 found at Mon Apr 25 15:04:35 UTC 2016 selfserv_9709 with PID 15472 started at Mon Apr 25 15:04:35 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:04:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:07:00 UTC 2016 ssl.sh: #2572: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15472 at Mon Apr 25 15:07:01 UTC 2016 kill -USR1 15472 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15472 killed at Mon Apr 25 15:07:01 UTC 2016 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #2573: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -list ssl.sh: #2574: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #2575: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #2576: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -list ssl.sh: #2577: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #2578: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal - with ECC =============================== selfserv_9709 starting at Mon Apr 25 15:07:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:07:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:04 UTC 2016 selfserv_9709 with PID 15659 started at Mon Apr 25 15:07:04 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2579: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2580: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2581: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2582: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2583: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2584: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2585: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2586: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2587: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2588: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2589: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2590: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2591: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2592: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2593: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2594: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2595: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2596: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2597: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2598: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2599: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2600: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2601: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2602: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2603: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2604: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2605: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2606: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2607: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2608: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2609: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2610: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2611: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2612: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2613: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2614: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2615: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2616: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2617: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2618: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2619: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2620: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2621: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2622: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2623: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2624: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2625: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2626: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2627: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2628: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2629: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2630: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2631: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2632: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2633: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2634: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2635: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2636: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2637: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2638: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2639: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2640: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2641: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2642: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2643: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2644: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2645: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 15659 >/dev/null 2>/dev/null selfserv_9709 with PID 15659 found at Mon Apr 25 15:07:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2646: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 15659 at Mon Apr 25 15:07:50 UTC 2016 kill -USR1 15659 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15659 killed at Mon Apr 25 15:07:51 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:07:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:07:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17560 >/dev/null 2>/dev/null selfserv_9709 with PID 17560 found at Mon Apr 25 15:07:51 UTC 2016 selfserv_9709 with PID 17560 started at Mon Apr 25 15:07:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2647: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 17560 >/dev/null 2>/dev/null selfserv_9709 with PID 17560 found at Mon Apr 25 15:07:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2648: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17560 >/dev/null 2>/dev/null selfserv_9709 with PID 17560 found at Mon Apr 25 15:07:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2649: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17560 >/dev/null 2>/dev/null selfserv_9709 with PID 17560 found at Mon Apr 25 15:07:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2650: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17560 >/dev/null 2>/dev/null selfserv_9709 with PID 17560 found at Mon Apr 25 15:07:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2651: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 17560 at Mon Apr 25 15:07:55 UTC 2016 kill -USR1 17560 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17560 killed at Mon Apr 25 15:07:55 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:07:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:07:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:07:56 UTC 2016 selfserv_9709 with PID 17708 started at Mon Apr 25 15:07:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2652: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:07:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2653: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:07:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2654: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:07:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2655: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:07:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2656: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:07:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2657: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:08:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2658: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:08:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2659: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:08:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2660: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:08:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2661: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:08:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2662: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:08:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2663: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:08:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2664: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:08:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2665: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17708 >/dev/null 2>/dev/null selfserv_9709 with PID 17708 found at Mon Apr 25 15:08:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2666: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 17708 at Mon Apr 25 15:08:07 UTC 2016 kill -USR1 17708 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17708 killed at Mon Apr 25 15:08:07 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:08:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 18107 >/dev/null 2>/dev/null selfserv_9709 with PID 18107 found at Mon Apr 25 15:08:08 UTC 2016 selfserv_9709 with PID 18107 started at Mon Apr 25 15:08:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2667: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18107 >/dev/null 2>/dev/null selfserv_9709 with PID 18107 found at Mon Apr 25 15:08:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2668: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18107 >/dev/null 2>/dev/null selfserv_9709 with PID 18107 found at Mon Apr 25 15:08:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2669: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18107 >/dev/null 2>/dev/null selfserv_9709 with PID 18107 found at Mon Apr 25 15:08:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2670: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18107 >/dev/null 2>/dev/null selfserv_9709 with PID 18107 found at Mon Apr 25 15:08:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2671: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 18107 at Mon Apr 25 15:08:11 UTC 2016 kill -USR1 18107 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 18107 killed at Mon Apr 25 15:08:12 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:08:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:12 UTC 2016 selfserv_9709 with PID 18258 started at Mon Apr 25 15:08:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2672: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2673: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2674: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2675: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2676: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2677: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2678: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2679: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2680: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2681: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2682: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2683: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2684: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2685: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18258 >/dev/null 2>/dev/null selfserv_9709 with PID 18258 found at Mon Apr 25 15:08:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2686: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 18258 at Mon Apr 25 15:08:23 UTC 2016 kill -USR1 18258 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 18258 killed at Mon Apr 25 15:08:23 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:08:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 18644 >/dev/null 2>/dev/null selfserv_9709 with PID 18644 found at Mon Apr 25 15:08:24 UTC 2016 selfserv_9709 with PID 18644 started at Mon Apr 25 15:08:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2687: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18644 >/dev/null 2>/dev/null selfserv_9709 with PID 18644 found at Mon Apr 25 15:08:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2688: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18644 >/dev/null 2>/dev/null selfserv_9709 with PID 18644 found at Mon Apr 25 15:08:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2689: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18644 >/dev/null 2>/dev/null selfserv_9709 with PID 18644 found at Mon Apr 25 15:08:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2690: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18644 >/dev/null 2>/dev/null selfserv_9709 with PID 18644 found at Mon Apr 25 15:08:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2691: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 18644 at Mon Apr 25 15:08:28 UTC 2016 kill -USR1 18644 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 18644 killed at Mon Apr 25 15:08:28 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:08:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:28 UTC 2016 selfserv_9709 with PID 18792 started at Mon Apr 25 15:08:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2692: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2693: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2694: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2695: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2696: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2697: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2698: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2699: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2700: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2701: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2702: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2703: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 18792 >/dev/null 2>/dev/null selfserv_9709 with PID 18792 found at Mon Apr 25 15:08:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2704: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 18792 at Mon Apr 25 15:08:37 UTC 2016 kill -USR1 18792 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 18792 killed at Mon Apr 25 15:08:38 UTC 2016 ssl.sh: SSL Client Authentication - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:08:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19176 >/dev/null 2>/dev/null selfserv_9709 with PID 19176 found at Mon Apr 25 15:08:38 UTC 2016 selfserv_9709 with PID 19176 started at Mon Apr 25 15:08:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2705: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19176 at Mon Apr 25 15:08:40 UTC 2016 kill -USR1 19176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19176 killed at Mon Apr 25 15:08:40 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:08:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19233 >/dev/null 2>/dev/null selfserv_9709 with PID 19233 found at Mon Apr 25 15:08:40 UTC 2016 selfserv_9709 with PID 19233 started at Mon Apr 25 15:08:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2706: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19233 at Mon Apr 25 15:08:42 UTC 2016 kill -USR1 19233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19233 killed at Mon Apr 25 15:08:42 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:08:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19290 >/dev/null 2>/dev/null selfserv_9709 with PID 19290 found at Mon Apr 25 15:08:42 UTC 2016 selfserv_9709 with PID 19290 started at Mon Apr 25 15:08:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2707: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19290 at Mon Apr 25 15:08:44 UTC 2016 kill -USR1 19290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19290 killed at Mon Apr 25 15:08:44 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:08:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19347 >/dev/null 2>/dev/null selfserv_9709 with PID 19347 found at Mon Apr 25 15:08:44 UTC 2016 selfserv_9709 with PID 19347 started at Mon Apr 25 15:08:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2708: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 19347 at Mon Apr 25 15:08:45 UTC 2016 kill -USR1 19347 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19347 killed at Mon Apr 25 15:08:46 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:08:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19404 >/dev/null 2>/dev/null selfserv_9709 with PID 19404 found at Mon Apr 25 15:08:46 UTC 2016 selfserv_9709 with PID 19404 started at Mon Apr 25 15:08:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2709: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 19404 at Mon Apr 25 15:08:47 UTC 2016 kill -USR1 19404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19404 killed at Mon Apr 25 15:08:48 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:08:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19461 >/dev/null 2>/dev/null selfserv_9709 with PID 19461 found at Mon Apr 25 15:08:48 UTC 2016 selfserv_9709 with PID 19461 started at Mon Apr 25 15:08:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2710: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19461 at Mon Apr 25 15:08:49 UTC 2016 kill -USR1 19461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19461 killed at Mon Apr 25 15:08:50 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:08:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19518 >/dev/null 2>/dev/null selfserv_9709 with PID 19518 found at Mon Apr 25 15:08:50 UTC 2016 selfserv_9709 with PID 19518 started at Mon Apr 25 15:08:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2711: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19518 at Mon Apr 25 15:08:51 UTC 2016 kill -USR1 19518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19518 killed at Mon Apr 25 15:08:51 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:08:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19575 >/dev/null 2>/dev/null selfserv_9709 with PID 19575 found at Mon Apr 25 15:08:52 UTC 2016 selfserv_9709 with PID 19575 started at Mon Apr 25 15:08:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2712: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19575 at Mon Apr 25 15:08:52 UTC 2016 kill -USR1 19575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19575 killed at Mon Apr 25 15:08:53 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:08:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19632 >/dev/null 2>/dev/null selfserv_9709 with PID 19632 found at Mon Apr 25 15:08:53 UTC 2016 selfserv_9709 with PID 19632 started at Mon Apr 25 15:08:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2713: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19632 at Mon Apr 25 15:08:54 UTC 2016 kill -USR1 19632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19632 killed at Mon Apr 25 15:08:55 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:08:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19689 >/dev/null 2>/dev/null selfserv_9709 with PID 19689 found at Mon Apr 25 15:08:55 UTC 2016 selfserv_9709 with PID 19689 started at Mon Apr 25 15:08:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2714: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 19689 at Mon Apr 25 15:08:56 UTC 2016 kill -USR1 19689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19689 killed at Mon Apr 25 15:08:56 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:08:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19746 >/dev/null 2>/dev/null selfserv_9709 with PID 19746 found at Mon Apr 25 15:08:57 UTC 2016 selfserv_9709 with PID 19746 started at Mon Apr 25 15:08:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2715: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 19746 at Mon Apr 25 15:08:57 UTC 2016 kill -USR1 19746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19746 killed at Mon Apr 25 15:08:58 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:08:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:08:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19803 >/dev/null 2>/dev/null selfserv_9709 with PID 19803 found at Mon Apr 25 15:08:58 UTC 2016 selfserv_9709 with PID 19803 started at Mon Apr 25 15:08:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2716: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19803 at Mon Apr 25 15:08:59 UTC 2016 kill -USR1 19803 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19803 killed at Mon Apr 25 15:09:00 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19861 >/dev/null 2>/dev/null selfserv_9709 with PID 19861 found at Mon Apr 25 15:09:00 UTC 2016 selfserv_9709 with PID 19861 started at Mon Apr 25 15:09:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2717: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19861 at Mon Apr 25 15:09:01 UTC 2016 kill -USR1 19861 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19861 killed at Mon Apr 25 15:09:02 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19931 >/dev/null 2>/dev/null selfserv_9709 with PID 19931 found at Mon Apr 25 15:09:02 UTC 2016 selfserv_9709 with PID 19931 started at Mon Apr 25 15:09:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2718: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19931 at Mon Apr 25 15:09:04 UTC 2016 kill -USR1 19931 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19931 killed at Mon Apr 25 15:09:04 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19988 >/dev/null 2>/dev/null selfserv_9709 with PID 19988 found at Mon Apr 25 15:09:04 UTC 2016 selfserv_9709 with PID 19988 started at Mon Apr 25 15:09:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2719: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 19988 at Mon Apr 25 15:09:06 UTC 2016 kill -USR1 19988 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19988 killed at Mon Apr 25 15:09:06 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20045 >/dev/null 2>/dev/null selfserv_9709 with PID 20045 found at Mon Apr 25 15:09:07 UTC 2016 selfserv_9709 with PID 20045 started at Mon Apr 25 15:09:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2720: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20045 at Mon Apr 25 15:09:08 UTC 2016 kill -USR1 20045 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20045 killed at Mon Apr 25 15:09:08 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20105 >/dev/null 2>/dev/null selfserv_9709 with PID 20105 found at Mon Apr 25 15:09:09 UTC 2016 selfserv_9709 with PID 20105 started at Mon Apr 25 15:09:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2721: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20105 at Mon Apr 25 15:09:10 UTC 2016 kill -USR1 20105 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20105 killed at Mon Apr 25 15:09:10 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20162 >/dev/null 2>/dev/null selfserv_9709 with PID 20162 found at Mon Apr 25 15:09:11 UTC 2016 selfserv_9709 with PID 20162 started at Mon Apr 25 15:09:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2722: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20162 at Mon Apr 25 15:09:12 UTC 2016 kill -USR1 20162 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20162 killed at Mon Apr 25 15:09:13 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20219 >/dev/null 2>/dev/null selfserv_9709 with PID 20219 found at Mon Apr 25 15:09:13 UTC 2016 selfserv_9709 with PID 20219 started at Mon Apr 25 15:09:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2723: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20219 at Mon Apr 25 15:09:14 UTC 2016 kill -USR1 20219 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20219 killed at Mon Apr 25 15:09:15 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20276 >/dev/null 2>/dev/null selfserv_9709 with PID 20276 found at Mon Apr 25 15:09:15 UTC 2016 selfserv_9709 with PID 20276 started at Mon Apr 25 15:09:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2724: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20276 at Mon Apr 25 15:09:17 UTC 2016 kill -USR1 20276 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20276 killed at Mon Apr 25 15:09:17 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20333 >/dev/null 2>/dev/null selfserv_9709 with PID 20333 found at Mon Apr 25 15:09:17 UTC 2016 selfserv_9709 with PID 20333 started at Mon Apr 25 15:09:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2725: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20333 at Mon Apr 25 15:09:19 UTC 2016 kill -USR1 20333 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20333 killed at Mon Apr 25 15:09:19 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20391 >/dev/null 2>/dev/null selfserv_9709 with PID 20391 found at Mon Apr 25 15:09:20 UTC 2016 selfserv_9709 with PID 20391 started at Mon Apr 25 15:09:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2726: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20391 at Mon Apr 25 15:09:21 UTC 2016 kill -USR1 20391 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20391 killed at Mon Apr 25 15:09:21 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20448 >/dev/null 2>/dev/null selfserv_9709 with PID 20448 found at Mon Apr 25 15:09:22 UTC 2016 selfserv_9709 with PID 20448 started at Mon Apr 25 15:09:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2727: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20448 at Mon Apr 25 15:09:23 UTC 2016 kill -USR1 20448 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20448 killed at Mon Apr 25 15:09:23 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20507 >/dev/null 2>/dev/null selfserv_9709 with PID 20507 found at Mon Apr 25 15:09:24 UTC 2016 selfserv_9709 with PID 20507 started at Mon Apr 25 15:09:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2728: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20507 at Mon Apr 25 15:09:25 UTC 2016 kill -USR1 20507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20507 killed at Mon Apr 25 15:09:25 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20564 >/dev/null 2>/dev/null selfserv_9709 with PID 20564 found at Mon Apr 25 15:09:26 UTC 2016 selfserv_9709 with PID 20564 started at Mon Apr 25 15:09:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2729: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20564 at Mon Apr 25 15:09:27 UTC 2016 kill -USR1 20564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20564 killed at Mon Apr 25 15:09:27 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20621 >/dev/null 2>/dev/null selfserv_9709 with PID 20621 found at Mon Apr 25 15:09:28 UTC 2016 selfserv_9709 with PID 20621 started at Mon Apr 25 15:09:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2730: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20621 at Mon Apr 25 15:09:29 UTC 2016 kill -USR1 20621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20621 killed at Mon Apr 25 15:09:29 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20678 >/dev/null 2>/dev/null selfserv_9709 with PID 20678 found at Mon Apr 25 15:09:30 UTC 2016 selfserv_9709 with PID 20678 started at Mon Apr 25 15:09:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2731: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20678 at Mon Apr 25 15:09:31 UTC 2016 kill -USR1 20678 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20678 killed at Mon Apr 25 15:09:31 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20735 >/dev/null 2>/dev/null selfserv_9709 with PID 20735 found at Mon Apr 25 15:09:32 UTC 2016 selfserv_9709 with PID 20735 started at Mon Apr 25 15:09:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2732: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20735 at Mon Apr 25 15:09:32 UTC 2016 kill -USR1 20735 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20735 killed at Mon Apr 25 15:09:33 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20792 >/dev/null 2>/dev/null selfserv_9709 with PID 20792 found at Mon Apr 25 15:09:33 UTC 2016 selfserv_9709 with PID 20792 started at Mon Apr 25 15:09:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2733: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20792 at Mon Apr 25 15:09:34 UTC 2016 kill -USR1 20792 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20792 killed at Mon Apr 25 15:09:35 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20850 >/dev/null 2>/dev/null selfserv_9709 with PID 20850 found at Mon Apr 25 15:09:35 UTC 2016 selfserv_9709 with PID 20850 started at Mon Apr 25 15:09:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2734: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20850 at Mon Apr 25 15:09:36 UTC 2016 kill -USR1 20850 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20850 killed at Mon Apr 25 15:09:36 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20922 >/dev/null 2>/dev/null selfserv_9709 with PID 20922 found at Mon Apr 25 15:09:37 UTC 2016 selfserv_9709 with PID 20922 started at Mon Apr 25 15:09:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2735: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20922 at Mon Apr 25 15:09:38 UTC 2016 kill -USR1 20922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20922 killed at Mon Apr 25 15:09:38 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20979 >/dev/null 2>/dev/null selfserv_9709 with PID 20979 found at Mon Apr 25 15:09:39 UTC 2016 selfserv_9709 with PID 20979 started at Mon Apr 25 15:09:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2736: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 20979 at Mon Apr 25 15:09:40 UTC 2016 kill -USR1 20979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20979 killed at Mon Apr 25 15:09:41 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21037 >/dev/null 2>/dev/null selfserv_9709 with PID 21037 found at Mon Apr 25 15:09:41 UTC 2016 selfserv_9709 with PID 21037 started at Mon Apr 25 15:09:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2737: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21037 at Mon Apr 25 15:09:42 UTC 2016 kill -USR1 21037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21037 killed at Mon Apr 25 15:09:42 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21094 >/dev/null 2>/dev/null selfserv_9709 with PID 21094 found at Mon Apr 25 15:09:43 UTC 2016 selfserv_9709 with PID 21094 started at Mon Apr 25 15:09:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2738: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21094 at Mon Apr 25 15:09:44 UTC 2016 kill -USR1 21094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21094 killed at Mon Apr 25 15:09:45 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21151 >/dev/null 2>/dev/null selfserv_9709 with PID 21151 found at Mon Apr 25 15:09:45 UTC 2016 selfserv_9709 with PID 21151 started at Mon Apr 25 15:09:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2739: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21151 at Mon Apr 25 15:09:46 UTC 2016 kill -USR1 21151 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21151 killed at Mon Apr 25 15:09:46 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21208 >/dev/null 2>/dev/null selfserv_9709 with PID 21208 found at Mon Apr 25 15:09:47 UTC 2016 selfserv_9709 with PID 21208 started at Mon Apr 25 15:09:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2740: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21208 at Mon Apr 25 15:09:48 UTC 2016 kill -USR1 21208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21208 killed at Mon Apr 25 15:09:48 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21265 >/dev/null 2>/dev/null selfserv_9709 with PID 21265 found at Mon Apr 25 15:09:49 UTC 2016 selfserv_9709 with PID 21265 started at Mon Apr 25 15:09:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2741: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21265 at Mon Apr 25 15:09:50 UTC 2016 kill -USR1 21265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21265 killed at Mon Apr 25 15:09:50 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21322 >/dev/null 2>/dev/null selfserv_9709 with PID 21322 found at Mon Apr 25 15:09:50 UTC 2016 selfserv_9709 with PID 21322 started at Mon Apr 25 15:09:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2742: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21322 at Mon Apr 25 15:09:51 UTC 2016 kill -USR1 21322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21322 killed at Mon Apr 25 15:09:52 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21379 >/dev/null 2>/dev/null selfserv_9709 with PID 21379 found at Mon Apr 25 15:09:52 UTC 2016 selfserv_9709 with PID 21379 started at Mon Apr 25 15:09:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2743: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21379 at Mon Apr 25 15:09:54 UTC 2016 kill -USR1 21379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21379 killed at Mon Apr 25 15:09:54 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21436 >/dev/null 2>/dev/null selfserv_9709 with PID 21436 found at Mon Apr 25 15:09:55 UTC 2016 selfserv_9709 with PID 21436 started at Mon Apr 25 15:09:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2744: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21436 at Mon Apr 25 15:09:56 UTC 2016 kill -USR1 21436 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21436 killed at Mon Apr 25 15:09:56 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:09:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21493 >/dev/null 2>/dev/null selfserv_9709 with PID 21493 found at Mon Apr 25 15:09:57 UTC 2016 selfserv_9709 with PID 21493 started at Mon Apr 25 15:09:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2745: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21493 at Mon Apr 25 15:09:58 UTC 2016 kill -USR1 21493 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21493 killed at Mon Apr 25 15:09:59 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:09:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:09:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21550 >/dev/null 2>/dev/null selfserv_9709 with PID 21550 found at Mon Apr 25 15:09:59 UTC 2016 selfserv_9709 with PID 21550 started at Mon Apr 25 15:09:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2746: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21550 at Mon Apr 25 15:10:00 UTC 2016 kill -USR1 21550 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21550 killed at Mon Apr 25 15:10:01 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:10:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21608 >/dev/null 2>/dev/null selfserv_9709 with PID 21608 found at Mon Apr 25 15:10:01 UTC 2016 selfserv_9709 with PID 21608 started at Mon Apr 25 15:10:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2747: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21608 at Mon Apr 25 15:10:03 UTC 2016 kill -USR1 21608 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21608 killed at Mon Apr 25 15:10:03 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:10:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21679 >/dev/null 2>/dev/null selfserv_9709 with PID 21679 found at Mon Apr 25 15:10:04 UTC 2016 selfserv_9709 with PID 21679 started at Mon Apr 25 15:10:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2748: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21679 at Mon Apr 25 15:10:05 UTC 2016 kill -USR1 21679 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21679 killed at Mon Apr 25 15:10:06 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:10:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21736 >/dev/null 2>/dev/null selfserv_9709 with PID 21736 found at Mon Apr 25 15:10:06 UTC 2016 selfserv_9709 with PID 21736 started at Mon Apr 25 15:10:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2749: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21736 at Mon Apr 25 15:10:07 UTC 2016 kill -USR1 21736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21736 killed at Mon Apr 25 15:10:08 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:10:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21793 >/dev/null 2>/dev/null selfserv_9709 with PID 21793 found at Mon Apr 25 15:10:08 UTC 2016 selfserv_9709 with PID 21793 started at Mon Apr 25 15:10:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2750: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21793 at Mon Apr 25 15:10:10 UTC 2016 kill -USR1 21793 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21793 killed at Mon Apr 25 15:10:10 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:10:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21853 >/dev/null 2>/dev/null selfserv_9709 with PID 21853 found at Mon Apr 25 15:10:10 UTC 2016 selfserv_9709 with PID 21853 started at Mon Apr 25 15:10:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2751: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21853 at Mon Apr 25 15:10:11 UTC 2016 kill -USR1 21853 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21853 killed at Mon Apr 25 15:10:12 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:10:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21910 >/dev/null 2>/dev/null selfserv_9709 with PID 21910 found at Mon Apr 25 15:10:12 UTC 2016 selfserv_9709 with PID 21910 started at Mon Apr 25 15:10:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2752: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21910 at Mon Apr 25 15:10:14 UTC 2016 kill -USR1 21910 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21910 killed at Mon Apr 25 15:10:14 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:10:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21967 >/dev/null 2>/dev/null selfserv_9709 with PID 21967 found at Mon Apr 25 15:10:14 UTC 2016 selfserv_9709 with PID 21967 started at Mon Apr 25 15:10:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2753: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21967 at Mon Apr 25 15:10:15 UTC 2016 kill -USR1 21967 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21967 killed at Mon Apr 25 15:10:16 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:10:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22024 >/dev/null 2>/dev/null selfserv_9709 with PID 22024 found at Mon Apr 25 15:10:16 UTC 2016 selfserv_9709 with PID 22024 started at Mon Apr 25 15:10:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2754: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22024 at Mon Apr 25 15:10:17 UTC 2016 kill -USR1 22024 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22024 killed at Mon Apr 25 15:10:18 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 15:10:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22102 >/dev/null 2>/dev/null selfserv_9709 with PID 22102 found at Mon Apr 25 15:10:18 UTC 2016 selfserv_9709 with PID 22102 started at Mon Apr 25 15:10:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2755: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22102 at Mon Apr 25 15:10:19 UTC 2016 kill -USR1 22102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22102 killed at Mon Apr 25 15:10:20 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 15:10:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22165 >/dev/null 2>/dev/null selfserv_9709 with PID 22165 found at Mon Apr 25 15:10:20 UTC 2016 selfserv_9709 with PID 22165 started at Mon Apr 25 15:10:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2756: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22165 at Mon Apr 25 15:10:21 UTC 2016 kill -USR1 22165 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22165 killed at Mon Apr 25 15:10:21 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 15:10:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22229 >/dev/null 2>/dev/null selfserv_9709 with PID 22229 found at Mon Apr 25 15:10:22 UTC 2016 selfserv_9709 with PID 22229 started at Mon Apr 25 15:10:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2757: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22229 at Mon Apr 25 15:10:22 UTC 2016 kill -USR1 22229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22229 killed at Mon Apr 25 15:10:23 UTC 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 15:10:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22292 >/dev/null 2>/dev/null selfserv_9709 with PID 22292 found at Mon Apr 25 15:10:23 UTC 2016 selfserv_9709 with PID 22292 started at Mon Apr 25 15:10:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2758: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22292 at Mon Apr 25 15:10:24 UTC 2016 kill -USR1 22292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22292 killed at Mon Apr 25 15:10:25 UTC 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9709 starting at Mon Apr 25 15:10:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22355 >/dev/null 2>/dev/null selfserv_9709 with PID 22355 found at Mon Apr 25 15:10:25 UTC 2016 selfserv_9709 with PID 22355 started at Mon Apr 25 15:10:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #2759: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22355 at Mon Apr 25 15:10:26 UTC 2016 kill -USR1 22355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22355 killed at Mon Apr 25 15:10:26 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 15:10:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22418 >/dev/null 2>/dev/null selfserv_9709 with PID 22418 found at Mon Apr 25 15:10:27 UTC 2016 selfserv_9709 with PID 22418 started at Mon Apr 25 15:10:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2760: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22418 at Mon Apr 25 15:10:27 UTC 2016 kill -USR1 22418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22418 killed at Mon Apr 25 15:10:28 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 15:10:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22481 >/dev/null 2>/dev/null selfserv_9709 with PID 22481 found at Mon Apr 25 15:10:28 UTC 2016 selfserv_9709 with PID 22481 started at Mon Apr 25 15:10:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2761: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22481 at Mon Apr 25 15:10:29 UTC 2016 kill -USR1 22481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22481 killed at Mon Apr 25 15:10:30 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9709 starting at Mon Apr 25 15:10:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22544 >/dev/null 2>/dev/null selfserv_9709 with PID 22544 found at Mon Apr 25 15:10:30 UTC 2016 selfserv_9709 with PID 22544 started at Mon Apr 25 15:10:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #2762: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22544 at Mon Apr 25 15:10:31 UTC 2016 kill -USR1 22544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22544 killed at Mon Apr 25 15:10:31 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9709 starting at Mon Apr 25 15:10:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22607 >/dev/null 2>/dev/null selfserv_9709 with PID 22607 found at Mon Apr 25 15:10:32 UTC 2016 selfserv_9709 with PID 22607 started at Mon Apr 25 15:10:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #2763: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22607 at Mon Apr 25 15:10:32 UTC 2016 kill -USR1 22607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22607 killed at Mon Apr 25 15:10:33 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 15:10:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22670 >/dev/null 2>/dev/null selfserv_9709 with PID 22670 found at Mon Apr 25 15:10:33 UTC 2016 selfserv_9709 with PID 22670 started at Mon Apr 25 15:10:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2764: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22670 at Mon Apr 25 15:10:34 UTC 2016 kill -USR1 22670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22670 killed at Mon Apr 25 15:10:34 UTC 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server fips/client normal - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 15:10:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22806 >/dev/null 2>/dev/null selfserv_9709 with PID 22806 found at Mon Apr 25 15:10:35 UTC 2016 selfserv_9709 with PID 22806 started at Mon Apr 25 15:10:35 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 15:10:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:10:37 UTC 2016 ssl.sh: #2765: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22806 at Mon Apr 25 15:10:37 UTC 2016 kill -USR1 22806 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22806 killed at Mon Apr 25 15:10:37 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 15:10:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22882 >/dev/null 2>/dev/null selfserv_9709 with PID 22882 found at Mon Apr 25 15:10:38 UTC 2016 selfserv_9709 with PID 22882 started at Mon Apr 25 15:10:38 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 15:10:38 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:10:39 UTC 2016 ssl.sh: #2766: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22882 at Mon Apr 25 15:10:39 UTC 2016 kill -USR1 22882 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22882 killed at Mon Apr 25 15:10:39 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 15:10:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22958 >/dev/null 2>/dev/null selfserv_9709 with PID 22958 found at Mon Apr 25 15:10:40 UTC 2016 selfserv_9709 with PID 22958 started at Mon Apr 25 15:10:40 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:10:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:10:41 UTC 2016 ssl.sh: #2767: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22958 at Mon Apr 25 15:10:42 UTC 2016 kill -USR1 22958 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22958 killed at Mon Apr 25 15:10:42 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 15:10:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23035 >/dev/null 2>/dev/null selfserv_9709 with PID 23035 found at Mon Apr 25 15:10:42 UTC 2016 selfserv_9709 with PID 23035 started at Mon Apr 25 15:10:42 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:10:43 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:10:44 UTC 2016 ssl.sh: #2768: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23035 at Mon Apr 25 15:10:44 UTC 2016 kill -USR1 23035 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23035 killed at Mon Apr 25 15:10:44 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 15:10:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23111 >/dev/null 2>/dev/null selfserv_9709 with PID 23111 found at Mon Apr 25 15:10:45 UTC 2016 selfserv_9709 with PID 23111 started at Mon Apr 25 15:10:45 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:10:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:10:47 UTC 2016 ssl.sh: #2769: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23111 at Mon Apr 25 15:10:47 UTC 2016 kill -USR1 23111 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23111 killed at Mon Apr 25 15:10:47 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 15:10:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23187 >/dev/null 2>/dev/null selfserv_9709 with PID 23187 found at Mon Apr 25 15:10:48 UTC 2016 selfserv_9709 with PID 23187 started at Mon Apr 25 15:10:48 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:10:48 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:10:50 UTC 2016 ssl.sh: #2770: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23187 at Mon Apr 25 15:10:50 UTC 2016 kill -USR1 23187 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23187 killed at Mon Apr 25 15:10:50 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 15:10:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23263 >/dev/null 2>/dev/null selfserv_9709 with PID 23263 found at Mon Apr 25 15:10:51 UTC 2016 selfserv_9709 with PID 23263 started at Mon Apr 25 15:10:51 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:10:51 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:10:53 UTC 2016 ssl.sh: #2771: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23263 at Mon Apr 25 15:10:53 UTC 2016 kill -USR1 23263 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23263 killed at Mon Apr 25 15:10:53 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9709 starting at Mon Apr 25 15:10:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23345 >/dev/null 2>/dev/null selfserv_9709 with PID 23345 found at Mon Apr 25 15:10:54 UTC 2016 selfserv_9709 with PID 23345 started at Mon Apr 25 15:10:54 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:10:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:10:55 UTC 2016 ssl.sh: #2772: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23345 at Mon Apr 25 15:10:55 UTC 2016 kill -USR1 23345 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23345 killed at Mon Apr 25 15:10:55 UTC 2016 ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:10:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:10:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23446 >/dev/null 2>/dev/null selfserv_9709 with PID 23446 found at Mon Apr 25 15:10:56 UTC 2016 selfserv_9709 with PID 23446 started at Mon Apr 25 15:10:56 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 15:10:56 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:11:00 UTC 2016 ssl.sh: #2773: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23446 at Mon Apr 25 15:11:00 UTC 2016 kill -USR1 23446 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23446 killed at Mon Apr 25 15:11:01 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:11:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23521 >/dev/null 2>/dev/null selfserv_9709 with PID 23521 found at Mon Apr 25 15:11:01 UTC 2016 selfserv_9709 with PID 23521 started at Mon Apr 25 15:11:01 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 100 -C c -V ssl3: -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:11:05 UTC 2016 ssl.sh: #2774: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23521 at Mon Apr 25 15:11:05 UTC 2016 kill -USR1 23521 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23521 killed at Mon Apr 25 15:11:06 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:11:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23610 >/dev/null 2>/dev/null selfserv_9709 with PID 23610 found at Mon Apr 25 15:11:06 UTC 2016 selfserv_9709 with PID 23610 started at Mon Apr 25 15:11:06 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:11:07 UTC 2016 ssl.sh: #2775: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23610 at Mon Apr 25 15:11:07 UTC 2016 kill -USR1 23610 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23610 killed at Mon Apr 25 15:11:07 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:11:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23687 >/dev/null 2>/dev/null selfserv_9709 with PID 23687 found at Mon Apr 25 15:11:08 UTC 2016 selfserv_9709 with PID 23687 started at Mon Apr 25 15:11:08 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:11:09 UTC 2016 ssl.sh: #2776: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23687 at Mon Apr 25 15:11:09 UTC 2016 kill -USR1 23687 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23687 killed at Mon Apr 25 15:11:09 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 15:11:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23765 >/dev/null 2>/dev/null selfserv_9709 with PID 23765 found at Mon Apr 25 15:11:10 UTC 2016 selfserv_9709 with PID 23765 started at Mon Apr 25 15:11:10 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:11:11 UTC 2016 ssl.sh: #2777: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23765 at Mon Apr 25 15:11:11 UTC 2016 kill -USR1 23765 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23765 killed at Mon Apr 25 15:11:11 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:11:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23841 >/dev/null 2>/dev/null selfserv_9709 with PID 23841 found at Mon Apr 25 15:11:12 UTC 2016 selfserv_9709 with PID 23841 started at Mon Apr 25 15:11:12 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:11:12 UTC 2016 ssl.sh: #2778: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23841 at Mon Apr 25 15:11:12 UTC 2016 kill -USR1 23841 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23841 killed at Mon Apr 25 15:11:13 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 15:11:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23917 >/dev/null 2>/dev/null selfserv_9709 with PID 23917 found at Mon Apr 25 15:11:13 UTC 2016 selfserv_9709 with PID 23917 started at Mon Apr 25 15:11:13 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:13 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:11:14 UTC 2016 ssl.sh: #2779: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23917 at Mon Apr 25 15:11:14 UTC 2016 kill -USR1 23917 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23917 killed at Mon Apr 25 15:11:15 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9709 starting at Mon Apr 25 15:11:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23999 >/dev/null 2>/dev/null selfserv_9709 with PID 23999 found at Mon Apr 25 15:11:15 UTC 2016 selfserv_9709 with PID 23999 started at Mon Apr 25 15:11:15 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:15 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:11:17 UTC 2016 ssl.sh: #2780: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23999 at Mon Apr 25 15:11:17 UTC 2016 kill -USR1 23999 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23999 killed at Mon Apr 25 15:11:18 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9709 starting at Mon Apr 25 15:11:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24081 >/dev/null 2>/dev/null selfserv_9709 with PID 24081 found at Mon Apr 25 15:11:18 UTC 2016 selfserv_9709 with PID 24081 started at Mon Apr 25 15:11:18 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:18 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:11:20 UTC 2016 ssl.sh: #2781: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24081 at Mon Apr 25 15:11:20 UTC 2016 kill -USR1 24081 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24081 killed at Mon Apr 25 15:11:21 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:11:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24178 >/dev/null 2>/dev/null selfserv_9709 with PID 24178 found at Mon Apr 25 15:11:21 UTC 2016 selfserv_9709 with PID 24178 started at Mon Apr 25 15:11:21 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:21 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:11:28 UTC 2016 ssl.sh: #2782: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24178 at Mon Apr 25 15:11:28 UTC 2016 kill -USR1 24178 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24178 killed at Mon Apr 25 15:11:29 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:11:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24254 >/dev/null 2>/dev/null selfserv_9709 with PID 24254 found at Mon Apr 25 15:11:29 UTC 2016 selfserv_9709 with PID 24254 started at Mon Apr 25 15:11:29 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:11:36 UTC 2016 ssl.sh: #2783: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24254 at Mon Apr 25 15:11:36 UTC 2016 kill -USR1 24254 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24254 killed at Mon Apr 25 15:11:36 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:11:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24329 >/dev/null 2>/dev/null selfserv_9709 with PID 24329 found at Mon Apr 25 15:11:37 UTC 2016 selfserv_9709 with PID 24329 started at Mon Apr 25 15:11:37 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:11:44 UTC 2016 ssl.sh: #2784: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24329 at Mon Apr 25 15:11:44 UTC 2016 kill -USR1 24329 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24329 killed at Mon Apr 25 15:11:44 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:11:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24405 >/dev/null 2>/dev/null selfserv_9709 with PID 24405 found at Mon Apr 25 15:11:45 UTC 2016 selfserv_9709 with PID 24405 started at Mon Apr 25 15:11:45 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:11:54 UTC 2016 ssl.sh: #2785: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24405 at Mon Apr 25 15:11:54 UTC 2016 kill -USR1 24405 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24405 killed at Mon Apr 25 15:11:54 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:11:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:11:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24480 >/dev/null 2>/dev/null selfserv_9709 with PID 24480 found at Mon Apr 25 15:11:55 UTC 2016 selfserv_9709 with PID 24480 started at Mon Apr 25 15:11:55 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:11:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:12:01 UTC 2016 ssl.sh: #2786: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24480 at Mon Apr 25 15:12:01 UTC 2016 kill -USR1 24480 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24480 killed at Mon Apr 25 15:12:01 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 15:12:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24568 >/dev/null 2>/dev/null selfserv_9709 with PID 24568 found at Mon Apr 25 15:12:02 UTC 2016 selfserv_9709 with PID 24568 started at Mon Apr 25 15:12:02 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:02 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:12:03 UTC 2016 ssl.sh: #2787: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24568 at Mon Apr 25 15:12:03 UTC 2016 kill -USR1 24568 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24568 killed at Mon Apr 25 15:12:04 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 15:12:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24645 >/dev/null 2>/dev/null selfserv_9709 with PID 24645 found at Mon Apr 25 15:12:04 UTC 2016 selfserv_9709 with PID 24645 started at Mon Apr 25 15:12:04 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:12:06 UTC 2016 ssl.sh: #2788: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24645 at Mon Apr 25 15:12:06 UTC 2016 kill -USR1 24645 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24645 killed at Mon Apr 25 15:12:06 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 15:12:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24721 >/dev/null 2>/dev/null selfserv_9709 with PID 24721 found at Mon Apr 25 15:12:07 UTC 2016 selfserv_9709 with PID 24721 started at Mon Apr 25 15:12:07 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:07 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:12:08 UTC 2016 ssl.sh: #2789: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24721 at Mon Apr 25 15:12:09 UTC 2016 kill -USR1 24721 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24721 killed at Mon Apr 25 15:12:09 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 15:12:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24800 >/dev/null 2>/dev/null selfserv_9709 with PID 24800 found at Mon Apr 25 15:12:09 UTC 2016 selfserv_9709 with PID 24800 started at Mon Apr 25 15:12:09 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:12:11 UTC 2016 ssl.sh: #2790: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24800 at Mon Apr 25 15:12:11 UTC 2016 kill -USR1 24800 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24800 killed at Mon Apr 25 15:12:12 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 15:12:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24876 >/dev/null 2>/dev/null selfserv_9709 with PID 24876 found at Mon Apr 25 15:12:12 UTC 2016 selfserv_9709 with PID 24876 started at Mon Apr 25 15:12:12 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:12:13 UTC 2016 ssl.sh: #2791: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24876 at Mon Apr 25 15:12:13 UTC 2016 kill -USR1 24876 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24876 killed at Mon Apr 25 15:12:14 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:12:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24973 >/dev/null 2>/dev/null selfserv_9709 with PID 24973 found at Mon Apr 25 15:12:14 UTC 2016 selfserv_9709 with PID 24973 started at Mon Apr 25 15:12:14 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:12:16 UTC 2016 ssl.sh: #2792: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24973 at Mon Apr 25 15:12:16 UTC 2016 kill -USR1 24973 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24973 killed at Mon Apr 25 15:12:17 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:12:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25048 >/dev/null 2>/dev/null selfserv_9709 with PID 25048 found at Mon Apr 25 15:12:17 UTC 2016 selfserv_9709 with PID 25048 started at Mon Apr 25 15:12:17 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:12:18 UTC 2016 ssl.sh: #2793: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25048 at Mon Apr 25 15:12:18 UTC 2016 kill -USR1 25048 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25048 killed at Mon Apr 25 15:12:19 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:12:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25124 >/dev/null 2>/dev/null selfserv_9709 with PID 25124 found at Mon Apr 25 15:12:19 UTC 2016 selfserv_9709 with PID 25124 started at Mon Apr 25 15:12:19 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:12:22 UTC 2016 ssl.sh: #2794: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25124 at Mon Apr 25 15:12:22 UTC 2016 kill -USR1 25124 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25124 killed at Mon Apr 25 15:12:22 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:12:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25199 >/dev/null 2>/dev/null selfserv_9709 with PID 25199 found at Mon Apr 25 15:12:23 UTC 2016 selfserv_9709 with PID 25199 started at Mon Apr 25 15:12:23 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:12:24 UTC 2016 ssl.sh: #2795: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25199 at Mon Apr 25 15:12:24 UTC 2016 kill -USR1 25199 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25199 killed at Mon Apr 25 15:12:25 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 15:12:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25275 >/dev/null 2>/dev/null selfserv_9709 with PID 25275 found at Mon Apr 25 15:12:25 UTC 2016 selfserv_9709 with PID 25275 started at Mon Apr 25 15:12:25 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:12:26 UTC 2016 ssl.sh: #2796: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25275 at Mon Apr 25 15:12:26 UTC 2016 kill -USR1 25275 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25275 killed at Mon Apr 25 15:12:27 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:12:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25351 >/dev/null 2>/dev/null selfserv_9709 with PID 25351 found at Mon Apr 25 15:12:27 UTC 2016 selfserv_9709 with PID 25351 started at Mon Apr 25 15:12:27 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:12:28 UTC 2016 ssl.sh: #2797: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25351 at Mon Apr 25 15:12:28 UTC 2016 kill -USR1 25351 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25351 killed at Mon Apr 25 15:12:29 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:12:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25448 >/dev/null 2>/dev/null selfserv_9709 with PID 25448 found at Mon Apr 25 15:12:29 UTC 2016 selfserv_9709 with PID 25448 started at Mon Apr 25 15:12:29 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:12:35 UTC 2016 ssl.sh: #2798: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25448 at Mon Apr 25 15:12:35 UTC 2016 kill -USR1 25448 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25448 killed at Mon Apr 25 15:12:35 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 15:12:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25523 >/dev/null 2>/dev/null selfserv_9709 with PID 25523 found at Mon Apr 25 15:12:36 UTC 2016 selfserv_9709 with PID 25523 started at Mon Apr 25 15:12:36 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:12:38 UTC 2016 ssl.sh: #2799: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25523 at Mon Apr 25 15:12:38 UTC 2016 kill -USR1 25523 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25523 killed at Mon Apr 25 15:12:38 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:12:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25600 >/dev/null 2>/dev/null selfserv_9709 with PID 25600 found at Mon Apr 25 15:12:39 UTC 2016 selfserv_9709 with PID 25600 started at Mon Apr 25 15:12:39 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:12:44 UTC 2016 ssl.sh: #2800: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25600 at Mon Apr 25 15:12:44 UTC 2016 kill -USR1 25600 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25600 killed at Mon Apr 25 15:12:44 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:12:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25676 >/dev/null 2>/dev/null selfserv_9709 with PID 25676 found at Mon Apr 25 15:12:45 UTC 2016 selfserv_9709 with PID 25676 started at Mon Apr 25 15:12:45 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:12:52 UTC 2016 ssl.sh: #2801: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25676 at Mon Apr 25 15:12:52 UTC 2016 kill -USR1 25676 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25676 killed at Mon Apr 25 15:12:52 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:12:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:12:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25765 >/dev/null 2>/dev/null selfserv_9709 with PID 25765 found at Mon Apr 25 15:12:53 UTC 2016 selfserv_9709 with PID 25765 started at Mon Apr 25 15:12:53 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:12:53 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:13:57 UTC 2016 ssl.sh: #2802: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25765 at Mon Apr 25 15:13:58 UTC 2016 kill -USR1 25765 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25765 killed at Mon Apr 25 15:13:58 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 15:13:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:13:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25875 >/dev/null 2>/dev/null selfserv_9709 with PID 25875 found at Mon Apr 25 15:13:59 UTC 2016 selfserv_9709 with PID 25875 started at Mon Apr 25 15:13:59 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:13:59 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:15:03 UTC 2016 ssl.sh: #2803: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25875 at Mon Apr 25 15:15:03 UTC 2016 kill -USR1 25875 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25875 killed at Mon Apr 25 15:15:03 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:15:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:15:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25985 >/dev/null 2>/dev/null selfserv_9709 with PID 25985 found at Mon Apr 25 15:15:04 UTC 2016 selfserv_9709 with PID 25985 started at Mon Apr 25 15:15:04 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:15:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:15:09 UTC 2016 ssl.sh: #2804: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25985 at Mon Apr 25 15:15:09 UTC 2016 kill -USR1 25985 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25985 killed at Mon Apr 25 15:15:10 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:15:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:15:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26064 >/dev/null 2>/dev/null selfserv_9709 with PID 26064 found at Mon Apr 25 15:15:10 UTC 2016 selfserv_9709 with PID 26064 started at Mon Apr 25 15:15:10 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:15:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:15:16 UTC 2016 ssl.sh: #2805: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26064 at Mon Apr 25 15:15:16 UTC 2016 kill -USR1 26064 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26064 killed at Mon Apr 25 15:15:16 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:15:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:15:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26160 >/dev/null 2>/dev/null selfserv_9709 with PID 26160 found at Mon Apr 25 15:15:17 UTC 2016 selfserv_9709 with PID 26160 started at Mon Apr 25 15:15:17 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:15:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:15:27 UTC 2016 ssl.sh: #2806: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26160 at Mon Apr 25 15:15:27 UTC 2016 kill -USR1 26160 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26160 killed at Mon Apr 25 15:15:28 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:15:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:15:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26235 >/dev/null 2>/dev/null selfserv_9709 with PID 26235 found at Mon Apr 25 15:15:28 UTC 2016 selfserv_9709 with PID 26235 started at Mon Apr 25 15:15:28 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:15:28 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:15:30 UTC 2016 ssl.sh: #2807: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26235 at Mon Apr 25 15:15:30 UTC 2016 kill -USR1 26235 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26235 killed at Mon Apr 25 15:15:30 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:15:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:15:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26326 >/dev/null 2>/dev/null selfserv_9709 with PID 26326 found at Mon Apr 25 15:15:31 UTC 2016 selfserv_9709 with PID 26326 started at Mon Apr 25 15:15:31 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:15:31 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:17:05 UTC 2016 ssl.sh: #2808: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26326 at Mon Apr 25 15:17:05 UTC 2016 kill -USR1 26326 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26326 killed at Mon Apr 25 15:17:06 UTC 2016 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal - with ECC =============================== selfserv_9709 starting at Mon Apr 25 15:17:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:17:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:06 UTC 2016 selfserv_9709 with PID 26421 started at Mon Apr 25 15:17:06 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2809: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2810: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2811: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2812: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2813: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2814: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2826: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2827: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2828: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2829: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2830: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2831: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2832: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2833: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2834: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2835: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2836: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2837: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2838: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2839: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2840: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2841: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2842: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2843: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2844: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2845: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2846: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2847: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2848: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2849: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2850: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2851: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2852: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2853: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2854: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2855: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2856: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2857: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2858: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2859: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2860: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2861: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2862: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2863: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2864: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2865: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2866: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2867: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2868: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2869: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2870: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2871: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2872: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2873: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2874: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2875: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 26421 >/dev/null 2>/dev/null selfserv_9709 with PID 26421 found at Mon Apr 25 15:17:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2876: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 26421 at Mon Apr 25 15:17:54 UTC 2016 kill -USR1 26421 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26421 killed at Mon Apr 25 15:17:55 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:17:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:17:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28333 >/dev/null 2>/dev/null selfserv_9709 with PID 28333 found at Mon Apr 25 15:17:55 UTC 2016 selfserv_9709 with PID 28333 started at Mon Apr 25 15:17:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2877: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28333 >/dev/null 2>/dev/null selfserv_9709 with PID 28333 found at Mon Apr 25 15:17:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2878: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28333 >/dev/null 2>/dev/null selfserv_9709 with PID 28333 found at Mon Apr 25 15:17:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2879: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28333 >/dev/null 2>/dev/null selfserv_9709 with PID 28333 found at Mon Apr 25 15:17:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2880: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28333 >/dev/null 2>/dev/null selfserv_9709 with PID 28333 found at Mon Apr 25 15:17:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2881: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 28333 at Mon Apr 25 15:17:58 UTC 2016 kill -USR1 28333 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28333 killed at Mon Apr 25 15:17:58 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:17:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:17:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:17:59 UTC 2016 selfserv_9709 with PID 28481 started at Mon Apr 25 15:17:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2882: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2883: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2884: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2885: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2886: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2887: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2888: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2889: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2890: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2891: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2892: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2893: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2894: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2895: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28481 >/dev/null 2>/dev/null selfserv_9709 with PID 28481 found at Mon Apr 25 15:18:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2896: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 28481 at Mon Apr 25 15:18:10 UTC 2016 kill -USR1 28481 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28481 killed at Mon Apr 25 15:18:11 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:18:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28882 >/dev/null 2>/dev/null selfserv_9709 with PID 28882 found at Mon Apr 25 15:18:11 UTC 2016 selfserv_9709 with PID 28882 started at Mon Apr 25 15:18:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2897: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28882 >/dev/null 2>/dev/null selfserv_9709 with PID 28882 found at Mon Apr 25 15:18:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2898: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28882 >/dev/null 2>/dev/null selfserv_9709 with PID 28882 found at Mon Apr 25 15:18:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2899: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28882 >/dev/null 2>/dev/null selfserv_9709 with PID 28882 found at Mon Apr 25 15:18:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2900: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28882 >/dev/null 2>/dev/null selfserv_9709 with PID 28882 found at Mon Apr 25 15:18:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2901: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 28882 at Mon Apr 25 15:18:14 UTC 2016 kill -USR1 28882 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28882 killed at Mon Apr 25 15:18:15 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:18:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:15 UTC 2016 selfserv_9709 with PID 29031 started at Mon Apr 25 15:18:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2902: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2903: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2904: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2905: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2906: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2907: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2908: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2909: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2910: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2911: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2912: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2913: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2914: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2915: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29031 >/dev/null 2>/dev/null selfserv_9709 with PID 29031 found at Mon Apr 25 15:18:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2916: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 29031 at Mon Apr 25 15:18:26 UTC 2016 kill -USR1 29031 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29031 killed at Mon Apr 25 15:18:27 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:18:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29416 >/dev/null 2>/dev/null selfserv_9709 with PID 29416 found at Mon Apr 25 15:18:27 UTC 2016 selfserv_9709 with PID 29416 started at Mon Apr 25 15:18:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2917: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29416 >/dev/null 2>/dev/null selfserv_9709 with PID 29416 found at Mon Apr 25 15:18:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2918: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29416 >/dev/null 2>/dev/null selfserv_9709 with PID 29416 found at Mon Apr 25 15:18:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2919: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29416 >/dev/null 2>/dev/null selfserv_9709 with PID 29416 found at Mon Apr 25 15:18:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2920: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29416 >/dev/null 2>/dev/null selfserv_9709 with PID 29416 found at Mon Apr 25 15:18:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2921: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 29416 at Mon Apr 25 15:18:30 UTC 2016 kill -USR1 29416 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29416 killed at Mon Apr 25 15:18:31 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:18:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:31 UTC 2016 selfserv_9709 with PID 29564 started at Mon Apr 25 15:18:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2922: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2923: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2924: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2925: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2926: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2927: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2928: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2929: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2930: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2931: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2932: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2933: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 29564 >/dev/null 2>/dev/null selfserv_9709 with PID 29564 found at Mon Apr 25 15:18:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2934: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29564 at Mon Apr 25 15:18:40 UTC 2016 kill -USR1 29564 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29564 killed at Mon Apr 25 15:18:41 UTC 2016 ssl.sh: SSL Client Authentication Extended Test - server fips/client normal - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:18:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29948 >/dev/null 2>/dev/null selfserv_9709 with PID 29948 found at Mon Apr 25 15:18:41 UTC 2016 selfserv_9709 with PID 29948 started at Mon Apr 25 15:18:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2935: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29948 at Mon Apr 25 15:18:42 UTC 2016 kill -USR1 29948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29948 killed at Mon Apr 25 15:18:43 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:18:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30005 >/dev/null 2>/dev/null selfserv_9709 with PID 30005 found at Mon Apr 25 15:18:43 UTC 2016 selfserv_9709 with PID 30005 started at Mon Apr 25 15:18:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2936: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30005 at Mon Apr 25 15:18:44 UTC 2016 kill -USR1 30005 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30005 killed at Mon Apr 25 15:18:44 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:18:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30062 >/dev/null 2>/dev/null selfserv_9709 with PID 30062 found at Mon Apr 25 15:18:45 UTC 2016 selfserv_9709 with PID 30062 started at Mon Apr 25 15:18:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2937: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30062 at Mon Apr 25 15:18:46 UTC 2016 kill -USR1 30062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30062 killed at Mon Apr 25 15:18:46 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:18:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30119 >/dev/null 2>/dev/null selfserv_9709 with PID 30119 found at Mon Apr 25 15:18:47 UTC 2016 selfserv_9709 with PID 30119 started at Mon Apr 25 15:18:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2938: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30119 at Mon Apr 25 15:18:48 UTC 2016 kill -USR1 30119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30119 killed at Mon Apr 25 15:18:48 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:18:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30176 >/dev/null 2>/dev/null selfserv_9709 with PID 30176 found at Mon Apr 25 15:18:49 UTC 2016 selfserv_9709 with PID 30176 started at Mon Apr 25 15:18:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2939: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30176 at Mon Apr 25 15:18:49 UTC 2016 kill -USR1 30176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30176 killed at Mon Apr 25 15:18:50 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:18:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30233 >/dev/null 2>/dev/null selfserv_9709 with PID 30233 found at Mon Apr 25 15:18:50 UTC 2016 selfserv_9709 with PID 30233 started at Mon Apr 25 15:18:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2940: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30233 at Mon Apr 25 15:18:51 UTC 2016 kill -USR1 30233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30233 killed at Mon Apr 25 15:18:52 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:18:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30290 >/dev/null 2>/dev/null selfserv_9709 with PID 30290 found at Mon Apr 25 15:18:52 UTC 2016 selfserv_9709 with PID 30290 started at Mon Apr 25 15:18:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2941: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30290 at Mon Apr 25 15:18:53 UTC 2016 kill -USR1 30290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30290 killed at Mon Apr 25 15:18:53 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:18:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30348 >/dev/null 2>/dev/null selfserv_9709 with PID 30348 found at Mon Apr 25 15:18:54 UTC 2016 selfserv_9709 with PID 30348 started at Mon Apr 25 15:18:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2942: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30348 at Mon Apr 25 15:18:55 UTC 2016 kill -USR1 30348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30348 killed at Mon Apr 25 15:18:55 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:18:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30405 >/dev/null 2>/dev/null selfserv_9709 with PID 30405 found at Mon Apr 25 15:18:56 UTC 2016 selfserv_9709 with PID 30405 started at Mon Apr 25 15:18:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2943: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30405 at Mon Apr 25 15:18:57 UTC 2016 kill -USR1 30405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30405 killed at Mon Apr 25 15:18:57 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:18:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30462 >/dev/null 2>/dev/null selfserv_9709 with PID 30462 found at Mon Apr 25 15:18:58 UTC 2016 selfserv_9709 with PID 30462 started at Mon Apr 25 15:18:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2944: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30462 at Mon Apr 25 15:18:58 UTC 2016 kill -USR1 30462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30462 killed at Mon Apr 25 15:18:59 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:18:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:18:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30519 >/dev/null 2>/dev/null selfserv_9709 with PID 30519 found at Mon Apr 25 15:18:59 UTC 2016 selfserv_9709 with PID 30519 started at Mon Apr 25 15:18:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2945: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30519 at Mon Apr 25 15:19:00 UTC 2016 kill -USR1 30519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30519 killed at Mon Apr 25 15:19:00 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30576 >/dev/null 2>/dev/null selfserv_9709 with PID 30576 found at Mon Apr 25 15:19:01 UTC 2016 selfserv_9709 with PID 30576 started at Mon Apr 25 15:19:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2946: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30576 at Mon Apr 25 15:19:02 UTC 2016 kill -USR1 30576 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30576 killed at Mon Apr 25 15:19:02 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30646 >/dev/null 2>/dev/null selfserv_9709 with PID 30646 found at Mon Apr 25 15:19:03 UTC 2016 selfserv_9709 with PID 30646 started at Mon Apr 25 15:19:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2947: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30646 at Mon Apr 25 15:19:04 UTC 2016 kill -USR1 30646 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30646 killed at Mon Apr 25 15:19:04 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30703 >/dev/null 2>/dev/null selfserv_9709 with PID 30703 found at Mon Apr 25 15:19:05 UTC 2016 selfserv_9709 with PID 30703 started at Mon Apr 25 15:19:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2948: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30703 at Mon Apr 25 15:19:06 UTC 2016 kill -USR1 30703 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30703 killed at Mon Apr 25 15:19:06 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30760 >/dev/null 2>/dev/null selfserv_9709 with PID 30760 found at Mon Apr 25 15:19:07 UTC 2016 selfserv_9709 with PID 30760 started at Mon Apr 25 15:19:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2949: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30760 at Mon Apr 25 15:19:08 UTC 2016 kill -USR1 30760 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30760 killed at Mon Apr 25 15:19:08 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30817 >/dev/null 2>/dev/null selfserv_9709 with PID 30817 found at Mon Apr 25 15:19:09 UTC 2016 selfserv_9709 with PID 30817 started at Mon Apr 25 15:19:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2950: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30817 at Mon Apr 25 15:19:10 UTC 2016 kill -USR1 30817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30817 killed at Mon Apr 25 15:19:10 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30877 >/dev/null 2>/dev/null selfserv_9709 with PID 30877 found at Mon Apr 25 15:19:11 UTC 2016 selfserv_9709 with PID 30877 started at Mon Apr 25 15:19:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2951: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30877 at Mon Apr 25 15:19:12 UTC 2016 kill -USR1 30877 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30877 killed at Mon Apr 25 15:19:12 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30934 >/dev/null 2>/dev/null selfserv_9709 with PID 30934 found at Mon Apr 25 15:19:13 UTC 2016 selfserv_9709 with PID 30934 started at Mon Apr 25 15:19:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2952: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30934 at Mon Apr 25 15:19:14 UTC 2016 kill -USR1 30934 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30934 killed at Mon Apr 25 15:19:14 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30992 >/dev/null 2>/dev/null selfserv_9709 with PID 30992 found at Mon Apr 25 15:19:15 UTC 2016 selfserv_9709 with PID 30992 started at Mon Apr 25 15:19:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2953: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30992 at Mon Apr 25 15:19:16 UTC 2016 kill -USR1 30992 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30992 killed at Mon Apr 25 15:19:16 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31049 >/dev/null 2>/dev/null selfserv_9709 with PID 31049 found at Mon Apr 25 15:19:17 UTC 2016 selfserv_9709 with PID 31049 started at Mon Apr 25 15:19:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2954: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31049 at Mon Apr 25 15:19:18 UTC 2016 kill -USR1 31049 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31049 killed at Mon Apr 25 15:19:18 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31106 >/dev/null 2>/dev/null selfserv_9709 with PID 31106 found at Mon Apr 25 15:19:19 UTC 2016 selfserv_9709 with PID 31106 started at Mon Apr 25 15:19:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2955: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31106 at Mon Apr 25 15:19:20 UTC 2016 kill -USR1 31106 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31106 killed at Mon Apr 25 15:19:20 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31163 >/dev/null 2>/dev/null selfserv_9709 with PID 31163 found at Mon Apr 25 15:19:21 UTC 2016 selfserv_9709 with PID 31163 started at Mon Apr 25 15:19:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2956: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31163 at Mon Apr 25 15:19:22 UTC 2016 kill -USR1 31163 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31163 killed at Mon Apr 25 15:19:22 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31220 >/dev/null 2>/dev/null selfserv_9709 with PID 31220 found at Mon Apr 25 15:19:23 UTC 2016 selfserv_9709 with PID 31220 started at Mon Apr 25 15:19:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2957: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31220 at Mon Apr 25 15:19:24 UTC 2016 kill -USR1 31220 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31220 killed at Mon Apr 25 15:19:24 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31277 >/dev/null 2>/dev/null selfserv_9709 with PID 31277 found at Mon Apr 25 15:19:25 UTC 2016 selfserv_9709 with PID 31277 started at Mon Apr 25 15:19:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2958: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31277 at Mon Apr 25 15:19:26 UTC 2016 kill -USR1 31277 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31277 killed at Mon Apr 25 15:19:27 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31336 >/dev/null 2>/dev/null selfserv_9709 with PID 31336 found at Mon Apr 25 15:19:27 UTC 2016 selfserv_9709 with PID 31336 started at Mon Apr 25 15:19:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2959: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31336 at Mon Apr 25 15:19:28 UTC 2016 kill -USR1 31336 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31336 killed at Mon Apr 25 15:19:28 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31393 >/dev/null 2>/dev/null selfserv_9709 with PID 31393 found at Mon Apr 25 15:19:29 UTC 2016 selfserv_9709 with PID 31393 started at Mon Apr 25 15:19:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2960: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31393 at Mon Apr 25 15:19:30 UTC 2016 kill -USR1 31393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31393 killed at Mon Apr 25 15:19:30 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31450 >/dev/null 2>/dev/null selfserv_9709 with PID 31450 found at Mon Apr 25 15:19:31 UTC 2016 selfserv_9709 with PID 31450 started at Mon Apr 25 15:19:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2961: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31450 at Mon Apr 25 15:19:32 UTC 2016 kill -USR1 31450 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31450 killed at Mon Apr 25 15:19:32 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31507 >/dev/null 2>/dev/null selfserv_9709 with PID 31507 found at Mon Apr 25 15:19:33 UTC 2016 selfserv_9709 with PID 31507 started at Mon Apr 25 15:19:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2962: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31507 at Mon Apr 25 15:19:34 UTC 2016 kill -USR1 31507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31507 killed at Mon Apr 25 15:19:34 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31564 >/dev/null 2>/dev/null selfserv_9709 with PID 31564 found at Mon Apr 25 15:19:34 UTC 2016 selfserv_9709 with PID 31564 started at Mon Apr 25 15:19:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2963: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31564 at Mon Apr 25 15:19:35 UTC 2016 kill -USR1 31564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31564 killed at Mon Apr 25 15:19:36 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31622 >/dev/null 2>/dev/null selfserv_9709 with PID 31622 found at Mon Apr 25 15:19:36 UTC 2016 selfserv_9709 with PID 31622 started at Mon Apr 25 15:19:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2964: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31622 at Mon Apr 25 15:19:37 UTC 2016 kill -USR1 31622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31622 killed at Mon Apr 25 15:19:38 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31694 >/dev/null 2>/dev/null selfserv_9709 with PID 31694 found at Mon Apr 25 15:19:38 UTC 2016 selfserv_9709 with PID 31694 started at Mon Apr 25 15:19:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2965: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31694 at Mon Apr 25 15:19:39 UTC 2016 kill -USR1 31694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31694 killed at Mon Apr 25 15:19:40 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31751 >/dev/null 2>/dev/null selfserv_9709 with PID 31751 found at Mon Apr 25 15:19:40 UTC 2016 selfserv_9709 with PID 31751 started at Mon Apr 25 15:19:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2966: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31751 at Mon Apr 25 15:19:41 UTC 2016 kill -USR1 31751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31751 killed at Mon Apr 25 15:19:42 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31808 >/dev/null 2>/dev/null selfserv_9709 with PID 31808 found at Mon Apr 25 15:19:42 UTC 2016 selfserv_9709 with PID 31808 started at Mon Apr 25 15:19:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2967: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31808 at Mon Apr 25 15:19:43 UTC 2016 kill -USR1 31808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31808 killed at Mon Apr 25 15:19:43 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31865 >/dev/null 2>/dev/null selfserv_9709 with PID 31865 found at Mon Apr 25 15:19:44 UTC 2016 selfserv_9709 with PID 31865 started at Mon Apr 25 15:19:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2968: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31865 at Mon Apr 25 15:19:45 UTC 2016 kill -USR1 31865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31865 killed at Mon Apr 25 15:19:45 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31922 >/dev/null 2>/dev/null selfserv_9709 with PID 31922 found at Mon Apr 25 15:19:46 UTC 2016 selfserv_9709 with PID 31922 started at Mon Apr 25 15:19:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2969: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31922 at Mon Apr 25 15:19:47 UTC 2016 kill -USR1 31922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31922 killed at Mon Apr 25 15:19:47 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31979 >/dev/null 2>/dev/null selfserv_9709 with PID 31979 found at Mon Apr 25 15:19:48 UTC 2016 selfserv_9709 with PID 31979 started at Mon Apr 25 15:19:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2970: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31979 at Mon Apr 25 15:19:48 UTC 2016 kill -USR1 31979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31979 killed at Mon Apr 25 15:19:49 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32036 >/dev/null 2>/dev/null selfserv_9709 with PID 32036 found at Mon Apr 25 15:19:49 UTC 2016 selfserv_9709 with PID 32036 started at Mon Apr 25 15:19:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2971: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32036 at Mon Apr 25 15:19:50 UTC 2016 kill -USR1 32036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32036 killed at Mon Apr 25 15:19:51 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32093 >/dev/null 2>/dev/null selfserv_9709 with PID 32093 found at Mon Apr 25 15:19:51 UTC 2016 selfserv_9709 with PID 32093 started at Mon Apr 25 15:19:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2972: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32093 at Mon Apr 25 15:19:52 UTC 2016 kill -USR1 32093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32093 killed at Mon Apr 25 15:19:53 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32150 >/dev/null 2>/dev/null selfserv_9709 with PID 32150 found at Mon Apr 25 15:19:53 UTC 2016 selfserv_9709 with PID 32150 started at Mon Apr 25 15:19:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2973: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32150 at Mon Apr 25 15:19:54 UTC 2016 kill -USR1 32150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32150 killed at Mon Apr 25 15:19:55 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32207 >/dev/null 2>/dev/null selfserv_9709 with PID 32207 found at Mon Apr 25 15:19:55 UTC 2016 selfserv_9709 with PID 32207 started at Mon Apr 25 15:19:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2974: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32207 at Mon Apr 25 15:19:56 UTC 2016 kill -USR1 32207 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32207 killed at Mon Apr 25 15:19:57 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:19:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32265 >/dev/null 2>/dev/null selfserv_9709 with PID 32265 found at Mon Apr 25 15:19:57 UTC 2016 selfserv_9709 with PID 32265 started at Mon Apr 25 15:19:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2975: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32265 at Mon Apr 25 15:19:58 UTC 2016 kill -USR1 32265 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32265 killed at Mon Apr 25 15:19:59 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:19:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:19:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32322 >/dev/null 2>/dev/null selfserv_9709 with PID 32322 found at Mon Apr 25 15:19:59 UTC 2016 selfserv_9709 with PID 32322 started at Mon Apr 25 15:19:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2976: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32322 at Mon Apr 25 15:20:01 UTC 2016 kill -USR1 32322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32322 killed at Mon Apr 25 15:20:01 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:20:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32394 >/dev/null 2>/dev/null selfserv_9709 with PID 32394 found at Mon Apr 25 15:20:01 UTC 2016 selfserv_9709 with PID 32394 started at Mon Apr 25 15:20:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2977: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32394 at Mon Apr 25 15:20:03 UTC 2016 kill -USR1 32394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32394 killed at Mon Apr 25 15:20:03 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:20:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32451 >/dev/null 2>/dev/null selfserv_9709 with PID 32451 found at Mon Apr 25 15:20:03 UTC 2016 selfserv_9709 with PID 32451 started at Mon Apr 25 15:20:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2978: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32451 at Mon Apr 25 15:20:05 UTC 2016 kill -USR1 32451 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32451 killed at Mon Apr 25 15:20:05 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:20:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32508 >/dev/null 2>/dev/null selfserv_9709 with PID 32508 found at Mon Apr 25 15:20:06 UTC 2016 selfserv_9709 with PID 32508 started at Mon Apr 25 15:20:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2979: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32508 at Mon Apr 25 15:20:07 UTC 2016 kill -USR1 32508 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32508 killed at Mon Apr 25 15:20:07 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:20:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32565 >/dev/null 2>/dev/null selfserv_9709 with PID 32565 found at Mon Apr 25 15:20:08 UTC 2016 selfserv_9709 with PID 32565 started at Mon Apr 25 15:20:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2980: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32565 at Mon Apr 25 15:20:09 UTC 2016 kill -USR1 32565 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32565 killed at Mon Apr 25 15:20:09 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:20:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32622 >/dev/null 2>/dev/null selfserv_9709 with PID 32622 found at Mon Apr 25 15:20:10 UTC 2016 selfserv_9709 with PID 32622 started at Mon Apr 25 15:20:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2981: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32622 at Mon Apr 25 15:20:11 UTC 2016 kill -USR1 32622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32622 killed at Mon Apr 25 15:20:11 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:20:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32682 >/dev/null 2>/dev/null selfserv_9709 with PID 32682 found at Mon Apr 25 15:20:12 UTC 2016 selfserv_9709 with PID 32682 started at Mon Apr 25 15:20:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2982: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32682 at Mon Apr 25 15:20:13 UTC 2016 kill -USR1 32682 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32682 killed at Mon Apr 25 15:20:13 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:20:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32739 >/dev/null 2>/dev/null selfserv_9709 with PID 32739 found at Mon Apr 25 15:20:14 UTC 2016 selfserv_9709 with PID 32739 started at Mon Apr 25 15:20:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2983: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32739 at Mon Apr 25 15:20:15 UTC 2016 kill -USR1 32739 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32739 killed at Mon Apr 25 15:20:15 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:20:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 329 >/dev/null 2>/dev/null selfserv_9709 with PID 329 found at Mon Apr 25 15:20:16 UTC 2016 selfserv_9709 with PID 329 started at Mon Apr 25 15:20:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2984: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 329 at Mon Apr 25 15:20:17 UTC 2016 kill -USR1 329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 329 killed at Mon Apr 25 15:20:17 UTC 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server fips/client normal - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 15:20:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 504 >/dev/null 2>/dev/null selfserv_9709 with PID 504 found at Mon Apr 25 15:20:18 UTC 2016 selfserv_9709 with PID 504 started at Mon Apr 25 15:20:18 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:18 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:20:20 UTC 2016 ssl.sh: #2985: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 504 at Mon Apr 25 15:20:20 UTC 2016 kill -USR1 504 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 504 killed at Mon Apr 25 15:20:20 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 15:20:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 580 >/dev/null 2>/dev/null selfserv_9709 with PID 580 found at Mon Apr 25 15:20:21 UTC 2016 selfserv_9709 with PID 580 started at Mon Apr 25 15:20:21 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:21 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:20:22 UTC 2016 ssl.sh: #2986: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 580 at Mon Apr 25 15:20:22 UTC 2016 kill -USR1 580 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 580 killed at Mon Apr 25 15:20:23 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 15:20:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 656 >/dev/null 2>/dev/null selfserv_9709 with PID 656 found at Mon Apr 25 15:20:23 UTC 2016 selfserv_9709 with PID 656 started at Mon Apr 25 15:20:23 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:20:25 UTC 2016 ssl.sh: #2987: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 656 at Mon Apr 25 15:20:25 UTC 2016 kill -USR1 656 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 656 killed at Mon Apr 25 15:20:25 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 15:20:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 732 >/dev/null 2>/dev/null selfserv_9709 with PID 732 found at Mon Apr 25 15:20:26 UTC 2016 selfserv_9709 with PID 732 started at Mon Apr 25 15:20:26 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:26 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:20:27 UTC 2016 ssl.sh: #2988: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 732 at Mon Apr 25 15:20:27 UTC 2016 kill -USR1 732 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 732 killed at Mon Apr 25 15:20:28 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 15:20:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 808 >/dev/null 2>/dev/null selfserv_9709 with PID 808 found at Mon Apr 25 15:20:28 UTC 2016 selfserv_9709 with PID 808 started at Mon Apr 25 15:20:28 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:28 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:20:30 UTC 2016 ssl.sh: #2989: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 808 at Mon Apr 25 15:20:30 UTC 2016 kill -USR1 808 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 808 killed at Mon Apr 25 15:20:31 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 15:20:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 884 >/dev/null 2>/dev/null selfserv_9709 with PID 884 found at Mon Apr 25 15:20:31 UTC 2016 selfserv_9709 with PID 884 started at Mon Apr 25 15:20:31 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:31 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:20:33 UTC 2016 ssl.sh: #2990: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 884 at Mon Apr 25 15:20:33 UTC 2016 kill -USR1 884 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 884 killed at Mon Apr 25 15:20:34 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 15:20:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 960 >/dev/null 2>/dev/null selfserv_9709 with PID 960 found at Mon Apr 25 15:20:34 UTC 2016 selfserv_9709 with PID 960 started at Mon Apr 25 15:20:34 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:34 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:20:36 UTC 2016 ssl.sh: #2991: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 960 at Mon Apr 25 15:20:36 UTC 2016 kill -USR1 960 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 960 killed at Mon Apr 25 15:20:36 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:20:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1083 >/dev/null 2>/dev/null selfserv_9709 with PID 1083 found at Mon Apr 25 15:20:37 UTC 2016 selfserv_9709 with PID 1083 started at Mon Apr 25 15:20:37 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:20:41 UTC 2016 ssl.sh: #2992: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1083 at Mon Apr 25 15:20:41 UTC 2016 kill -USR1 1083 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1083 killed at Mon Apr 25 15:20:42 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:20:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1159 >/dev/null 2>/dev/null selfserv_9709 with PID 1159 found at Mon Apr 25 15:20:42 UTC 2016 selfserv_9709 with PID 1159 started at Mon Apr 25 15:20:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 100 -C c -V ssl3: -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:20:47 UTC 2016 ssl.sh: #2993: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1159 at Mon Apr 25 15:20:47 UTC 2016 kill -USR1 1159 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1159 killed at Mon Apr 25 15:20:47 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:20:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1234 >/dev/null 2>/dev/null selfserv_9709 with PID 1234 found at Mon Apr 25 15:20:48 UTC 2016 selfserv_9709 with PID 1234 started at Mon Apr 25 15:20:48 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:48 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:20:49 UTC 2016 ssl.sh: #2994: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1234 at Mon Apr 25 15:20:49 UTC 2016 kill -USR1 1234 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1234 killed at Mon Apr 25 15:20:49 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:20:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1310 >/dev/null 2>/dev/null selfserv_9709 with PID 1310 found at Mon Apr 25 15:20:50 UTC 2016 selfserv_9709 with PID 1310 started at Mon Apr 25 15:20:50 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:50 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:20:50 UTC 2016 ssl.sh: #2995: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1310 at Mon Apr 25 15:20:51 UTC 2016 kill -USR1 1310 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1310 killed at Mon Apr 25 15:20:51 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 15:20:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1386 >/dev/null 2>/dev/null selfserv_9709 with PID 1386 found at Mon Apr 25 15:20:51 UTC 2016 selfserv_9709 with PID 1386 started at Mon Apr 25 15:20:51 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:20:52 UTC 2016 ssl.sh: #2996: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1386 at Mon Apr 25 15:20:52 UTC 2016 kill -USR1 1386 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1386 killed at Mon Apr 25 15:20:53 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:20:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1462 >/dev/null 2>/dev/null selfserv_9709 with PID 1462 found at Mon Apr 25 15:20:53 UTC 2016 selfserv_9709 with PID 1462 started at Mon Apr 25 15:20:53 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:53 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:20:54 UTC 2016 ssl.sh: #2997: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1462 at Mon Apr 25 15:20:54 UTC 2016 kill -USR1 1462 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1462 killed at Mon Apr 25 15:20:55 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 15:20:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1538 >/dev/null 2>/dev/null selfserv_9709 with PID 1538 found at Mon Apr 25 15:20:55 UTC 2016 selfserv_9709 with PID 1538 started at Mon Apr 25 15:20:55 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:20:56 UTC 2016 ssl.sh: #2998: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1538 at Mon Apr 25 15:20:56 UTC 2016 kill -USR1 1538 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1538 killed at Mon Apr 25 15:20:57 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:20:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:20:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1648 >/dev/null 2>/dev/null selfserv_9709 with PID 1648 found at Mon Apr 25 15:20:57 UTC 2016 selfserv_9709 with PID 1648 started at Mon Apr 25 15:20:57 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:20:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:21:07 UTC 2016 ssl.sh: #2999: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1648 at Mon Apr 25 15:21:07 UTC 2016 kill -USR1 1648 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1648 killed at Mon Apr 25 15:21:08 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:21:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1737 >/dev/null 2>/dev/null selfserv_9709 with PID 1737 found at Mon Apr 25 15:21:08 UTC 2016 selfserv_9709 with PID 1737 started at Mon Apr 25 15:21:08 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:21:19 UTC 2016 ssl.sh: #3000: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1737 at Mon Apr 25 15:21:19 UTC 2016 kill -USR1 1737 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1737 killed at Mon Apr 25 15:21:19 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:21:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1816 >/dev/null 2>/dev/null selfserv_9709 with PID 1816 found at Mon Apr 25 15:21:20 UTC 2016 selfserv_9709 with PID 1816 started at Mon Apr 25 15:21:20 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:20 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:21:30 UTC 2016 ssl.sh: #3001: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1816 at Mon Apr 25 15:21:30 UTC 2016 kill -USR1 1816 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1816 killed at Mon Apr 25 15:21:30 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:21:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1891 >/dev/null 2>/dev/null selfserv_9709 with PID 1891 found at Mon Apr 25 15:21:31 UTC 2016 selfserv_9709 with PID 1891 started at Mon Apr 25 15:21:31 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:31 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:21:41 UTC 2016 ssl.sh: #3002: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1891 at Mon Apr 25 15:21:41 UTC 2016 kill -USR1 1891 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1891 killed at Mon Apr 25 15:21:41 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:21:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1969 >/dev/null 2>/dev/null selfserv_9709 with PID 1969 found at Mon Apr 25 15:21:42 UTC 2016 selfserv_9709 with PID 1969 started at Mon Apr 25 15:21:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:21:44 UTC 2016 ssl.sh: #3003: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 1969 at Mon Apr 25 15:21:44 UTC 2016 kill -USR1 1969 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1969 killed at Mon Apr 25 15:21:44 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 15:21:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2050 >/dev/null 2>/dev/null selfserv_9709 with PID 2050 found at Mon Apr 25 15:21:45 UTC 2016 selfserv_9709 with PID 2050 started at Mon Apr 25 15:21:45 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:21:46 UTC 2016 ssl.sh: #3004: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2050 at Mon Apr 25 15:21:46 UTC 2016 kill -USR1 2050 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2050 killed at Mon Apr 25 15:21:47 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 15:21:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2126 >/dev/null 2>/dev/null selfserv_9709 with PID 2126 found at Mon Apr 25 15:21:47 UTC 2016 selfserv_9709 with PID 2126 started at Mon Apr 25 15:21:47 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:21:49 UTC 2016 ssl.sh: #3005: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2126 at Mon Apr 25 15:21:49 UTC 2016 kill -USR1 2126 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2126 killed at Mon Apr 25 15:21:49 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 15:21:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2203 >/dev/null 2>/dev/null selfserv_9709 with PID 2203 found at Mon Apr 25 15:21:50 UTC 2016 selfserv_9709 with PID 2203 started at Mon Apr 25 15:21:50 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:50 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:21:51 UTC 2016 ssl.sh: #3006: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2203 at Mon Apr 25 15:21:51 UTC 2016 kill -USR1 2203 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2203 killed at Mon Apr 25 15:21:52 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 15:21:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2279 >/dev/null 2>/dev/null selfserv_9709 with PID 2279 found at Mon Apr 25 15:21:52 UTC 2016 selfserv_9709 with PID 2279 started at Mon Apr 25 15:21:52 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:21:54 UTC 2016 ssl.sh: #3007: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2279 at Mon Apr 25 15:21:54 UTC 2016 kill -USR1 2279 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2279 killed at Mon Apr 25 15:21:55 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 15:21:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2355 >/dev/null 2>/dev/null selfserv_9709 with PID 2355 found at Mon Apr 25 15:21:55 UTC 2016 selfserv_9709 with PID 2355 started at Mon Apr 25 15:21:55 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:21:56 UTC 2016 ssl.sh: #3008: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2355 at Mon Apr 25 15:21:56 UTC 2016 kill -USR1 2355 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2355 killed at Mon Apr 25 15:21:57 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:21:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:21:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2452 >/dev/null 2>/dev/null selfserv_9709 with PID 2452 found at Mon Apr 25 15:21:57 UTC 2016 selfserv_9709 with PID 2452 started at Mon Apr 25 15:21:57 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:21:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:22:00 UTC 2016 ssl.sh: #3009: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2452 at Mon Apr 25 15:22:00 UTC 2016 kill -USR1 2452 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2452 killed at Mon Apr 25 15:22:00 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:22:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2528 >/dev/null 2>/dev/null selfserv_9709 with PID 2528 found at Mon Apr 25 15:22:01 UTC 2016 selfserv_9709 with PID 2528 started at Mon Apr 25 15:22:01 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:22:02 UTC 2016 ssl.sh: #3010: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2528 at Mon Apr 25 15:22:02 UTC 2016 kill -USR1 2528 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2528 killed at Mon Apr 25 15:22:02 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:22:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2617 >/dev/null 2>/dev/null selfserv_9709 with PID 2617 found at Mon Apr 25 15:22:03 UTC 2016 selfserv_9709 with PID 2617 started at Mon Apr 25 15:22:03 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:22:05 UTC 2016 ssl.sh: #3011: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2617 at Mon Apr 25 15:22:05 UTC 2016 kill -USR1 2617 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2617 killed at Mon Apr 25 15:22:06 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:22:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2692 >/dev/null 2>/dev/null selfserv_9709 with PID 2692 found at Mon Apr 25 15:22:06 UTC 2016 selfserv_9709 with PID 2692 started at Mon Apr 25 15:22:06 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:22:07 UTC 2016 ssl.sh: #3012: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2692 at Mon Apr 25 15:22:07 UTC 2016 kill -USR1 2692 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2692 killed at Mon Apr 25 15:22:08 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 15:22:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2767 >/dev/null 2>/dev/null selfserv_9709 with PID 2767 found at Mon Apr 25 15:22:08 UTC 2016 selfserv_9709 with PID 2767 started at Mon Apr 25 15:22:08 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:22:09 UTC 2016 ssl.sh: #3013: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2767 at Mon Apr 25 15:22:09 UTC 2016 kill -USR1 2767 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2767 killed at Mon Apr 25 15:22:10 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:22:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2843 >/dev/null 2>/dev/null selfserv_9709 with PID 2843 found at Mon Apr 25 15:22:10 UTC 2016 selfserv_9709 with PID 2843 started at Mon Apr 25 15:22:10 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:22:11 UTC 2016 ssl.sh: #3014: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2843 at Mon Apr 25 15:22:11 UTC 2016 kill -USR1 2843 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2843 killed at Mon Apr 25 15:22:12 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:22:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2945 >/dev/null 2>/dev/null selfserv_9709 with PID 2945 found at Mon Apr 25 15:22:12 UTC 2016 selfserv_9709 with PID 2945 started at Mon Apr 25 15:22:12 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:22:18 UTC 2016 ssl.sh: #3015: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 2945 at Mon Apr 25 15:22:18 UTC 2016 kill -USR1 2945 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2945 killed at Mon Apr 25 15:22:19 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 15:22:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3039 >/dev/null 2>/dev/null selfserv_9709 with PID 3039 found at Mon Apr 25 15:22:19 UTC 2016 selfserv_9709 with PID 3039 started at Mon Apr 25 15:22:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:22:21 UTC 2016 ssl.sh: #3016: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3039 at Mon Apr 25 15:22:21 UTC 2016 kill -USR1 3039 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3039 killed at Mon Apr 25 15:22:21 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:22:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3134 >/dev/null 2>/dev/null selfserv_9709 with PID 3134 found at Mon Apr 25 15:22:22 UTC 2016 selfserv_9709 with PID 3134 started at Mon Apr 25 15:22:22 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:22:28 UTC 2016 ssl.sh: #3017: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3134 at Mon Apr 25 15:22:28 UTC 2016 kill -USR1 3134 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3134 killed at Mon Apr 25 15:22:28 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:22:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3209 >/dev/null 2>/dev/null selfserv_9709 with PID 3209 found at Mon Apr 25 15:22:29 UTC 2016 selfserv_9709 with PID 3209 started at Mon Apr 25 15:22:29 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:22:38 UTC 2016 ssl.sh: #3018: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3209 at Mon Apr 25 15:22:38 UTC 2016 kill -USR1 3209 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3209 killed at Mon Apr 25 15:22:39 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:22:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:22:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3298 >/dev/null 2>/dev/null selfserv_9709 with PID 3298 found at Mon Apr 25 15:22:39 UTC 2016 selfserv_9709 with PID 3298 started at Mon Apr 25 15:22:39 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:22:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:24:09 UTC 2016 ssl.sh: #3019: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3298 at Mon Apr 25 15:24:09 UTC 2016 kill -USR1 3298 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3298 killed at Mon Apr 25 15:24:09 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 15:24:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:24:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3428 >/dev/null 2>/dev/null selfserv_9709 with PID 3428 found at Mon Apr 25 15:24:10 UTC 2016 selfserv_9709 with PID 3428 started at Mon Apr 25 15:24:10 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:24:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:25:39 UTC 2016 ssl.sh: #3020: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3428 at Mon Apr 25 15:25:39 UTC 2016 kill -USR1 3428 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3428 killed at Mon Apr 25 15:25:39 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:25:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:25:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3527 >/dev/null 2>/dev/null selfserv_9709 with PID 3527 found at Mon Apr 25 15:25:40 UTC 2016 selfserv_9709 with PID 3527 started at Mon Apr 25 15:25:40 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:25:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:25:46 UTC 2016 ssl.sh: #3021: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3527 at Mon Apr 25 15:25:46 UTC 2016 kill -USR1 3527 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3527 killed at Mon Apr 25 15:25:46 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 15:25:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:25:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3603 >/dev/null 2>/dev/null selfserv_9709 with PID 3603 found at Mon Apr 25 15:25:47 UTC 2016 selfserv_9709 with PID 3603 started at Mon Apr 25 15:25:47 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 15:25:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:25:52 UTC 2016 ssl.sh: #3022: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3603 at Mon Apr 25 15:25:53 UTC 2016 kill -USR1 3603 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3603 killed at Mon Apr 25 15:25:53 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:25:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:25:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3699 >/dev/null 2>/dev/null selfserv_9709 with PID 3699 found at Mon Apr 25 15:25:54 UTC 2016 selfserv_9709 with PID 3699 started at Mon Apr 25 15:25:54 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:25:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:26:09 UTC 2016 ssl.sh: #3023: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3699 at Mon Apr 25 15:26:09 UTC 2016 kill -USR1 3699 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3699 killed at Mon Apr 25 15:26:09 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:26:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:26:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3791 >/dev/null 2>/dev/null selfserv_9709 with PID 3791 found at Mon Apr 25 15:26:10 UTC 2016 selfserv_9709 with PID 3791 started at Mon Apr 25 15:26:10 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:26:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:26:12 UTC 2016 ssl.sh: #3024: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3791 at Mon Apr 25 15:26:12 UTC 2016 kill -USR1 3791 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3791 killed at Mon Apr 25 15:26:12 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:26:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:26:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3884 >/dev/null 2>/dev/null selfserv_9709 with PID 3884 found at Mon Apr 25 15:26:13 UTC 2016 selfserv_9709 with PID 3884 started at Mon Apr 25 15:26:13 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:26:13 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:28:38 UTC 2016 ssl.sh: #3025: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3884 at Mon Apr 25 15:28:38 UTC 2016 kill -USR1 3884 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3884 killed at Mon Apr 25 15:28:38 UTC 2016 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #3026: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/server -list ssl.sh: #3027: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #3028: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #3029: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_server -list ssl.sh: #3030: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #3031: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #3032: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -list ssl.sh: #3033: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3034: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #3035: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -list ssl.sh: #3036: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #3037: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips - with ECC =============================== selfserv_9709 starting at Mon Apr 25 15:28:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:28:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:43 UTC 2016 selfserv_9709 with PID 4119 started at Mon Apr 25 15:28:43 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3038: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3039: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3040: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3041: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3042: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3043: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3044: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3045: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3046: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3047: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3048: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3049: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3050: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3051: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3052: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3053: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3054: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3055: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3056: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3057: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3058: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3059: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3060: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3061: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:28:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3062: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3063: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3064: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3065: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3066: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3067: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3068: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3069: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3070: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3071: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3072: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3073: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3074: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3075: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3076: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3077: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3078: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3079: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3080: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3081: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3082: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3083: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3084: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3085: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3086: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3087: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3088: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3089: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3090: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3091: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3092: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3093: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3094: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3095: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3096: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3097: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3098: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3099: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3100: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3101: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3102: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3103: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3104: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 4119 >/dev/null 2>/dev/null selfserv_9709 with PID 4119 found at Mon Apr 25 15:29:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3105: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 4119 at Mon Apr 25 15:29:30 UTC 2016 kill -USR1 4119 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4119 killed at Mon Apr 25 15:29:30 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:29:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:29:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6036 >/dev/null 2>/dev/null selfserv_9709 with PID 6036 found at Mon Apr 25 15:29:31 UTC 2016 selfserv_9709 with PID 6036 started at Mon Apr 25 15:29:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3106: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6036 >/dev/null 2>/dev/null selfserv_9709 with PID 6036 found at Mon Apr 25 15:29:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3107: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6036 >/dev/null 2>/dev/null selfserv_9709 with PID 6036 found at Mon Apr 25 15:29:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3108: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6036 >/dev/null 2>/dev/null selfserv_9709 with PID 6036 found at Mon Apr 25 15:29:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3109: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6036 >/dev/null 2>/dev/null selfserv_9709 with PID 6036 found at Mon Apr 25 15:29:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3110: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 6036 at Mon Apr 25 15:29:34 UTC 2016 kill -USR1 6036 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6036 killed at Mon Apr 25 15:29:35 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:29:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:29:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:35 UTC 2016 selfserv_9709 with PID 6184 started at Mon Apr 25 15:29:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3111: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3112: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3113: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3114: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3115: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3116: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3117: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3118: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3119: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3120: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3121: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3122: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3123: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3124: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6184 >/dev/null 2>/dev/null selfserv_9709 with PID 6184 found at Mon Apr 25 15:29:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3125: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 6184 at Mon Apr 25 15:29:46 UTC 2016 kill -USR1 6184 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6184 killed at Mon Apr 25 15:29:46 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:29:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:29:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6569 >/dev/null 2>/dev/null selfserv_9709 with PID 6569 found at Mon Apr 25 15:29:47 UTC 2016 selfserv_9709 with PID 6569 started at Mon Apr 25 15:29:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3126: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6569 >/dev/null 2>/dev/null selfserv_9709 with PID 6569 found at Mon Apr 25 15:29:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3127: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6569 >/dev/null 2>/dev/null selfserv_9709 with PID 6569 found at Mon Apr 25 15:29:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3128: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6569 >/dev/null 2>/dev/null selfserv_9709 with PID 6569 found at Mon Apr 25 15:29:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3129: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6569 >/dev/null 2>/dev/null selfserv_9709 with PID 6569 found at Mon Apr 25 15:29:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3130: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 6569 at Mon Apr 25 15:29:51 UTC 2016 kill -USR1 6569 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6569 killed at Mon Apr 25 15:29:51 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:29:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:29:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:51 UTC 2016 selfserv_9709 with PID 6718 started at Mon Apr 25 15:29:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3131: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3132: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3133: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3134: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3135: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3136: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3137: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3138: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3139: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3140: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3141: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:29:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3142: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:30:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3143: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:30:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3144: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6718 >/dev/null 2>/dev/null selfserv_9709 with PID 6718 found at Mon Apr 25 15:30:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3145: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 6718 at Mon Apr 25 15:30:03 UTC 2016 kill -USR1 6718 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6718 killed at Mon Apr 25 15:30:03 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:30:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7116 >/dev/null 2>/dev/null selfserv_9709 with PID 7116 found at Mon Apr 25 15:30:03 UTC 2016 selfserv_9709 with PID 7116 started at Mon Apr 25 15:30:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3146: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7116 >/dev/null 2>/dev/null selfserv_9709 with PID 7116 found at Mon Apr 25 15:30:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3147: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7116 >/dev/null 2>/dev/null selfserv_9709 with PID 7116 found at Mon Apr 25 15:30:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3148: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7116 >/dev/null 2>/dev/null selfserv_9709 with PID 7116 found at Mon Apr 25 15:30:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3149: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7116 >/dev/null 2>/dev/null selfserv_9709 with PID 7116 found at Mon Apr 25 15:30:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3150: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 7116 at Mon Apr 25 15:30:07 UTC 2016 kill -USR1 7116 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7116 killed at Mon Apr 25 15:30:08 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:30:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:08 UTC 2016 selfserv_9709 with PID 7264 started at Mon Apr 25 15:30:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3151: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3152: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3153: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3154: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3155: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3156: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3157: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3158: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3159: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3160: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3161: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3162: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 7264 >/dev/null 2>/dev/null selfserv_9709 with PID 7264 found at Mon Apr 25 15:30:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3163: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7264 at Mon Apr 25 15:30:17 UTC 2016 kill -USR1 7264 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7264 killed at Mon Apr 25 15:30:17 UTC 2016 ssl.sh: SSL Client Authentication - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:30:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7657 >/dev/null 2>/dev/null selfserv_9709 with PID 7657 found at Mon Apr 25 15:30:18 UTC 2016 selfserv_9709 with PID 7657 started at Mon Apr 25 15:30:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3164: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 7657 at Mon Apr 25 15:30:19 UTC 2016 kill -USR1 7657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7657 killed at Mon Apr 25 15:30:19 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:30:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7714 >/dev/null 2>/dev/null selfserv_9709 with PID 7714 found at Mon Apr 25 15:30:20 UTC 2016 selfserv_9709 with PID 7714 started at Mon Apr 25 15:30:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3165: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 7714 at Mon Apr 25 15:30:26 UTC 2016 kill -USR1 7714 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7714 killed at Mon Apr 25 15:30:26 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:30:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7771 >/dev/null 2>/dev/null selfserv_9709 with PID 7771 found at Mon Apr 25 15:30:26 UTC 2016 selfserv_9709 with PID 7771 started at Mon Apr 25 15:30:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3166: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7771 at Mon Apr 25 15:30:28 UTC 2016 kill -USR1 7771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7771 killed at Mon Apr 25 15:30:28 UTC 2016 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:30:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7834 >/dev/null 2>/dev/null selfserv_9709 with PID 7834 found at Mon Apr 25 15:30:29 UTC 2016 selfserv_9709 with PID 7834 started at Mon Apr 25 15:30:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3167: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 7834 at Mon Apr 25 15:30:29 UTC 2016 kill -USR1 7834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7834 killed at Mon Apr 25 15:30:30 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:30:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7891 >/dev/null 2>/dev/null selfserv_9709 with PID 7891 found at Mon Apr 25 15:30:30 UTC 2016 selfserv_9709 with PID 7891 started at Mon Apr 25 15:30:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. tstclnt: exiting with return code 254 ssl.sh: #3168: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 7891 at Mon Apr 25 15:30:32 UTC 2016 kill -USR1 7891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7891 killed at Mon Apr 25 15:30:32 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:30:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7949 >/dev/null 2>/dev/null selfserv_9709 with PID 7949 found at Mon Apr 25 15:30:33 UTC 2016 selfserv_9709 with PID 7949 started at Mon Apr 25 15:30:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3169: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7949 at Mon Apr 25 15:30:34 UTC 2016 kill -USR1 7949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7949 killed at Mon Apr 25 15:30:34 UTC 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:30:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8012 >/dev/null 2>/dev/null selfserv_9709 with PID 8012 found at Mon Apr 25 15:30:35 UTC 2016 selfserv_9709 with PID 8012 started at Mon Apr 25 15:30:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3170: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8012 at Mon Apr 25 15:30:36 UTC 2016 kill -USR1 8012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8012 killed at Mon Apr 25 15:30:36 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:30:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8069 >/dev/null 2>/dev/null selfserv_9709 with PID 8069 found at Mon Apr 25 15:30:37 UTC 2016 selfserv_9709 with PID 8069 started at Mon Apr 25 15:30:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3171: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8069 at Mon Apr 25 15:30:42 UTC 2016 kill -USR1 8069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8069 killed at Mon Apr 25 15:30:43 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:30:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8126 >/dev/null 2>/dev/null selfserv_9709 with PID 8126 found at Mon Apr 25 15:30:43 UTC 2016 selfserv_9709 with PID 8126 started at Mon Apr 25 15:30:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3172: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8126 at Mon Apr 25 15:30:45 UTC 2016 kill -USR1 8126 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8126 killed at Mon Apr 25 15:30:45 UTC 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:30:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8189 >/dev/null 2>/dev/null selfserv_9709 with PID 8189 found at Mon Apr 25 15:30:46 UTC 2016 selfserv_9709 with PID 8189 started at Mon Apr 25 15:30:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3173: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8189 at Mon Apr 25 15:30:47 UTC 2016 kill -USR1 8189 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8189 killed at Mon Apr 25 15:30:47 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:30:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8246 >/dev/null 2>/dev/null selfserv_9709 with PID 8246 found at Mon Apr 25 15:30:48 UTC 2016 selfserv_9709 with PID 8246 started at Mon Apr 25 15:30:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3174: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8246 at Mon Apr 25 15:30:53 UTC 2016 kill -USR1 8246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8246 killed at Mon Apr 25 15:30:54 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:30:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8304 >/dev/null 2>/dev/null selfserv_9709 with PID 8304 found at Mon Apr 25 15:30:54 UTC 2016 selfserv_9709 with PID 8304 started at Mon Apr 25 15:30:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3175: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8304 at Mon Apr 25 15:30:56 UTC 2016 kill -USR1 8304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8304 killed at Mon Apr 25 15:30:56 UTC 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:30:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8367 >/dev/null 2>/dev/null selfserv_9709 with PID 8367 found at Mon Apr 25 15:30:57 UTC 2016 selfserv_9709 with PID 8367 started at Mon Apr 25 15:30:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3176: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8367 at Mon Apr 25 15:30:58 UTC 2016 kill -USR1 8367 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8367 killed at Mon Apr 25 15:30:58 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:30:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:30:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8424 >/dev/null 2>/dev/null selfserv_9709 with PID 8424 found at Mon Apr 25 15:30:59 UTC 2016 selfserv_9709 with PID 8424 started at Mon Apr 25 15:30:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. tstclnt: exiting with return code 254 ssl.sh: #3177: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8424 at Mon Apr 25 15:31:00 UTC 2016 kill -USR1 8424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8424 killed at Mon Apr 25 15:31:01 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:31:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8481 >/dev/null 2>/dev/null selfserv_9709 with PID 8481 found at Mon Apr 25 15:31:01 UTC 2016 selfserv_9709 with PID 8481 started at Mon Apr 25 15:31:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3178: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8481 at Mon Apr 25 15:31:02 UTC 2016 kill -USR1 8481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8481 killed at Mon Apr 25 15:31:03 UTC 2016 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:31:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8572 >/dev/null 2>/dev/null selfserv_9709 with PID 8572 found at Mon Apr 25 15:31:03 UTC 2016 selfserv_9709 with PID 8572 started at Mon Apr 25 15:31:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3179: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8572 at Mon Apr 25 15:31:09 UTC 2016 kill -USR1 8572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8572 killed at Mon Apr 25 15:31:09 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:31:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8629 >/dev/null 2>/dev/null selfserv_9709 with PID 8629 found at Mon Apr 25 15:31:10 UTC 2016 selfserv_9709 with PID 8629 started at Mon Apr 25 15:31:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3180: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8629 at Mon Apr 25 15:31:11 UTC 2016 kill -USR1 8629 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8629 killed at Mon Apr 25 15:31:11 UTC 2016 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:31:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8693 >/dev/null 2>/dev/null selfserv_9709 with PID 8693 found at Mon Apr 25 15:31:12 UTC 2016 selfserv_9709 with PID 8693 started at Mon Apr 25 15:31:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. tstclnt: exiting with return code 254 ssl.sh: #3181: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8693 at Mon Apr 25 15:31:14 UTC 2016 kill -USR1 8693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8693 killed at Mon Apr 25 15:31:14 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:31:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8751 >/dev/null 2>/dev/null selfserv_9709 with PID 8751 found at Mon Apr 25 15:31:15 UTC 2016 selfserv_9709 with PID 8751 started at Mon Apr 25 15:31:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3182: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8751 at Mon Apr 25 15:31:16 UTC 2016 kill -USR1 8751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8751 killed at Mon Apr 25 15:31:16 UTC 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:31:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8812 >/dev/null 2>/dev/null selfserv_9709 with PID 8812 found at Mon Apr 25 15:31:17 UTC 2016 selfserv_9709 with PID 8812 started at Mon Apr 25 15:31:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3183: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8812 at Mon Apr 25 15:31:22 UTC 2016 kill -USR1 8812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8812 killed at Mon Apr 25 15:31:23 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:31:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8869 >/dev/null 2>/dev/null selfserv_9709 with PID 8869 found at Mon Apr 25 15:31:23 UTC 2016 selfserv_9709 with PID 8869 started at Mon Apr 25 15:31:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3184: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8869 at Mon Apr 25 15:31:25 UTC 2016 kill -USR1 8869 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8869 killed at Mon Apr 25 15:31:25 UTC 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:31:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8930 >/dev/null 2>/dev/null selfserv_9709 with PID 8930 found at Mon Apr 25 15:31:26 UTC 2016 selfserv_9709 with PID 8930 started at Mon Apr 25 15:31:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3185: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8930 at Mon Apr 25 15:31:31 UTC 2016 kill -USR1 8930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8930 killed at Mon Apr 25 15:31:32 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:31:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8987 >/dev/null 2>/dev/null selfserv_9709 with PID 8987 found at Mon Apr 25 15:31:32 UTC 2016 selfserv_9709 with PID 8987 started at Mon Apr 25 15:31:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3186: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8987 at Mon Apr 25 15:31:34 UTC 2016 kill -USR1 8987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8987 killed at Mon Apr 25 15:31:34 UTC 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:31:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9049 >/dev/null 2>/dev/null selfserv_9709 with PID 9049 found at Mon Apr 25 15:31:35 UTC 2016 selfserv_9709 with PID 9049 started at Mon Apr 25 15:31:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. tstclnt: exiting with return code 254 ssl.sh: #3187: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9049 at Mon Apr 25 15:31:36 UTC 2016 kill -USR1 9049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9049 killed at Mon Apr 25 15:31:37 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:31:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9106 >/dev/null 2>/dev/null selfserv_9709 with PID 9106 found at Mon Apr 25 15:31:37 UTC 2016 selfserv_9709 with PID 9106 started at Mon Apr 25 15:31:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3188: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9106 at Mon Apr 25 15:31:38 UTC 2016 kill -USR1 9106 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9106 killed at Mon Apr 25 15:31:39 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 15:31:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9184 >/dev/null 2>/dev/null selfserv_9709 with PID 9184 found at Mon Apr 25 15:31:39 UTC 2016 selfserv_9709 with PID 9184 started at Mon Apr 25 15:31:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3189: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9184 at Mon Apr 25 15:31:40 UTC 2016 kill -USR1 9184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9184 killed at Mon Apr 25 15:31:41 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 15:31:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9247 >/dev/null 2>/dev/null selfserv_9709 with PID 9247 found at Mon Apr 25 15:31:41 UTC 2016 selfserv_9709 with PID 9247 started at Mon Apr 25 15:31:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3190: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9247 at Mon Apr 25 15:31:42 UTC 2016 kill -USR1 9247 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9247 killed at Mon Apr 25 15:31:42 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 15:31:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9310 >/dev/null 2>/dev/null selfserv_9709 with PID 9310 found at Mon Apr 25 15:31:43 UTC 2016 selfserv_9709 with PID 9310 started at Mon Apr 25 15:31:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #3191: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9310 at Mon Apr 25 15:31:43 UTC 2016 kill -USR1 9310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9310 killed at Mon Apr 25 15:31:44 UTC 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 15:31:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9373 >/dev/null 2>/dev/null selfserv_9709 with PID 9373 found at Mon Apr 25 15:31:44 UTC 2016 selfserv_9709 with PID 9373 started at Mon Apr 25 15:31:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3192: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9373 at Mon Apr 25 15:31:45 UTC 2016 kill -USR1 9373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9373 killed at Mon Apr 25 15:31:46 UTC 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9709 starting at Mon Apr 25 15:31:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9436 >/dev/null 2>/dev/null selfserv_9709 with PID 9436 found at Mon Apr 25 15:31:46 UTC 2016 selfserv_9709 with PID 9436 started at Mon Apr 25 15:31:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #3193: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9436 at Mon Apr 25 15:31:47 UTC 2016 kill -USR1 9436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9436 killed at Mon Apr 25 15:31:47 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 15:31:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9499 >/dev/null 2>/dev/null selfserv_9709 with PID 9499 found at Mon Apr 25 15:31:48 UTC 2016 selfserv_9709 with PID 9499 started at Mon Apr 25 15:31:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3194: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9499 at Mon Apr 25 15:31:48 UTC 2016 kill -USR1 9499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9499 killed at Mon Apr 25 15:31:49 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 15:31:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9562 >/dev/null 2>/dev/null selfserv_9709 with PID 9562 found at Mon Apr 25 15:31:49 UTC 2016 selfserv_9709 with PID 9562 started at Mon Apr 25 15:31:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3195: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9562 at Mon Apr 25 15:31:50 UTC 2016 kill -USR1 9562 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9562 killed at Mon Apr 25 15:31:51 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9709 starting at Mon Apr 25 15:31:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9625 >/dev/null 2>/dev/null selfserv_9709 with PID 9625 found at Mon Apr 25 15:31:51 UTC 2016 selfserv_9709 with PID 9625 started at Mon Apr 25 15:31:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #3196: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9625 at Mon Apr 25 15:31:52 UTC 2016 kill -USR1 9625 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9625 killed at Mon Apr 25 15:31:52 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9709 starting at Mon Apr 25 15:31:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9688 >/dev/null 2>/dev/null selfserv_9709 with PID 9688 found at Mon Apr 25 15:31:53 UTC 2016 selfserv_9709 with PID 9688 started at Mon Apr 25 15:31:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #3197: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9688 at Mon Apr 25 15:31:54 UTC 2016 kill -USR1 9688 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9688 killed at Mon Apr 25 15:31:54 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 15:31:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9752 >/dev/null 2>/dev/null selfserv_9709 with PID 9752 found at Mon Apr 25 15:31:55 UTC 2016 selfserv_9709 with PID 9752 started at Mon Apr 25 15:31:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #3198: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9752 at Mon Apr 25 15:31:55 UTC 2016 kill -USR1 9752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9752 killed at Mon Apr 25 15:31:56 UTC 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, revoked status (non-FIPS only) ssl.sh: skipping OCSP stapling, signed response, unknown status (non-FIPS only) ssl.sh: skipping OCSP stapling, unsigned failure response (non-FIPS only) ssl.sh: skipping OCSP stapling, good status, bad signature (non-FIPS only) ssl.sh: skipping OCSP stapling, invalid cert status data (non-FIPS only) ssl.sh: skipping Valid cert, Server doesn't staple (non-FIPS only) ssl.sh: skipping Stress OCSP stapling, server uses random status (non-FIPS only) ssl.sh: SSL Stress Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:31:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:31:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9906 >/dev/null 2>/dev/null selfserv_9709 with PID 9906 found at Mon Apr 25 15:31:56 UTC 2016 selfserv_9709 with PID 9906 started at Mon Apr 25 15:31:56 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 15:31:56 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:32:01 UTC 2016 ssl.sh: #3199: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9906 at Mon Apr 25 15:32:01 UTC 2016 kill -USR1 9906 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9906 killed at Mon Apr 25 15:32:01 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9998 >/dev/null 2>/dev/null selfserv_9709 with PID 9998 found at Mon Apr 25 15:32:02 UTC 2016 selfserv_9709 with PID 9998 started at Mon Apr 25 15:32:02 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -c 100 -C c -V ssl3: -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:02 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:32:06 UTC 2016 ssl.sh: #3200: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9998 at Mon Apr 25 15:32:06 UTC 2016 kill -USR1 9998 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9998 killed at Mon Apr 25 15:32:06 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10073 >/dev/null 2>/dev/null selfserv_9709 with PID 10073 found at Mon Apr 25 15:32:07 UTC 2016 selfserv_9709 with PID 10073 started at Mon Apr 25 15:32:07 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:07 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:32:07 UTC 2016 ssl.sh: #3201: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10073 at Mon Apr 25 15:32:07 UTC 2016 kill -USR1 10073 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10073 killed at Mon Apr 25 15:32:08 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10149 >/dev/null 2>/dev/null selfserv_9709 with PID 10149 found at Mon Apr 25 15:32:08 UTC 2016 selfserv_9709 with PID 10149 started at Mon Apr 25 15:32:08 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:32:09 UTC 2016 ssl.sh: #3202: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10149 at Mon Apr 25 15:32:09 UTC 2016 kill -USR1 10149 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10149 killed at Mon Apr 25 15:32:10 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 15:32:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10225 >/dev/null 2>/dev/null selfserv_9709 with PID 10225 found at Mon Apr 25 15:32:10 UTC 2016 selfserv_9709 with PID 10225 started at Mon Apr 25 15:32:10 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:32:11 UTC 2016 ssl.sh: #3203: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10225 at Mon Apr 25 15:32:11 UTC 2016 kill -USR1 10225 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10225 killed at Mon Apr 25 15:32:12 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10304 >/dev/null 2>/dev/null selfserv_9709 with PID 10304 found at Mon Apr 25 15:32:12 UTC 2016 selfserv_9709 with PID 10304 started at Mon Apr 25 15:32:12 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:32:13 UTC 2016 ssl.sh: #3204: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10304 at Mon Apr 25 15:32:13 UTC 2016 kill -USR1 10304 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10304 killed at Mon Apr 25 15:32:13 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 15:32:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10380 >/dev/null 2>/dev/null selfserv_9709 with PID 10380 found at Mon Apr 25 15:32:14 UTC 2016 selfserv_9709 with PID 10380 started at Mon Apr 25 15:32:14 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:32:15 UTC 2016 ssl.sh: #3205: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10380 at Mon Apr 25 15:32:15 UTC 2016 kill -USR1 10380 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10380 killed at Mon Apr 25 15:32:15 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9709 starting at Mon Apr 25 15:32:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10463 >/dev/null 2>/dev/null selfserv_9709 with PID 10463 found at Mon Apr 25 15:32:16 UTC 2016 selfserv_9709 with PID 10463 started at Mon Apr 25 15:32:16 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:32:18 UTC 2016 ssl.sh: #3206: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10463 at Mon Apr 25 15:32:18 UTC 2016 kill -USR1 10463 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10463 killed at Mon Apr 25 15:32:18 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9709 starting at Mon Apr 25 15:32:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10545 >/dev/null 2>/dev/null selfserv_9709 with PID 10545 found at Mon Apr 25 15:32:19 UTC 2016 selfserv_9709 with PID 10545 started at Mon Apr 25 15:32:19 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 15:32:21 UTC 2016 ssl.sh: #3207: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10545 at Mon Apr 25 15:32:21 UTC 2016 kill -USR1 10545 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10545 killed at Mon Apr 25 15:32:21 UTC 2016 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10685 >/dev/null 2>/dev/null selfserv_9709 with PID 10685 found at Mon Apr 25 15:32:22 UTC 2016 selfserv_9709 with PID 10685 started at Mon Apr 25 15:32:22 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:32:24 UTC 2016 ssl.sh: #3208: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10685 at Mon Apr 25 15:32:24 UTC 2016 kill -USR1 10685 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10685 killed at Mon Apr 25 15:32:24 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10760 >/dev/null 2>/dev/null selfserv_9709 with PID 10760 found at Mon Apr 25 15:32:25 UTC 2016 selfserv_9709 with PID 10760 started at Mon Apr 25 15:32:25 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:32:26 UTC 2016 ssl.sh: #3209: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10760 at Mon Apr 25 15:32:26 UTC 2016 kill -USR1 10760 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10760 killed at Mon Apr 25 15:32:26 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10836 >/dev/null 2>/dev/null selfserv_9709 with PID 10836 found at Mon Apr 25 15:32:27 UTC 2016 selfserv_9709 with PID 10836 started at Mon Apr 25 15:32:27 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:32:29 UTC 2016 ssl.sh: #3210: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10836 at Mon Apr 25 15:32:29 UTC 2016 kill -USR1 10836 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10836 killed at Mon Apr 25 15:32:30 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10911 >/dev/null 2>/dev/null selfserv_9709 with PID 10911 found at Mon Apr 25 15:32:30 UTC 2016 selfserv_9709 with PID 10911 started at Mon Apr 25 15:32:30 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:30 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:32:32 UTC 2016 ssl.sh: #3211: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10911 at Mon Apr 25 15:32:32 UTC 2016 kill -USR1 10911 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10911 killed at Mon Apr 25 15:32:32 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10986 >/dev/null 2>/dev/null selfserv_9709 with PID 10986 found at Mon Apr 25 15:32:33 UTC 2016 selfserv_9709 with PID 10986 started at Mon Apr 25 15:32:33 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:33 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:32:34 UTC 2016 ssl.sh: #3212: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10986 at Mon Apr 25 15:32:34 UTC 2016 kill -USR1 10986 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10986 killed at Mon Apr 25 15:32:34 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11063 >/dev/null 2>/dev/null selfserv_9709 with PID 11063 found at Mon Apr 25 15:32:35 UTC 2016 selfserv_9709 with PID 11063 started at Mon Apr 25 15:32:35 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:32:36 UTC 2016 ssl.sh: #3213: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11063 at Mon Apr 25 15:32:36 UTC 2016 kill -USR1 11063 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11063 killed at Mon Apr 25 15:32:36 UTC 2016 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11211 >/dev/null 2>/dev/null selfserv_9709 with PID 11211 found at Mon Apr 25 15:32:37 UTC 2016 selfserv_9709 with PID 11211 started at Mon Apr 25 15:32:37 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:32:47 UTC 2016 ssl.sh: #3214: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11211 at Mon Apr 25 15:32:47 UTC 2016 kill -USR1 11211 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11211 killed at Mon Apr 25 15:32:48 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11286 >/dev/null 2>/dev/null selfserv_9709 with PID 11286 found at Mon Apr 25 15:32:48 UTC 2016 selfserv_9709 with PID 11286 started at Mon Apr 25 15:32:48 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:48 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:32:50 UTC 2016 ssl.sh: #3215: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11286 at Mon Apr 25 15:32:50 UTC 2016 kill -USR1 11286 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11286 killed at Mon Apr 25 15:32:51 UTC 2016 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:32:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:32:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11373 >/dev/null 2>/dev/null selfserv_9709 with PID 11373 found at Mon Apr 25 15:32:51 UTC 2016 selfserv_9709 with PID 11373 started at Mon Apr 25 15:32:51 UTC 2016 strsclnt -q -p 9709 -d ../client -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:32:51 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:34:27 UTC 2016 ssl.sh: #3216: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11373 at Mon Apr 25 15:34:27 UTC 2016 kill -USR1 11373 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11373 killed at Mon Apr 25 15:34:28 UTC 2016 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips - with ECC =============================== selfserv_9709 starting at Mon Apr 25 15:34:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:34:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:28 UTC 2016 selfserv_9709 with PID 11474 started at Mon Apr 25 15:34:28 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3217: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3218: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3219: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3220: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3221: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3222: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3223: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3224: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3225: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3226: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3227: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3228: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3229: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3230: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3231: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3232: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3233: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3234: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3235: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3236: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3237: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3238: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3239: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3240: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3241: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3242: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3243: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3244: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3245: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3246: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3247: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3248: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3249: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3250: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3251: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3252: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3253: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3254: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3255: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3256: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3257: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3258: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3259: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3260: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3261: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3262: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:34:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3263: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3264: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3265: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3266: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3267: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3268: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3269: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3270: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3271: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3272: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3273: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3274: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3275: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3276: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3277: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3278: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3279: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3280: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3281: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3282: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3283: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 11474 >/dev/null 2>/dev/null selfserv_9709 with PID 11474 found at Mon Apr 25 15:35:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3284: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 11474 at Mon Apr 25 15:35:16 UTC 2016 kill -USR1 11474 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11474 killed at Mon Apr 25 15:35:16 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:35:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:35:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13391 >/dev/null 2>/dev/null selfserv_9709 with PID 13391 found at Mon Apr 25 15:35:17 UTC 2016 selfserv_9709 with PID 13391 started at Mon Apr 25 15:35:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3285: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13391 >/dev/null 2>/dev/null selfserv_9709 with PID 13391 found at Mon Apr 25 15:35:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3286: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13391 >/dev/null 2>/dev/null selfserv_9709 with PID 13391 found at Mon Apr 25 15:35:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3287: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13391 >/dev/null 2>/dev/null selfserv_9709 with PID 13391 found at Mon Apr 25 15:35:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3288: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13391 >/dev/null 2>/dev/null selfserv_9709 with PID 13391 found at Mon Apr 25 15:35:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3289: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 13391 at Mon Apr 25 15:35:20 UTC 2016 kill -USR1 13391 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13391 killed at Mon Apr 25 15:35:20 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:35:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:35:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:21 UTC 2016 selfserv_9709 with PID 13540 started at Mon Apr 25 15:35:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3290: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3291: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3292: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3293: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3294: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3295: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3296: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3297: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3298: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3299: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3300: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3301: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3302: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3303: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13540 >/dev/null 2>/dev/null selfserv_9709 with PID 13540 found at Mon Apr 25 15:35:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3304: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 13540 at Mon Apr 25 15:35:32 UTC 2016 kill -USR1 13540 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13540 killed at Mon Apr 25 15:35:33 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:35:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:35:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13925 >/dev/null 2>/dev/null selfserv_9709 with PID 13925 found at Mon Apr 25 15:35:33 UTC 2016 selfserv_9709 with PID 13925 started at Mon Apr 25 15:35:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3305: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13925 >/dev/null 2>/dev/null selfserv_9709 with PID 13925 found at Mon Apr 25 15:35:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3306: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13925 >/dev/null 2>/dev/null selfserv_9709 with PID 13925 found at Mon Apr 25 15:35:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3307: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13925 >/dev/null 2>/dev/null selfserv_9709 with PID 13925 found at Mon Apr 25 15:35:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3308: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13925 >/dev/null 2>/dev/null selfserv_9709 with PID 13925 found at Mon Apr 25 15:35:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3309: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 13925 at Mon Apr 25 15:35:36 UTC 2016 kill -USR1 13925 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13925 killed at Mon Apr 25 15:35:37 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:35:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:35:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:37 UTC 2016 selfserv_9709 with PID 14073 started at Mon Apr 25 15:35:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3310: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3311: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3312: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3313: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3314: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3315: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3316: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3317: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3318: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3319: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3320: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3321: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3322: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3323: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14073 >/dev/null 2>/dev/null selfserv_9709 with PID 14073 found at Mon Apr 25 15:35:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3324: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 14073 at Mon Apr 25 15:35:48 UTC 2016 kill -USR1 14073 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14073 killed at Mon Apr 25 15:35:49 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:35:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:35:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14459 >/dev/null 2>/dev/null selfserv_9709 with PID 14459 found at Mon Apr 25 15:35:49 UTC 2016 selfserv_9709 with PID 14459 started at Mon Apr 25 15:35:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3325: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14459 >/dev/null 2>/dev/null selfserv_9709 with PID 14459 found at Mon Apr 25 15:35:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3326: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14459 >/dev/null 2>/dev/null selfserv_9709 with PID 14459 found at Mon Apr 25 15:35:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3327: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14459 >/dev/null 2>/dev/null selfserv_9709 with PID 14459 found at Mon Apr 25 15:35:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3328: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14459 >/dev/null 2>/dev/null selfserv_9709 with PID 14459 found at Mon Apr 25 15:35:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3329: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 14459 at Mon Apr 25 15:35:52 UTC 2016 kill -USR1 14459 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14459 killed at Mon Apr 25 15:35:53 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 15:35:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:35:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:35:53 UTC 2016 selfserv_9709 with PID 14607 started at Mon Apr 25 15:35:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3330: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:35:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3331: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:35:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3332: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:35:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3333: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:35:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3334: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:35:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3335: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:35:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3336: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:35:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3337: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:35:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3338: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:36:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3339: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:36:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3340: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:36:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3341: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 14607 >/dev/null 2>/dev/null selfserv_9709 with PID 14607 found at Mon Apr 25 15:36:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3342: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14607 at Mon Apr 25 15:36:03 UTC 2016 kill -USR1 14607 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14607 killed at Mon Apr 25 15:36:03 UTC 2016 ssl.sh: SSL Client Authentication Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15010 >/dev/null 2>/dev/null selfserv_9709 with PID 15010 found at Mon Apr 25 15:36:04 UTC 2016 selfserv_9709 with PID 15010 started at Mon Apr 25 15:36:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3343: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15010 at Mon Apr 25 15:36:05 UTC 2016 kill -USR1 15010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15010 killed at Mon Apr 25 15:36:05 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:36:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15067 >/dev/null 2>/dev/null selfserv_9709 with PID 15067 found at Mon Apr 25 15:36:06 UTC 2016 selfserv_9709 with PID 15067 started at Mon Apr 25 15:36:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3344: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15067 at Mon Apr 25 15:36:11 UTC 2016 kill -USR1 15067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15067 killed at Mon Apr 25 15:36:11 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15124 >/dev/null 2>/dev/null selfserv_9709 with PID 15124 found at Mon Apr 25 15:36:12 UTC 2016 selfserv_9709 with PID 15124 started at Mon Apr 25 15:36:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3345: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15124 at Mon Apr 25 15:36:13 UTC 2016 kill -USR1 15124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15124 killed at Mon Apr 25 15:36:13 UTC 2016 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15190 >/dev/null 2>/dev/null selfserv_9709 with PID 15190 found at Mon Apr 25 15:36:14 UTC 2016 selfserv_9709 with PID 15190 started at Mon Apr 25 15:36:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3346: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15190 at Mon Apr 25 15:36:15 UTC 2016 kill -USR1 15190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15190 killed at Mon Apr 25 15:36:15 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:36:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15247 >/dev/null 2>/dev/null selfserv_9709 with PID 15247 found at Mon Apr 25 15:36:16 UTC 2016 selfserv_9709 with PID 15247 started at Mon Apr 25 15:36:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. tstclnt: exiting with return code 254 ssl.sh: #3347: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15247 at Mon Apr 25 15:36:18 UTC 2016 kill -USR1 15247 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15247 killed at Mon Apr 25 15:36:18 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15304 >/dev/null 2>/dev/null selfserv_9709 with PID 15304 found at Mon Apr 25 15:36:18 UTC 2016 selfserv_9709 with PID 15304 started at Mon Apr 25 15:36:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3348: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15304 at Mon Apr 25 15:36:19 UTC 2016 kill -USR1 15304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15304 killed at Mon Apr 25 15:36:20 UTC 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15367 >/dev/null 2>/dev/null selfserv_9709 with PID 15367 found at Mon Apr 25 15:36:20 UTC 2016 selfserv_9709 with PID 15367 started at Mon Apr 25 15:36:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3349: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15367 at Mon Apr 25 15:36:21 UTC 2016 kill -USR1 15367 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15367 killed at Mon Apr 25 15:36:22 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:36:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15425 >/dev/null 2>/dev/null selfserv_9709 with PID 15425 found at Mon Apr 25 15:36:22 UTC 2016 selfserv_9709 with PID 15425 started at Mon Apr 25 15:36:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3350: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15425 at Mon Apr 25 15:36:28 UTC 2016 kill -USR1 15425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15425 killed at Mon Apr 25 15:36:28 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15482 >/dev/null 2>/dev/null selfserv_9709 with PID 15482 found at Mon Apr 25 15:36:29 UTC 2016 selfserv_9709 with PID 15482 started at Mon Apr 25 15:36:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3351: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15482 at Mon Apr 25 15:36:30 UTC 2016 kill -USR1 15482 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15482 killed at Mon Apr 25 15:36:30 UTC 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15545 >/dev/null 2>/dev/null selfserv_9709 with PID 15545 found at Mon Apr 25 15:36:31 UTC 2016 selfserv_9709 with PID 15545 started at Mon Apr 25 15:36:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3352: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15545 at Mon Apr 25 15:36:32 UTC 2016 kill -USR1 15545 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15545 killed at Mon Apr 25 15:36:33 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:36:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15604 >/dev/null 2>/dev/null selfserv_9709 with PID 15604 found at Mon Apr 25 15:36:33 UTC 2016 selfserv_9709 with PID 15604 started at Mon Apr 25 15:36:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3353: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15604 at Mon Apr 25 15:36:39 UTC 2016 kill -USR1 15604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15604 killed at Mon Apr 25 15:36:39 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15661 >/dev/null 2>/dev/null selfserv_9709 with PID 15661 found at Mon Apr 25 15:36:40 UTC 2016 selfserv_9709 with PID 15661 started at Mon Apr 25 15:36:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3354: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15661 at Mon Apr 25 15:36:41 UTC 2016 kill -USR1 15661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15661 killed at Mon Apr 25 15:36:41 UTC 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15725 >/dev/null 2>/dev/null selfserv_9709 with PID 15725 found at Mon Apr 25 15:36:42 UTC 2016 selfserv_9709 with PID 15725 started at Mon Apr 25 15:36:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3355: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15725 at Mon Apr 25 15:36:43 UTC 2016 kill -USR1 15725 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15725 killed at Mon Apr 25 15:36:43 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:36:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15782 >/dev/null 2>/dev/null selfserv_9709 with PID 15782 found at Mon Apr 25 15:36:44 UTC 2016 selfserv_9709 with PID 15782 started at Mon Apr 25 15:36:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. tstclnt: exiting with return code 254 ssl.sh: #3356: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15782 at Mon Apr 25 15:36:45 UTC 2016 kill -USR1 15782 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15782 killed at Mon Apr 25 15:36:46 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15839 >/dev/null 2>/dev/null selfserv_9709 with PID 15839 found at Mon Apr 25 15:36:46 UTC 2016 selfserv_9709 with PID 15839 started at Mon Apr 25 15:36:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3357: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15839 at Mon Apr 25 15:36:47 UTC 2016 kill -USR1 15839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15839 killed at Mon Apr 25 15:36:48 UTC 2016 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:36:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15915 >/dev/null 2>/dev/null selfserv_9709 with PID 15915 found at Mon Apr 25 15:36:48 UTC 2016 selfserv_9709 with PID 15915 started at Mon Apr 25 15:36:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3358: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15915 at Mon Apr 25 15:36:54 UTC 2016 kill -USR1 15915 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15915 killed at Mon Apr 25 15:36:54 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15972 >/dev/null 2>/dev/null selfserv_9709 with PID 15972 found at Mon Apr 25 15:36:55 UTC 2016 selfserv_9709 with PID 15972 started at Mon Apr 25 15:36:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3359: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15972 at Mon Apr 25 15:36:56 UTC 2016 kill -USR1 15972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15972 killed at Mon Apr 25 15:36:56 UTC 2016 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:36:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16033 >/dev/null 2>/dev/null selfserv_9709 with PID 16033 found at Mon Apr 25 15:36:57 UTC 2016 selfserv_9709 with PID 16033 started at Mon Apr 25 15:36:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. tstclnt: exiting with return code 254 ssl.sh: #3360: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 16033 at Mon Apr 25 15:36:59 UTC 2016 kill -USR1 16033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16033 killed at Mon Apr 25 15:36:59 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:36:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:36:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16090 >/dev/null 2>/dev/null selfserv_9709 with PID 16090 found at Mon Apr 25 15:36:59 UTC 2016 selfserv_9709 with PID 16090 started at Mon Apr 25 15:36:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3361: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 16090 at Mon Apr 25 15:37:00 UTC 2016 kill -USR1 16090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16090 killed at Mon Apr 25 15:37:01 UTC 2016 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:37:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16152 >/dev/null 2>/dev/null selfserv_9709 with PID 16152 found at Mon Apr 25 15:37:01 UTC 2016 selfserv_9709 with PID 16152 started at Mon Apr 25 15:37:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3362: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 16152 at Mon Apr 25 15:37:07 UTC 2016 kill -USR1 16152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16152 killed at Mon Apr 25 15:37:07 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16223 >/dev/null 2>/dev/null selfserv_9709 with PID 16223 found at Mon Apr 25 15:37:08 UTC 2016 selfserv_9709 with PID 16223 started at Mon Apr 25 15:37:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3363: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 16223 at Mon Apr 25 15:37:09 UTC 2016 kill -USR1 16223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16223 killed at Mon Apr 25 15:37:10 UTC 2016 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:37:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16284 >/dev/null 2>/dev/null selfserv_9709 with PID 16284 found at Mon Apr 25 15:37:10 UTC 2016 selfserv_9709 with PID 16284 started at Mon Apr 25 15:37:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #3364: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 16284 at Mon Apr 25 15:37:16 UTC 2016 kill -USR1 16284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16284 killed at Mon Apr 25 15:37:16 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16344 >/dev/null 2>/dev/null selfserv_9709 with PID 16344 found at Mon Apr 25 15:37:17 UTC 2016 selfserv_9709 with PID 16344 started at Mon Apr 25 15:37:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3365: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 16344 at Mon Apr 25 15:37:18 UTC 2016 kill -USR1 16344 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16344 killed at Mon Apr 25 15:37:19 UTC 2016 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 15:37:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16405 >/dev/null 2>/dev/null selfserv_9709 with PID 16405 found at Mon Apr 25 15:37:19 UTC 2016 selfserv_9709 with PID 16405 started at Mon Apr 25 15:37:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. tstclnt: exiting with return code 254 ssl.sh: #3366: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 16405 at Mon Apr 25 15:37:21 UTC 2016 kill -USR1 16405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16405 killed at Mon Apr 25 15:37:21 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16462 >/dev/null 2>/dev/null selfserv_9709 with PID 16462 found at Mon Apr 25 15:37:22 UTC 2016 selfserv_9709 with PID 16462 started at Mon Apr 25 15:37:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3367: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 16462 at Mon Apr 25 15:37:23 UTC 2016 kill -USR1 16462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16462 killed at Mon Apr 25 15:37:23 UTC 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client fips - with ECC =============================== ssl.sh: skipping Form is subject to the terms of the Mozilla Public (non-FIPS only) ssl.sh: skipping If a copy of the MPL was not distributed with this (non-FIPS only) ssl.sh: skipping obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16652 >/dev/null 2>/dev/null selfserv_9709 with PID 16652 found at Mon Apr 25 15:37:24 UTC 2016 selfserv_9709 with PID 16652 started at Mon Apr 25 15:37:24 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:24 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:37:29 UTC 2016 ssl.sh: #3368: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16652 at Mon Apr 25 15:37:29 UTC 2016 kill -USR1 16652 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16652 killed at Mon Apr 25 15:37:29 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16727 >/dev/null 2>/dev/null selfserv_9709 with PID 16727 found at Mon Apr 25 15:37:30 UTC 2016 selfserv_9709 with PID 16727 started at Mon Apr 25 15:37:30 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -c 100 -C c -V ssl3: -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:30 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:37:34 UTC 2016 ssl.sh: #3369: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16727 at Mon Apr 25 15:37:34 UTC 2016 kill -USR1 16727 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16727 killed at Mon Apr 25 15:37:35 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16802 >/dev/null 2>/dev/null selfserv_9709 with PID 16802 found at Mon Apr 25 15:37:35 UTC 2016 selfserv_9709 with PID 16802 started at Mon Apr 25 15:37:35 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:37:36 UTC 2016 ssl.sh: #3370: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16802 at Mon Apr 25 15:37:36 UTC 2016 kill -USR1 16802 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16802 killed at Mon Apr 25 15:37:37 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16878 >/dev/null 2>/dev/null selfserv_9709 with PID 16878 found at Mon Apr 25 15:37:37 UTC 2016 selfserv_9709 with PID 16878 started at Mon Apr 25 15:37:37 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:37:38 UTC 2016 ssl.sh: #3371: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16878 at Mon Apr 25 15:37:38 UTC 2016 kill -USR1 16878 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16878 killed at Mon Apr 25 15:37:38 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 15:37:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16954 >/dev/null 2>/dev/null selfserv_9709 with PID 16954 found at Mon Apr 25 15:37:39 UTC 2016 selfserv_9709 with PID 16954 started at Mon Apr 25 15:37:39 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:37:40 UTC 2016 ssl.sh: #3372: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16954 at Mon Apr 25 15:37:40 UTC 2016 kill -USR1 16954 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16954 killed at Mon Apr 25 15:37:40 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17030 >/dev/null 2>/dev/null selfserv_9709 with PID 17030 found at Mon Apr 25 15:37:41 UTC 2016 selfserv_9709 with PID 17030 started at Mon Apr 25 15:37:41 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:41 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:37:42 UTC 2016 ssl.sh: #3373: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17030 at Mon Apr 25 15:37:42 UTC 2016 kill -USR1 17030 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17030 killed at Mon Apr 25 15:37:42 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 15:37:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17107 >/dev/null 2>/dev/null selfserv_9709 with PID 17107 found at Mon Apr 25 15:37:43 UTC 2016 selfserv_9709 with PID 17107 started at Mon Apr 25 15:37:43 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:43 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:37:44 UTC 2016 ssl.sh: #3374: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17107 at Mon Apr 25 15:37:44 UTC 2016 kill -USR1 17107 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17107 killed at Mon Apr 25 15:37:44 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA256 (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 GCM (non-FIPS only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17255 >/dev/null 2>/dev/null selfserv_9709 with PID 17255 found at Mon Apr 25 15:37:45 UTC 2016 selfserv_9709 with PID 17255 started at Mon Apr 25 15:37:45 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:37:48 UTC 2016 ssl.sh: #3375: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17255 at Mon Apr 25 15:37:48 UTC 2016 kill -USR1 17255 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17255 killed at Mon Apr 25 15:37:48 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17330 >/dev/null 2>/dev/null selfserv_9709 with PID 17330 found at Mon Apr 25 15:37:49 UTC 2016 selfserv_9709 with PID 17330 started at Mon Apr 25 15:37:49 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:37:50 UTC 2016 ssl.sh: #3376: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17330 at Mon Apr 25 15:37:50 UTC 2016 kill -USR1 17330 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17330 killed at Mon Apr 25 15:37:50 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17406 >/dev/null 2>/dev/null selfserv_9709 with PID 17406 found at Mon Apr 25 15:37:51 UTC 2016 selfserv_9709 with PID 17406 started at Mon Apr 25 15:37:51 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:51 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:37:53 UTC 2016 ssl.sh: #3377: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17406 at Mon Apr 25 15:37:53 UTC 2016 kill -USR1 17406 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17406 killed at Mon Apr 25 15:37:54 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17481 >/dev/null 2>/dev/null selfserv_9709 with PID 17481 found at Mon Apr 25 15:37:54 UTC 2016 selfserv_9709 with PID 17481 started at Mon Apr 25 15:37:54 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 15:37:55 UTC 2016 ssl.sh: #3378: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17481 at Mon Apr 25 15:37:55 UTC 2016 kill -USR1 17481 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17481 killed at Mon Apr 25 15:37:56 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17556 >/dev/null 2>/dev/null selfserv_9709 with PID 17556 found at Mon Apr 25 15:37:56 UTC 2016 selfserv_9709 with PID 17556 started at Mon Apr 25 15:37:56 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:56 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:37:57 UTC 2016 ssl.sh: #3379: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17556 at Mon Apr 25 15:37:57 UTC 2016 kill -USR1 17556 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17556 killed at Mon Apr 25 15:37:58 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:37:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:37:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17632 >/dev/null 2>/dev/null selfserv_9709 with PID 17632 found at Mon Apr 25 15:37:58 UTC 2016 selfserv_9709 with PID 17632 started at Mon Apr 25 15:37:58 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 15:37:58 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 15:37:59 UTC 2016 ssl.sh: #3380: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17632 at Mon Apr 25 15:37:59 UTC 2016 kill -USR1 17632 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17632 killed at Mon Apr 25 15:38:00 UTC 2016 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:0038_-u Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (session ticket) (non-FIPS only) ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) (non-FIPS only) ssl.sh: skipping -V_ssl3:_-c_1000_-C_:006A Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (non-FIPS only) ssl.sh: skipping reuse test, once the session cache with DHE_DSS is working (non-FIPS only) ssl.sh: skipping Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:38:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:38:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17780 >/dev/null 2>/dev/null selfserv_9709 with PID 17780 found at Mon Apr 25 15:38:01 UTC 2016 selfserv_9709 with PID 17780 started at Mon Apr 25 15:38:01 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:38:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 15:38:16 UTC 2016 ssl.sh: #3381: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17780 at Mon Apr 25 15:38:16 UTC 2016 kill -USR1 17780 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17780 killed at Mon Apr 25 15:38:16 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 15:38:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:38:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17872 >/dev/null 2>/dev/null selfserv_9709 with PID 17872 found at Mon Apr 25 15:38:17 UTC 2016 selfserv_9709 with PID 17872 started at Mon Apr 25 15:38:17 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 15:38:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 15:38:19 UTC 2016 ssl.sh: #3382: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17872 at Mon Apr 25 15:38:19 UTC 2016 kill -USR1 17872 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17872 killed at Mon Apr 25 15:38:19 UTC 2016 ssl.sh: skipping session ticket test, once session tickets with DHE_DSS are working (non-FIPS only) ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 15:38:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 15:38:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17959 >/dev/null 2>/dev/null selfserv_9709 with PID 17959 found at Mon Apr 25 15:38:20 UTC 2016 selfserv_9709 with PID 17959 started at Mon Apr 25 15:38:20 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 15:38:20 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 15:40:46 UTC 2016 ssl.sh: #3383: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17959 at Mon Apr 25 15:40:46 UTC 2016 kill -USR1 17959 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17959 killed at Mon Apr 25 15:40:46 UTC 2016 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #3384: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/client -list ssl.sh: #3385: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #3386: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #3387: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/ext_client -list ssl.sh: #3388: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #3389: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Mon Apr 25 15:40:49 UTC 2016 Checking if ocsp should be skipped based on skip list [] Running tests for ocsp TIMESTAMP ocsp BEGIN: Mon Apr 25 15:40:49 UTC 2016 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Mon Apr 25 15:40:49 UTC 2016 Checking if merge should be skipped based on skip list [] Running tests for merge TIMESTAMP merge BEGIN: Mon Apr 25 15:40:49 UTC 2016 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.v3.28098 -t Test2 -f ../tests.pw merge.sh: #3390: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3391: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3392: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3393: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3394: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3395: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:55:47 2016 Not After : Sun Apr 25 13:55:47 2021 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:eb:05:32:47:b9:4c:9d:05:60:6a:ba:b1:7c:27:06: 8f:37:bd:8b:cf:1d:b8:ad:8f:f3:47:90:53:39:ef:61: 23:a0:2b:b0:ba:a5:cd:72:f4:33:db:16:07:0b:b4:70: 3c:ec:d8:ce:21:a5:31:d3:35:80:95:fa:6d:96:26:5e: 49:92:a1:68:9f:9e:fb:71:8c:cd:4d:4e:92:14:9b:0f: 3e:ce:bc:ad:0a:06:ee:93:97:aa:8f:c2:2f:3a:1f:24: 12:2d:7a:6a:5f:1b:69:ed:32:66:8d:9d:e0:ac:ee:f9: ea:f4:27:a4:f7:67:f4:9c:a3:cb:c4:38:9b:50:29:74: 08:cb:2b:83:55:c3:f9:91:ef:7f:c8:0d:c4:41:df:86: 99:e8:1d:74:de:99:3f:41:ed:1d:7c:81:13:6c:e9:96: 7b:3c:cd:77:66:63:04:55:02:94:a1:bb:4b:92:67:c0: bd:40:1a:70:a2:72:4d:71:6e:ca:74:5f:52:35:4c:65: 65:97:0e:e3:10:d4:e1:12:da:5c:86:4d:fb:92:e5:7e: 02:68:cd:5f:a8:92:16:7c:3d:24:9f:ce:ea:2c:60:aa: b7:ee:3b:e3:3b:c2:d2:9b:66:fc:9e:bc:a7:28:ee:22: d1:79:47:ef:62:6a:9a:34:6c:37:48:93:ea:8d:3f:e3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:7d:ab:08:5e:c3:f3:32:d7:a8:80:fb:65:e2:64:76: 3f:5c:79:79:fe:89:f2:c0:e5:6d:4a:2c:d7:77:ed:2b: 00:97:fc:97:c1:82:04:a2:25:dd:5d:50:ae:c7:f3:a9: c5:f7:dc:fe:c8:81:16:16:36:e1:ff:94:77:20:ac:77: 3f:ef:42:55:51:60:db:1d:cf:2c:47:d2:f9:7d:59:12: 13:fe:d0:36:1a:a8:b7:81:4c:6e:fd:81:80:4a:c6:19: 7f:2a:59:ef:6b:3e:aa:e4:23:57:69:63:03:18:2b:7e: 89:7a:65:c6:1f:26:79:38:cc:f4:15:a7:43:88:81:34: fe:4e:ae:2a:34:2b:b6:7d:af:82:74:14:de:0a:b9:5c: de:8a:4a:cd:f1:ed:7a:1b:67:db:ee:be:8a:2f:9b:39: 7c:1d:1b:ad:be:75:6b:e5:04:81:76:c3:74:de:b5:01: 09:a8:cc:9c:8f:f5:7e:5b:01:9e:e0:06:d2:ca:2d:63: 6e:4d:8c:1e:ec:36:a2:9b:7a:81:c7:b5:b9:32:df:e0: 7f:8b:c7:ac:92:58:9d:a4:f5:32:28:34:12:5d:95:6a: e2:2b:5f:05:d7:27:52:97:49:e2:a7:10:46:ad:bf:1b: 85:d7:05:50:df:3b:49:bf:fa:74:e6:04:97:5e:d0:f3 Fingerprint (SHA-256): 91:06:35:72:0F:44:D4:AB:48:94:09:4A:E4:04:10:15:22:75:C1:83:3F:76:4C:F3:44:13:D5:C3:F0:4E:A5:10 Fingerprint (SHA1): B4:F0:7A:0E:F0:EC:CC:C7:92:76:2B:C6:D2:83:12:BD:D5:9C:AF:57 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #3396: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:56:04 2016 Not After : Sun Apr 25 13:56:04 2021 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:cd:ed:3c:b5:a3:c4:54:7b:83:48:7f:15:38:d5:18: 75:69:f6:e6:c0:cf:4b:ae:67:3d:eb:d6:de:a2:b8:b6: b8:8c:c3:cf:9d:24:83:4f:70:37:d5:0d:d5:19:c0:c4: fc:2c:bc:00:0c:b0:fe:3c:9f:89:8f:64:c0:1c:69:cb: ba:fa:30:37:4a:aa:39:2f:b9:b0:4b:1b:6c:69:d7:04: ad:dc:33:78:98:9a:2f:fc:1c:d0:03:6c:fd:1b:64:bf: 4f:0f:59:3d:d2:4f:ca:b7:42:a7:b9:b8:15:93:6f:19: 01:2e:76:cc:70:fb:4f:9f:51:98:2b:72:a0:ce:18:e8: b3:9c:1a:81:73:ee:bd:a8:ae:0a:1b:9d:40:42:14:b4: 83:69:47:dd:1d:c3:8b:18:7f:b1:c0:7d:97:23:c5:e6: 7f:38:8e:7c:c5:64:2a:c0:ef:55:07:a7:6a:78:dd:7d: cb:7e:3e:2c:b1:1c:d8:07:e1:72:4c:55:af:ee:c2:5c: 09:74:3e:3f:be:c2:f2:cf:2c:6c:b3:89:83:2e:0c:d2: 6c:a0:6a:ae:6f:6f:8b:89:77:92:e0:c8:84:3c:b9:51: a2:26:3c:01:c7:fe:0c:c9:58:db:ef:ae:83:31:c7:bb: 52:14:87:ea:d7:38:da:e4:0f:82:61:bd:a7:b9:08:47 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:73:97:a7:d9:b4:1a:0b:65:60:9a:cf:44:d7:42:3f: 5c:2c:cc:36:41:bf:c0:4b:0a:d6:9d:75:20:83:c9:2e: 24:12:44:ff:6c:21:5f:cb:f7:e2:db:47:c2:0f:84:9b: 9d:3f:a6:eb:a5:b5:f7:68:34:0f:7f:34:97:c2:fa:c2: 36:da:71:34:ec:8c:6c:04:95:7f:f5:3d:9b:32:67:a6: 2c:cf:86:32:d2:32:3c:e1:79:e3:1b:72:c1:79:eb:31: 92:87:d4:00:c4:16:ae:b5:c8:ee:77:23:9f:b0:10:cb: 51:69:68:68:e8:bf:d0:17:5a:42:48:5a:49:fc:0d:80: 61:da:b3:e7:a7:ab:0e:25:03:5e:bf:76:dd:3f:a0:0c: b2:99:71:c1:ee:59:dc:0e:27:1f:10:e2:8e:57:b5:31: e5:38:70:41:ee:01:63:ce:28:b4:fb:6f:5f:a5:cb:6f: 44:69:86:5c:98:1d:d9:bb:31:87:79:ef:55:46:80:b3: 8d:b7:a0:30:36:2c:fb:80:ac:1a:c6:42:20:fb:79:5a: 98:04:75:46:8c:1f:7e:d8:25:64:f6:73:c0:a6:5d:1d: 50:6b:ab:25:67:34:e4:a0:ff:39:43:ab:7d:58:77:df: fc:cf:b8:7a:93:d6:e2:7d:07:26:f3:5e:77:f5:ff:f0 Fingerprint (SHA-256): 5D:DA:04:1E:E1:EF:41:26:73:2D:E4:4D:6C:90:8B:8D:40:DF:37:E4:09:EA:D3:1B:D4:4C:80:BD:D3:3F:5D:08 Fingerprint (SHA1): F3:01:52:29:E5:53:9A:0A:46:EA:55:AB:83:5E:1C:E7:C3:9E:4D:F5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #3397: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3398: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice-ec u,u,u Dave u,u,u localhost.localdomain-dsamixed ,, serverCA-dsa C,C,C chain-2-clientCA-ec ,, Alice #1 ,, Dave-dsa ,, localhost.localdomain-ecmixed ,, localhost-sni.localdomain-dsamixed ,, Alice #99 ,, Alice-dsamixed u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, localhost.localdomain u,u,u localhost-sni.localdomain-ecmixed ,, clientCA T,C,C Alice #3 ,, TestCA CT,C,C TestCA-ec CT,C,C Alice-ecmixed u,u,u Dave-ecmixed ,, localhost.localdomain-dsa ,, localhost-sni.localdomain u,u,u localhost-sni.localdomain-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-ec ,, serverCA-ec C,C,C chain-1-clientCA ,, clientCA-dsa T,C,C chain-1-clientCA-ec ,, Alice #2 ,, Alice #4 ,, Alice u,u,u Dave-ec ,, localhost-sni.localdomain-dsa ,, ExtendedSSLUser-dsa ,, ExtendedSSLUser-ecmixed ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, Alice #100 ,, Alice-dsa u,u,u ExtendedSSLUser-dsamixed ,, chain-2-clientCA-dsa ,, bob@bogus.com ,, Dave-dsamixed ,, localhost.localdomain-ec ,, clientCA-ec T,C,C CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.v3.28098 -t Test2 -f ../tests.pw merge.sh: #3399: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests.v1.28098 -t Test1 -f ../tests.pw merge.sh: #3400: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #3401: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #3402: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #3403: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Apr 25 13:58:11 2016 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Mon Apr 25 13:42:07 2016 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Mon Apr 25 13:58:04 2016 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #3404: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Mon Apr 25 15:41:02 UTC 2016 Checking if pkits should be skipped based on skip list [] Running tests for pkits TIMESTAMP pkits BEGIN: Mon Apr 25 15:41:02 UTC 2016 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Mon Apr 25 15:41:02 UTC 2016 Checking if chains should be skipped based on skip list [] Running tests for chains TIMESTAMP chains BEGIN: Mon Apr 25 15:41:02 UTC 2016 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #3405: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154103 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3406: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3407: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #3408: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #3409: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3410: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3411: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3412: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #3413: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #3414: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3415: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3416: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3417: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #3418: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #3419: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3420: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3421: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3422: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #3423: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #3424: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3425: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3426: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3427: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #3428: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3429: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3430: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3431: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #3432: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3433: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3434: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3435: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #3436: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3437: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3438: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3439: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #3440: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3441: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3442: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3443: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #3444: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3445: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3446: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3447: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #3448: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3449: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3450: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3451: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #3452: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3453: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3454: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3455: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #3456: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3457: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3458: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3459: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #3460: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3461: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3462: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3463: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #3464: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3465: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3466: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3467: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160425154420Z nextupdate=20170425154420Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Apr 25 15:44:20 2016 Next Update: Tue Apr 25 15:44:20 2017 CRL Extensions: chains.sh: #3468: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160425154421Z addcert 2 20160425154421Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Apr 25 15:44:21 2016 Next Update: Tue Apr 25 15:44:20 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 15:44:21 2016 CRL Extensions: chains.sh: #3469: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160425154421Z nextupdate=20170425154421Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Apr 25 15:44:21 2016 Next Update: Tue Apr 25 15:44:21 2017 CRL Extensions: chains.sh: #3470: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160425154422Z addcert 2 20160425154422Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Apr 25 15:44:22 2016 Next Update: Tue Apr 25 15:44:21 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 15:44:22 2016 CRL Extensions: chains.sh: #3471: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160425154423Z addcert 4 20160425154423Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Apr 25 15:44:23 2016 Next Update: Tue Apr 25 15:44:21 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 15:44:22 2016 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Mon Apr 25 15:44:23 2016 CRL Extensions: chains.sh: #3472: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160425154424Z nextupdate=20170425154424Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Apr 25 15:44:24 2016 Next Update: Tue Apr 25 15:44:24 2017 CRL Extensions: chains.sh: #3473: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160425154425Z addcert 2 20160425154425Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Apr 25 15:44:25 2016 Next Update: Tue Apr 25 15:44:24 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 15:44:25 2016 CRL Extensions: chains.sh: #3474: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160425154426Z addcert 3 20160425154426Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Apr 25 15:44:26 2016 Next Update: Tue Apr 25 15:44:24 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 15:44:25 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Apr 25 15:44:26 2016 CRL Extensions: chains.sh: #3475: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160425154427Z nextupdate=20170425154427Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Apr 25 15:44:27 2016 Next Update: Tue Apr 25 15:44:27 2017 CRL Extensions: chains.sh: #3476: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160425154428Z addcert 2 20160425154428Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Apr 25 15:44:28 2016 Next Update: Tue Apr 25 15:44:27 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 15:44:28 2016 CRL Extensions: chains.sh: #3477: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160425154429Z addcert 3 20160425154429Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Apr 25 15:44:29 2016 Next Update: Tue Apr 25 15:44:27 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 15:44:28 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Apr 25 15:44:29 2016 CRL Extensions: chains.sh: #3478: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #3479: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #3480: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #3481: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3482: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3483: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3484: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3485: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #3486: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #3487: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #3488: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #3489: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #3490: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #3491: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #3492: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #3493: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #3494: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #3495: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #3496: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #3497: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #3498: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #3499: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #3500: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #3501: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #3502: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Mon Apr 25 15:44:43 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 15:44:43 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 19759 >/dev/null 2>/dev/null httpserv with PID 19759 found at Mon Apr 25 15:44:43 UTC 2016 httpserv with PID 19759 started at Mon Apr 25 15:44:43 UTC 2016 tstclnt -h localhost.localdomain -p 9719 -q -t 20 chains.sh: #3503: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154103 (0x19575637) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Apr 25 15:41:36 2016 Not After : Sun Apr 25 15:41:36 2066 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:e8:92:fa:14:2e:5c:e6:fc:65:b3:d1:15:0d:73:f4: 00:29:30:f2:94:35:e5:70:53:40:e5:56:cf:89:82:3c: 6a:2d:cc:fa:ee:9a:d6:ef:90:0f:38:60:2a:0b:43:fd: 3f:05:de:34:a8:82:6e:68:e2:8a:34:e3:e5:8f:ea:b6: 52:15:0c:7c:e2:0b:cb:e7:05:5f:ee:64:35:7d:5a:f2: f4:d3:0c:8d:42:a6:57:23:77:3e:0f:af:19:e7:e6:90: 3d:bb:f8:34:1a:8a:96:c4:81:f4:47:f2:d3:1f:08:df: dd:4e:06:a3:1b:0c:b2:b2:a6:18:e4:b6:1a:cb:0d:1f: f6:32:97:23:9f:3c:09:15:a7:92:22:de:d1:1f:a7:a3: ec:dc:4f:d5:3a:f4:0e:5e:30:a2:e8:62:b1:90:38:1c: 8f:3c:7d:58:b2:42:70:0b:20:d8:55:f8:d5:f3:f5:a5: 79:b9:05:ba:e5:b0:aa:f8:09:04:a1:8f:37:b1:ce:cf: 8d:ba:b9:aa:5b:93:0f:ad:5f:41:42:a6:b3:9a:65:ad: 48:f6:d3:bc:f1:aa:78:c2:48:08:73:50:a7:b1:3d:61: cf:0e:b7:04:fa:db:c8:c4:d4:00:aa:93:07:b2:98:c7: 81:da:70:22:12:b0:31:04:7c:2a:2f:9f:63:79:89:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:0a:d7:fd:f2:69:a9:0f:49:d4:21:a1:3d:3e:eb:da: 05:32:a9:40:57:ca:db:f0:40:0c:ce:e9:5c:e7:f5:57: 61:92:45:4c:c4:3e:a9:b3:1a:9a:8b:7a:bf:4e:8f:40: c2:20:18:0c:fb:87:e8:10:b4:a1:08:5f:e1:56:08:1e: df:fe:b3:38:fe:f6:a6:91:08:74:e0:01:1e:b9:2d:15: e0:2f:36:2f:b1:63:3e:a3:7c:a2:09:04:5d:2f:55:6e: 31:d6:12:47:90:51:bc:93:01:57:5c:83:ee:c5:40:fa: 33:58:ff:58:97:d2:f4:71:10:86:cf:9f:33:ee:8c:d3: c1:e5:f7:46:3b:83:8d:bb:f7:8b:24:44:85:26:86:5f: b6:6d:95:03:fc:ae:66:70:37:7f:64:48:81:b7:55:68: 08:8b:3d:da:5a:02:24:0b:c7:6d:3c:77:36:aa:63:1e: 3b:97:0a:cf:c9:64:7d:ad:f0:b9:c0:e7:71:31:08:45: c8:97:62:1e:9f:7d:9b:36:26:f5:3f:20:be:39:a0:96: 85:7a:b7:47:02:cf:23:9c:6a:0c:8f:94:f1:95:9e:d0: b7:70:18:3f:69:b9:bf:d3:a5:a3:47:78:6d:4d:7c:03: 01:5d:05:2e:35:0f:9f:12:a0:c3:cc:96:b7:82:c9:b5 Fingerprint (SHA-256): 37:09:FE:EA:38:14:99:E4:E0:23:6F:66:05:7E:17:BD:15:1A:28:FC:5F:C4:A4:4C:15:AC:53:2B:1D:36:3A:3F Fingerprint (SHA1): 10:21:09:FE:A7:49:30:E5:AA:10:91:1F:42:F0:C3:BC:C5:C4:A8:FD Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3504: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #3505: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #3506: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 19759 at Mon Apr 25 15:44:46 UTC 2016 kill -USR1 19759 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 19759 killed at Mon Apr 25 15:44:47 UTC 2016 httpserv starting at Mon Apr 25 15:44:47 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 15:44:47 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 19928 >/dev/null 2>/dev/null httpserv with PID 19928 found at Mon Apr 25 15:44:47 UTC 2016 httpserv with PID 19928 started at Mon Apr 25 15:44:47 UTC 2016 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3507: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3508: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3509: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -h localhost.localdomain -p 9719 -q -t 20 chains.sh: #3510: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154103 (0x19575637) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Apr 25 15:41:36 2016 Not After : Sun Apr 25 15:41:36 2066 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:e8:92:fa:14:2e:5c:e6:fc:65:b3:d1:15:0d:73:f4: 00:29:30:f2:94:35:e5:70:53:40:e5:56:cf:89:82:3c: 6a:2d:cc:fa:ee:9a:d6:ef:90:0f:38:60:2a:0b:43:fd: 3f:05:de:34:a8:82:6e:68:e2:8a:34:e3:e5:8f:ea:b6: 52:15:0c:7c:e2:0b:cb:e7:05:5f:ee:64:35:7d:5a:f2: f4:d3:0c:8d:42:a6:57:23:77:3e:0f:af:19:e7:e6:90: 3d:bb:f8:34:1a:8a:96:c4:81:f4:47:f2:d3:1f:08:df: dd:4e:06:a3:1b:0c:b2:b2:a6:18:e4:b6:1a:cb:0d:1f: f6:32:97:23:9f:3c:09:15:a7:92:22:de:d1:1f:a7:a3: ec:dc:4f:d5:3a:f4:0e:5e:30:a2:e8:62:b1:90:38:1c: 8f:3c:7d:58:b2:42:70:0b:20:d8:55:f8:d5:f3:f5:a5: 79:b9:05:ba:e5:b0:aa:f8:09:04:a1:8f:37:b1:ce:cf: 8d:ba:b9:aa:5b:93:0f:ad:5f:41:42:a6:b3:9a:65:ad: 48:f6:d3:bc:f1:aa:78:c2:48:08:73:50:a7:b1:3d:61: cf:0e:b7:04:fa:db:c8:c4:d4:00:aa:93:07:b2:98:c7: 81:da:70:22:12:b0:31:04:7c:2a:2f:9f:63:79:89:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:0a:d7:fd:f2:69:a9:0f:49:d4:21:a1:3d:3e:eb:da: 05:32:a9:40:57:ca:db:f0:40:0c:ce:e9:5c:e7:f5:57: 61:92:45:4c:c4:3e:a9:b3:1a:9a:8b:7a:bf:4e:8f:40: c2:20:18:0c:fb:87:e8:10:b4:a1:08:5f:e1:56:08:1e: df:fe:b3:38:fe:f6:a6:91:08:74:e0:01:1e:b9:2d:15: e0:2f:36:2f:b1:63:3e:a3:7c:a2:09:04:5d:2f:55:6e: 31:d6:12:47:90:51:bc:93:01:57:5c:83:ee:c5:40:fa: 33:58:ff:58:97:d2:f4:71:10:86:cf:9f:33:ee:8c:d3: c1:e5:f7:46:3b:83:8d:bb:f7:8b:24:44:85:26:86:5f: b6:6d:95:03:fc:ae:66:70:37:7f:64:48:81:b7:55:68: 08:8b:3d:da:5a:02:24:0b:c7:6d:3c:77:36:aa:63:1e: 3b:97:0a:cf:c9:64:7d:ad:f0:b9:c0:e7:71:31:08:45: c8:97:62:1e:9f:7d:9b:36:26:f5:3f:20:be:39:a0:96: 85:7a:b7:47:02:cf:23:9c:6a:0c:8f:94:f1:95:9e:d0: b7:70:18:3f:69:b9:bf:d3:a5:a3:47:78:6d:4d:7c:03: 01:5d:05:2e:35:0f:9f:12:a0:c3:cc:96:b7:82:c9:b5 Fingerprint (SHA-256): 37:09:FE:EA:38:14:99:E4:E0:23:6F:66:05:7E:17:BD:15:1A:28:FC:5F:C4:A4:4C:15:AC:53:2B:1D:36:3A:3F Fingerprint (SHA1): 10:21:09:FE:A7:49:30:E5:AA:10:91:1F:42:F0:C3:BC:C5:C4:A8:FD Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3511: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #3512: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #3513: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 19928 at Mon Apr 25 15:44:53 UTC 2016 kill -USR1 19928 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 19928 killed at Mon Apr 25 15:44:53 UTC 2016 httpserv starting at Mon Apr 25 15:44:53 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 15:44:53 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 20176 >/dev/null 2>/dev/null httpserv with PID 20176 found at Mon Apr 25 15:44:54 UTC 2016 httpserv with PID 20176 started at Mon Apr 25 15:44:54 UTC 2016 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3514: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3515: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154104 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3516: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3517: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3518: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154105 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3519: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3520: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3521: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3522: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425154106 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3523: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3524: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425154107 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3525: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3526: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3527: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3528: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3529: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 425154108 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3530: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3531: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3532: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #3533: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #3534: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154105 (0x19575639) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 15:45:27 2016 Not After : Sun Apr 25 15:45:27 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:4b:44:0a:02:ce:1a:37:a9:43:73:9b:c2:42:e5:af: 34:e0:fa:09:6c:5a:b7:4b:39:5d:14:5b:46:48:70:9c: 8f:6a:69:16:38:96:ec:2e:8f:08:f7:24:59:71:9b:57: 46:50:e6:c9:fe:a5:cd:34:61:02:9f:16:80:57:f4:a6: c2:2f:32:f4:c4:47:f9:fc:19:64:11:7e:85:84:25:b1: 37:f3:12:cf:29:f7:7d:6f:a0:0d:ba:a8:64:c2:65:5b: eb:83:bb:c5:40:89:8d:b9:9f:30:63:76:e0:00:6c:16: 0c:eb:ab:c8:2b:d8:aa:95:72:65:b5:a2:11:66:6c:05: b0:a2:30:5b:90:44:44:ff:fa:2d:e5:df:7f:73:2e:93: 3c:45:0a:b3:ae:dd:ea:ca:e1:28:55:b7:a4:77:ad:66: e3:71:8c:7d:68:75:5a:b2:05:4e:61:66:87:5a:57:df: 16:78:5f:57:8e:58:2f:a8:8a:18:51:55:9b:d8:87:80: e2:b9:1b:39:f6:e9:53:a2:ce:69:74:2e:ca:f2:26:d6: 1d:23:77:46:fb:69:47:c1:a4:2e:c4:1a:53:7b:77:fd: 86:eb:8f:a1:37:41:9d:dd:88:68:3e:a4:2e:cb:63:b3: cc:42:39:af:9a:36:be:ac:cf:60:32:98:84:1f:bb:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:19:8a:be:78:37:e0:b0:12:7b:f0:15:4c:84:69:34: ca:e6:c9:5d:b9:bf:ac:4e:da:88:55:37:d8:f0:d3:6c: d7:73:4d:d4:73:a3:e4:12:07:3f:d6:45:8d:13:d9:00: 77:9c:9b:9a:4c:2d:ef:c0:10:6f:f6:ca:2f:6b:ea:26: ca:13:f2:c5:5e:17:3e:5b:c6:9b:5f:3c:24:78:11:a9: c4:d6:d2:bd:85:fa:9e:4c:03:74:9c:de:23:c4:fa:31: 22:68:02:0c:45:aa:e3:6b:0d:38:8a:a4:c6:ad:65:6d: f0:15:eb:df:62:9d:7d:e6:43:01:dc:13:6e:6c:09:6f: 63:06:1b:66:72:50:aa:98:36:05:8c:47:23:68:f4:6a: f5:05:59:2c:3e:d3:7e:47:67:b8:77:7c:52:4a:32:66: fa:c5:7f:95:2a:04:dc:0c:89:19:6a:55:4b:a6:32:00: 66:63:35:4c:8b:c5:12:18:b4:a3:09:44:42:99:90:7a: 3a:07:c8:7c:e4:60:1d:29:b3:65:84:06:a4:8d:26:7c: 64:8f:a7:9c:5b:ad:f5:79:8c:cd:f3:df:d1:4f:2a:1a: 73:99:0d:0d:c4:ec:5f:0a:9b:e7:a1:40:b5:36:f3:1a: c9:c9:fd:7c:33:b2:06:49:47:e9:70:f9:16:c7:46:0e Fingerprint (SHA-256): D8:E2:C2:68:05:C7:E7:43:B4:BA:A9:D3:30:53:70:C6:33:40:83:8D:47:EF:B9:78:12:D5:ED:B7:D9:42:C2:63 Fingerprint (SHA1): 26:BF:EB:7A:78:F2:37:90:1D:2A:9B:DD:C7:D8:0E:A4:01:D7:1A:5E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3535: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154104 (0x19575638) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 15:45:17 2016 Not After : Sun Apr 25 15:45:17 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:50:95:8d:9c:16:f5:2b:d6:c7:76:71:77:95:8f:f1: 8e:47:ae:f9:ce:d8:9c:b2:b5:1f:12:dc:3f:2a:98:18: 39:bf:a8:a2:61:83:dc:9b:54:4a:13:d0:cd:ea:77:0b: 0e:ee:57:29:26:c2:5e:67:47:d6:53:9c:d6:d2:3d:8d: a9:96:62:4e:3c:49:34:b2:f5:f5:5f:52:76:f7:e0:25: 68:14:23:c5:56:6d:31:f4:a9:5d:bc:65:8c:da:50:06: 63:e9:50:49:9e:51:12:ab:ab:81:a4:b2:2c:cd:cc:b6: 22:66:20:38:69:b0:9b:30:ac:bb:2d:99:87:7b:2b:91: 44:c3:d0:8d:9d:bd:39:34:b6:0e:fb:c5:38:d4:7a:5f: 96:06:23:f6:c5:75:3a:8e:9c:40:dd:61:a7:bb:ea:f6: 40:46:9d:c9:3d:1b:3b:2e:84:ce:9b:c6:11:0b:8e:1f: d7:cc:3e:e3:a6:67:ec:57:77:df:4d:e8:6a:a1:33:8e: af:26:b0:7e:5a:10:39:04:b8:ce:6f:ec:3d:aa:6e:18: 03:c0:c3:ba:05:9c:94:c7:6c:7b:a5:13:c8:80:73:3e: 95:1e:08:ae:a1:8d:16:db:1a:b1:ed:76:e6:37:cc:d4: 53:3d:55:2e:15:58:3b:fc:5f:ec:8f:b0:4e:d8:04:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:53:44:4e:1a:c1:59:5d:1e:07:ec:81:63:d2:5a:a1: 1c:09:8c:db:13:46:7b:35:bf:9f:8d:41:6b:a0:f9:d8: 30:55:49:74:2a:27:48:e9:f1:94:4c:38:44:e6:0d:f9: 99:9b:8b:8a:d7:7b:0b:40:0a:7e:4a:20:2e:bc:3f:54: 37:3e:61:2d:72:77:66:84:62:8c:72:29:51:48:46:36: c2:e1:3e:c5:14:21:6a:0e:27:99:46:1f:23:c0:4e:f6: 65:88:b6:46:ad:b0:34:10:78:b5:15:23:04:5c:4c:2b: b4:7f:a3:20:24:45:24:7d:ea:6b:4b:4d:4d:85:72:48: 1e:c8:e3:72:79:5c:96:d3:5d:04:be:5a:e2:02:23:21: 06:c9:d6:03:29:5a:bc:94:9c:aa:19:1d:99:b3:43:a9: 8e:1a:7d:59:8b:cb:b4:1b:f9:99:f5:12:51:f3:2e:71: ba:0c:bd:c8:19:2b:ca:f5:78:e3:b6:c0:0d:98:3a:b1: 56:15:29:58:c8:3a:c5:aa:e2:9e:d4:cd:31:d5:1a:98: 32:6a:47:4c:69:0c:75:bd:74:81:95:d8:f8:e4:91:12: 8f:c8:ad:10:d2:40:cb:f3:b2:49:39:bb:a6:45:ab:ab: 72:fb:08:e0:33:20:18:9d:4a:5a:bb:8b:e0:9e:c5:b1 Fingerprint (SHA-256): 2D:25:D5:28:DC:DE:1A:B0:7F:D4:DC:0A:28:EE:C4:41:87:C4:09:3D:C7:34:65:83:EC:F8:47:7E:40:82:19:63 Fingerprint (SHA1): 56:30:CA:A1:BF:E0:E3:71:89:91:0C:72:B0:66:9C:57:19:C1:8C:DA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3536: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3537: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #3538: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #3539: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154104 (0x19575638) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 15:45:17 2016 Not After : Sun Apr 25 15:45:17 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:50:95:8d:9c:16:f5:2b:d6:c7:76:71:77:95:8f:f1: 8e:47:ae:f9:ce:d8:9c:b2:b5:1f:12:dc:3f:2a:98:18: 39:bf:a8:a2:61:83:dc:9b:54:4a:13:d0:cd:ea:77:0b: 0e:ee:57:29:26:c2:5e:67:47:d6:53:9c:d6:d2:3d:8d: a9:96:62:4e:3c:49:34:b2:f5:f5:5f:52:76:f7:e0:25: 68:14:23:c5:56:6d:31:f4:a9:5d:bc:65:8c:da:50:06: 63:e9:50:49:9e:51:12:ab:ab:81:a4:b2:2c:cd:cc:b6: 22:66:20:38:69:b0:9b:30:ac:bb:2d:99:87:7b:2b:91: 44:c3:d0:8d:9d:bd:39:34:b6:0e:fb:c5:38:d4:7a:5f: 96:06:23:f6:c5:75:3a:8e:9c:40:dd:61:a7:bb:ea:f6: 40:46:9d:c9:3d:1b:3b:2e:84:ce:9b:c6:11:0b:8e:1f: d7:cc:3e:e3:a6:67:ec:57:77:df:4d:e8:6a:a1:33:8e: af:26:b0:7e:5a:10:39:04:b8:ce:6f:ec:3d:aa:6e:18: 03:c0:c3:ba:05:9c:94:c7:6c:7b:a5:13:c8:80:73:3e: 95:1e:08:ae:a1:8d:16:db:1a:b1:ed:76:e6:37:cc:d4: 53:3d:55:2e:15:58:3b:fc:5f:ec:8f:b0:4e:d8:04:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:53:44:4e:1a:c1:59:5d:1e:07:ec:81:63:d2:5a:a1: 1c:09:8c:db:13:46:7b:35:bf:9f:8d:41:6b:a0:f9:d8: 30:55:49:74:2a:27:48:e9:f1:94:4c:38:44:e6:0d:f9: 99:9b:8b:8a:d7:7b:0b:40:0a:7e:4a:20:2e:bc:3f:54: 37:3e:61:2d:72:77:66:84:62:8c:72:29:51:48:46:36: c2:e1:3e:c5:14:21:6a:0e:27:99:46:1f:23:c0:4e:f6: 65:88:b6:46:ad:b0:34:10:78:b5:15:23:04:5c:4c:2b: b4:7f:a3:20:24:45:24:7d:ea:6b:4b:4d:4d:85:72:48: 1e:c8:e3:72:79:5c:96:d3:5d:04:be:5a:e2:02:23:21: 06:c9:d6:03:29:5a:bc:94:9c:aa:19:1d:99:b3:43:a9: 8e:1a:7d:59:8b:cb:b4:1b:f9:99:f5:12:51:f3:2e:71: ba:0c:bd:c8:19:2b:ca:f5:78:e3:b6:c0:0d:98:3a:b1: 56:15:29:58:c8:3a:c5:aa:e2:9e:d4:cd:31:d5:1a:98: 32:6a:47:4c:69:0c:75:bd:74:81:95:d8:f8:e4:91:12: 8f:c8:ad:10:d2:40:cb:f3:b2:49:39:bb:a6:45:ab:ab: 72:fb:08:e0:33:20:18:9d:4a:5a:bb:8b:e0:9e:c5:b1 Fingerprint (SHA-256): 2D:25:D5:28:DC:DE:1A:B0:7F:D4:DC:0A:28:EE:C4:41:87:C4:09:3D:C7:34:65:83:EC:F8:47:7E:40:82:19:63 Fingerprint (SHA1): 56:30:CA:A1:BF:E0:E3:71:89:91:0C:72:B0:66:9C:57:19:C1:8C:DA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3540: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154105 (0x19575639) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 15:45:27 2016 Not After : Sun Apr 25 15:45:27 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:4b:44:0a:02:ce:1a:37:a9:43:73:9b:c2:42:e5:af: 34:e0:fa:09:6c:5a:b7:4b:39:5d:14:5b:46:48:70:9c: 8f:6a:69:16:38:96:ec:2e:8f:08:f7:24:59:71:9b:57: 46:50:e6:c9:fe:a5:cd:34:61:02:9f:16:80:57:f4:a6: c2:2f:32:f4:c4:47:f9:fc:19:64:11:7e:85:84:25:b1: 37:f3:12:cf:29:f7:7d:6f:a0:0d:ba:a8:64:c2:65:5b: eb:83:bb:c5:40:89:8d:b9:9f:30:63:76:e0:00:6c:16: 0c:eb:ab:c8:2b:d8:aa:95:72:65:b5:a2:11:66:6c:05: b0:a2:30:5b:90:44:44:ff:fa:2d:e5:df:7f:73:2e:93: 3c:45:0a:b3:ae:dd:ea:ca:e1:28:55:b7:a4:77:ad:66: e3:71:8c:7d:68:75:5a:b2:05:4e:61:66:87:5a:57:df: 16:78:5f:57:8e:58:2f:a8:8a:18:51:55:9b:d8:87:80: e2:b9:1b:39:f6:e9:53:a2:ce:69:74:2e:ca:f2:26:d6: 1d:23:77:46:fb:69:47:c1:a4:2e:c4:1a:53:7b:77:fd: 86:eb:8f:a1:37:41:9d:dd:88:68:3e:a4:2e:cb:63:b3: cc:42:39:af:9a:36:be:ac:cf:60:32:98:84:1f:bb:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:19:8a:be:78:37:e0:b0:12:7b:f0:15:4c:84:69:34: ca:e6:c9:5d:b9:bf:ac:4e:da:88:55:37:d8:f0:d3:6c: d7:73:4d:d4:73:a3:e4:12:07:3f:d6:45:8d:13:d9:00: 77:9c:9b:9a:4c:2d:ef:c0:10:6f:f6:ca:2f:6b:ea:26: ca:13:f2:c5:5e:17:3e:5b:c6:9b:5f:3c:24:78:11:a9: c4:d6:d2:bd:85:fa:9e:4c:03:74:9c:de:23:c4:fa:31: 22:68:02:0c:45:aa:e3:6b:0d:38:8a:a4:c6:ad:65:6d: f0:15:eb:df:62:9d:7d:e6:43:01:dc:13:6e:6c:09:6f: 63:06:1b:66:72:50:aa:98:36:05:8c:47:23:68:f4:6a: f5:05:59:2c:3e:d3:7e:47:67:b8:77:7c:52:4a:32:66: fa:c5:7f:95:2a:04:dc:0c:89:19:6a:55:4b:a6:32:00: 66:63:35:4c:8b:c5:12:18:b4:a3:09:44:42:99:90:7a: 3a:07:c8:7c:e4:60:1d:29:b3:65:84:06:a4:8d:26:7c: 64:8f:a7:9c:5b:ad:f5:79:8c:cd:f3:df:d1:4f:2a:1a: 73:99:0d:0d:c4:ec:5f:0a:9b:e7:a1:40:b5:36:f3:1a: c9:c9:fd:7c:33:b2:06:49:47:e9:70:f9:16:c7:46:0e Fingerprint (SHA-256): D8:E2:C2:68:05:C7:E7:43:B4:BA:A9:D3:30:53:70:C6:33:40:83:8D:47:EF:B9:78:12:D5:ED:B7:D9:42:C2:63 Fingerprint (SHA1): 26:BF:EB:7A:78:F2:37:90:1D:2A:9B:DD:C7:D8:0E:A4:01:D7:1A:5E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3541: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #3542: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #3543: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3544: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3545: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #3546: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154105 (0x19575639) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 15:45:27 2016 Not After : Sun Apr 25 15:45:27 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:4b:44:0a:02:ce:1a:37:a9:43:73:9b:c2:42:e5:af: 34:e0:fa:09:6c:5a:b7:4b:39:5d:14:5b:46:48:70:9c: 8f:6a:69:16:38:96:ec:2e:8f:08:f7:24:59:71:9b:57: 46:50:e6:c9:fe:a5:cd:34:61:02:9f:16:80:57:f4:a6: c2:2f:32:f4:c4:47:f9:fc:19:64:11:7e:85:84:25:b1: 37:f3:12:cf:29:f7:7d:6f:a0:0d:ba:a8:64:c2:65:5b: eb:83:bb:c5:40:89:8d:b9:9f:30:63:76:e0:00:6c:16: 0c:eb:ab:c8:2b:d8:aa:95:72:65:b5:a2:11:66:6c:05: b0:a2:30:5b:90:44:44:ff:fa:2d:e5:df:7f:73:2e:93: 3c:45:0a:b3:ae:dd:ea:ca:e1:28:55:b7:a4:77:ad:66: e3:71:8c:7d:68:75:5a:b2:05:4e:61:66:87:5a:57:df: 16:78:5f:57:8e:58:2f:a8:8a:18:51:55:9b:d8:87:80: e2:b9:1b:39:f6:e9:53:a2:ce:69:74:2e:ca:f2:26:d6: 1d:23:77:46:fb:69:47:c1:a4:2e:c4:1a:53:7b:77:fd: 86:eb:8f:a1:37:41:9d:dd:88:68:3e:a4:2e:cb:63:b3: cc:42:39:af:9a:36:be:ac:cf:60:32:98:84:1f:bb:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:19:8a:be:78:37:e0:b0:12:7b:f0:15:4c:84:69:34: ca:e6:c9:5d:b9:bf:ac:4e:da:88:55:37:d8:f0:d3:6c: d7:73:4d:d4:73:a3:e4:12:07:3f:d6:45:8d:13:d9:00: 77:9c:9b:9a:4c:2d:ef:c0:10:6f:f6:ca:2f:6b:ea:26: ca:13:f2:c5:5e:17:3e:5b:c6:9b:5f:3c:24:78:11:a9: c4:d6:d2:bd:85:fa:9e:4c:03:74:9c:de:23:c4:fa:31: 22:68:02:0c:45:aa:e3:6b:0d:38:8a:a4:c6:ad:65:6d: f0:15:eb:df:62:9d:7d:e6:43:01:dc:13:6e:6c:09:6f: 63:06:1b:66:72:50:aa:98:36:05:8c:47:23:68:f4:6a: f5:05:59:2c:3e:d3:7e:47:67:b8:77:7c:52:4a:32:66: fa:c5:7f:95:2a:04:dc:0c:89:19:6a:55:4b:a6:32:00: 66:63:35:4c:8b:c5:12:18:b4:a3:09:44:42:99:90:7a: 3a:07:c8:7c:e4:60:1d:29:b3:65:84:06:a4:8d:26:7c: 64:8f:a7:9c:5b:ad:f5:79:8c:cd:f3:df:d1:4f:2a:1a: 73:99:0d:0d:c4:ec:5f:0a:9b:e7:a1:40:b5:36:f3:1a: c9:c9:fd:7c:33:b2:06:49:47:e9:70:f9:16:c7:46:0e Fingerprint (SHA-256): D8:E2:C2:68:05:C7:E7:43:B4:BA:A9:D3:30:53:70:C6:33:40:83:8D:47:EF:B9:78:12:D5:ED:B7:D9:42:C2:63 Fingerprint (SHA1): 26:BF:EB:7A:78:F2:37:90:1D:2A:9B:DD:C7:D8:0E:A4:01:D7:1A:5E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3547: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154105 (0x19575639) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 15:45:27 2016 Not After : Sun Apr 25 15:45:27 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:4b:44:0a:02:ce:1a:37:a9:43:73:9b:c2:42:e5:af: 34:e0:fa:09:6c:5a:b7:4b:39:5d:14:5b:46:48:70:9c: 8f:6a:69:16:38:96:ec:2e:8f:08:f7:24:59:71:9b:57: 46:50:e6:c9:fe:a5:cd:34:61:02:9f:16:80:57:f4:a6: c2:2f:32:f4:c4:47:f9:fc:19:64:11:7e:85:84:25:b1: 37:f3:12:cf:29:f7:7d:6f:a0:0d:ba:a8:64:c2:65:5b: eb:83:bb:c5:40:89:8d:b9:9f:30:63:76:e0:00:6c:16: 0c:eb:ab:c8:2b:d8:aa:95:72:65:b5:a2:11:66:6c:05: b0:a2:30:5b:90:44:44:ff:fa:2d:e5:df:7f:73:2e:93: 3c:45:0a:b3:ae:dd:ea:ca:e1:28:55:b7:a4:77:ad:66: e3:71:8c:7d:68:75:5a:b2:05:4e:61:66:87:5a:57:df: 16:78:5f:57:8e:58:2f:a8:8a:18:51:55:9b:d8:87:80: e2:b9:1b:39:f6:e9:53:a2:ce:69:74:2e:ca:f2:26:d6: 1d:23:77:46:fb:69:47:c1:a4:2e:c4:1a:53:7b:77:fd: 86:eb:8f:a1:37:41:9d:dd:88:68:3e:a4:2e:cb:63:b3: cc:42:39:af:9a:36:be:ac:cf:60:32:98:84:1f:bb:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:19:8a:be:78:37:e0:b0:12:7b:f0:15:4c:84:69:34: ca:e6:c9:5d:b9:bf:ac:4e:da:88:55:37:d8:f0:d3:6c: d7:73:4d:d4:73:a3:e4:12:07:3f:d6:45:8d:13:d9:00: 77:9c:9b:9a:4c:2d:ef:c0:10:6f:f6:ca:2f:6b:ea:26: ca:13:f2:c5:5e:17:3e:5b:c6:9b:5f:3c:24:78:11:a9: c4:d6:d2:bd:85:fa:9e:4c:03:74:9c:de:23:c4:fa:31: 22:68:02:0c:45:aa:e3:6b:0d:38:8a:a4:c6:ad:65:6d: f0:15:eb:df:62:9d:7d:e6:43:01:dc:13:6e:6c:09:6f: 63:06:1b:66:72:50:aa:98:36:05:8c:47:23:68:f4:6a: f5:05:59:2c:3e:d3:7e:47:67:b8:77:7c:52:4a:32:66: fa:c5:7f:95:2a:04:dc:0c:89:19:6a:55:4b:a6:32:00: 66:63:35:4c:8b:c5:12:18:b4:a3:09:44:42:99:90:7a: 3a:07:c8:7c:e4:60:1d:29:b3:65:84:06:a4:8d:26:7c: 64:8f:a7:9c:5b:ad:f5:79:8c:cd:f3:df:d1:4f:2a:1a: 73:99:0d:0d:c4:ec:5f:0a:9b:e7:a1:40:b5:36:f3:1a: c9:c9:fd:7c:33:b2:06:49:47:e9:70:f9:16:c7:46:0e Fingerprint (SHA-256): D8:E2:C2:68:05:C7:E7:43:B4:BA:A9:D3:30:53:70:C6:33:40:83:8D:47:EF:B9:78:12:D5:ED:B7:D9:42:C2:63 Fingerprint (SHA1): 26:BF:EB:7A:78:F2:37:90:1D:2A:9B:DD:C7:D8:0E:A4:01:D7:1A:5E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3548: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #3549: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #3550: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3551: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #3552: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #3553: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154104 (0x19575638) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 15:45:17 2016 Not After : Sun Apr 25 15:45:17 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:50:95:8d:9c:16:f5:2b:d6:c7:76:71:77:95:8f:f1: 8e:47:ae:f9:ce:d8:9c:b2:b5:1f:12:dc:3f:2a:98:18: 39:bf:a8:a2:61:83:dc:9b:54:4a:13:d0:cd:ea:77:0b: 0e:ee:57:29:26:c2:5e:67:47:d6:53:9c:d6:d2:3d:8d: a9:96:62:4e:3c:49:34:b2:f5:f5:5f:52:76:f7:e0:25: 68:14:23:c5:56:6d:31:f4:a9:5d:bc:65:8c:da:50:06: 63:e9:50:49:9e:51:12:ab:ab:81:a4:b2:2c:cd:cc:b6: 22:66:20:38:69:b0:9b:30:ac:bb:2d:99:87:7b:2b:91: 44:c3:d0:8d:9d:bd:39:34:b6:0e:fb:c5:38:d4:7a:5f: 96:06:23:f6:c5:75:3a:8e:9c:40:dd:61:a7:bb:ea:f6: 40:46:9d:c9:3d:1b:3b:2e:84:ce:9b:c6:11:0b:8e:1f: d7:cc:3e:e3:a6:67:ec:57:77:df:4d:e8:6a:a1:33:8e: af:26:b0:7e:5a:10:39:04:b8:ce:6f:ec:3d:aa:6e:18: 03:c0:c3:ba:05:9c:94:c7:6c:7b:a5:13:c8:80:73:3e: 95:1e:08:ae:a1:8d:16:db:1a:b1:ed:76:e6:37:cc:d4: 53:3d:55:2e:15:58:3b:fc:5f:ec:8f:b0:4e:d8:04:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:53:44:4e:1a:c1:59:5d:1e:07:ec:81:63:d2:5a:a1: 1c:09:8c:db:13:46:7b:35:bf:9f:8d:41:6b:a0:f9:d8: 30:55:49:74:2a:27:48:e9:f1:94:4c:38:44:e6:0d:f9: 99:9b:8b:8a:d7:7b:0b:40:0a:7e:4a:20:2e:bc:3f:54: 37:3e:61:2d:72:77:66:84:62:8c:72:29:51:48:46:36: c2:e1:3e:c5:14:21:6a:0e:27:99:46:1f:23:c0:4e:f6: 65:88:b6:46:ad:b0:34:10:78:b5:15:23:04:5c:4c:2b: b4:7f:a3:20:24:45:24:7d:ea:6b:4b:4d:4d:85:72:48: 1e:c8:e3:72:79:5c:96:d3:5d:04:be:5a:e2:02:23:21: 06:c9:d6:03:29:5a:bc:94:9c:aa:19:1d:99:b3:43:a9: 8e:1a:7d:59:8b:cb:b4:1b:f9:99:f5:12:51:f3:2e:71: ba:0c:bd:c8:19:2b:ca:f5:78:e3:b6:c0:0d:98:3a:b1: 56:15:29:58:c8:3a:c5:aa:e2:9e:d4:cd:31:d5:1a:98: 32:6a:47:4c:69:0c:75:bd:74:81:95:d8:f8:e4:91:12: 8f:c8:ad:10:d2:40:cb:f3:b2:49:39:bb:a6:45:ab:ab: 72:fb:08:e0:33:20:18:9d:4a:5a:bb:8b:e0:9e:c5:b1 Fingerprint (SHA-256): 2D:25:D5:28:DC:DE:1A:B0:7F:D4:DC:0A:28:EE:C4:41:87:C4:09:3D:C7:34:65:83:EC:F8:47:7E:40:82:19:63 Fingerprint (SHA1): 56:30:CA:A1:BF:E0:E3:71:89:91:0C:72:B0:66:9C:57:19:C1:8C:DA Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3554: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154104 (0x19575638) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 15:45:17 2016 Not After : Sun Apr 25 15:45:17 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:50:95:8d:9c:16:f5:2b:d6:c7:76:71:77:95:8f:f1: 8e:47:ae:f9:ce:d8:9c:b2:b5:1f:12:dc:3f:2a:98:18: 39:bf:a8:a2:61:83:dc:9b:54:4a:13:d0:cd:ea:77:0b: 0e:ee:57:29:26:c2:5e:67:47:d6:53:9c:d6:d2:3d:8d: a9:96:62:4e:3c:49:34:b2:f5:f5:5f:52:76:f7:e0:25: 68:14:23:c5:56:6d:31:f4:a9:5d:bc:65:8c:da:50:06: 63:e9:50:49:9e:51:12:ab:ab:81:a4:b2:2c:cd:cc:b6: 22:66:20:38:69:b0:9b:30:ac:bb:2d:99:87:7b:2b:91: 44:c3:d0:8d:9d:bd:39:34:b6:0e:fb:c5:38:d4:7a:5f: 96:06:23:f6:c5:75:3a:8e:9c:40:dd:61:a7:bb:ea:f6: 40:46:9d:c9:3d:1b:3b:2e:84:ce:9b:c6:11:0b:8e:1f: d7:cc:3e:e3:a6:67:ec:57:77:df:4d:e8:6a:a1:33:8e: af:26:b0:7e:5a:10:39:04:b8:ce:6f:ec:3d:aa:6e:18: 03:c0:c3:ba:05:9c:94:c7:6c:7b:a5:13:c8:80:73:3e: 95:1e:08:ae:a1:8d:16:db:1a:b1:ed:76:e6:37:cc:d4: 53:3d:55:2e:15:58:3b:fc:5f:ec:8f:b0:4e:d8:04:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:53:44:4e:1a:c1:59:5d:1e:07:ec:81:63:d2:5a:a1: 1c:09:8c:db:13:46:7b:35:bf:9f:8d:41:6b:a0:f9:d8: 30:55:49:74:2a:27:48:e9:f1:94:4c:38:44:e6:0d:f9: 99:9b:8b:8a:d7:7b:0b:40:0a:7e:4a:20:2e:bc:3f:54: 37:3e:61:2d:72:77:66:84:62:8c:72:29:51:48:46:36: c2:e1:3e:c5:14:21:6a:0e:27:99:46:1f:23:c0:4e:f6: 65:88:b6:46:ad:b0:34:10:78:b5:15:23:04:5c:4c:2b: b4:7f:a3:20:24:45:24:7d:ea:6b:4b:4d:4d:85:72:48: 1e:c8:e3:72:79:5c:96:d3:5d:04:be:5a:e2:02:23:21: 06:c9:d6:03:29:5a:bc:94:9c:aa:19:1d:99:b3:43:a9: 8e:1a:7d:59:8b:cb:b4:1b:f9:99:f5:12:51:f3:2e:71: ba:0c:bd:c8:19:2b:ca:f5:78:e3:b6:c0:0d:98:3a:b1: 56:15:29:58:c8:3a:c5:aa:e2:9e:d4:cd:31:d5:1a:98: 32:6a:47:4c:69:0c:75:bd:74:81:95:d8:f8:e4:91:12: 8f:c8:ad:10:d2:40:cb:f3:b2:49:39:bb:a6:45:ab:ab: 72:fb:08:e0:33:20:18:9d:4a:5a:bb:8b:e0:9e:c5:b1 Fingerprint (SHA-256): 2D:25:D5:28:DC:DE:1A:B0:7F:D4:DC:0A:28:EE:C4:41:87:C4:09:3D:C7:34:65:83:EC:F8:47:7E:40:82:19:63 Fingerprint (SHA1): 56:30:CA:A1:BF:E0:E3:71:89:91:0C:72:B0:66:9C:57:19:C1:8C:DA Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3555: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #3556: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154109 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3557: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #3558: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #3559: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154110 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3560: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #3561: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #3562: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154111 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3563: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #3564: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #3565: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154112 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3566: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #3567: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #3568: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154113 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3569: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #3570: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #3571: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154114 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3572: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #3573: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #3574: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154115 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3575: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #3576: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #3577: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154116 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3578: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #3579: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #3580: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154117 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3581: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #3582: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #3583: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3584: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 425154118 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3585: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3586: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 425154119 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3587: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3588: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 425154120 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3589: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3590: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #3591: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #3592: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3593: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 425154121 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3594: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3595: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 425154122 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3596: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3597: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 425154123 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3598: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3599: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #3600: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #3601: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3602: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 425154124 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3603: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3604: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 425154125 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3605: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3606: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 425154126 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3607: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3608: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #3609: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #3610: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3611: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 425154127 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3612: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3613: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 425154128 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3614: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3615: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 425154129 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3616: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3617: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #3618: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3619: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3620: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 425154130 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3621: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3622: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3623: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3624: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154131 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3625: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3626: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154109 (0x1957563d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Apr 25 15:46:05 2016 Not After : Sun Apr 25 15:46:05 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:8b:0a:89:18:5f:96:da:cd:79:89:3a:1d:7b:d3:ba: 07:32:f5:a9:e6:35:f7:14:8e:ec:cd:fd:18:54:7b:f1: 7c:ff:a6:df:2b:3d:fc:7e:77:3f:54:5e:7d:e5:19:ce: be:94:c0:82:6d:06:09:15:12:dc:93:ad:50:ce:f8:f7: 6b:8f:54:36:4c:70:13:d6:e1:21:4a:e7:a8:94:56:88: 27:55:fa:ae:b6:e0:77:af:18:12:fa:63:62:d7:fe:da: fa:92:94:ce:87:66:84:fd:0f:88:94:b6:75:51:27:ef: 2c:87:a8:ca:22:2c:44:68:97:4f:00:7a:07:40:59:55: aa:c9:df:09:fd:e0:be:26:f7:87:14:e1:ed:0a:79:54: 0d:b3:58:4a:2e:36:d2:df:7a:69:7f:dc:a4:2d:3e:17: e5:86:0a:db:29:23:49:07:8b:d7:73:89:4c:fb:26:60: f1:fd:46:31:9e:36:f0:34:da:2b:db:34:f5:66:c3:74: cd:fe:ab:4a:9d:9e:07:a9:d7:eb:52:76:6a:2b:50:a8: 77:b4:48:4d:40:8a:f3:9e:fb:3d:d0:6b:b6:c7:8f:7f: 7a:7f:1b:a0:ff:f6:18:1d:69:61:5e:7a:bd:95:0e:49: c6:bc:63:99:5a:f0:96:09:c5:eb:46:78:67:3c:c6:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:e8:2b:55:1b:77:0f:f2:2e:29:4c:2a:c7:01:5f:14: 0f:f3:cb:74:31:7a:8b:d0:ff:c8:ba:2b:4e:a4:91:41: 37:1e:d7:2a:36:2d:6e:2d:9e:f2:d6:fd:ee:a6:71:56: 45:34:58:61:b2:48:df:11:1f:75:12:95:78:33:65:28: 44:74:59:65:21:b0:f4:22:30:fa:4e:e8:bb:7e:58:9a: 78:7d:4b:71:de:d8:ae:ef:10:59:0e:6c:51:1d:8e:4c: 93:08:20:8c:64:33:0d:8d:5a:07:8a:7f:dd:9c:5c:6d: 69:1c:7f:df:37:a1:e2:0b:25:df:9c:46:80:62:51:cd: 4d:ef:30:d2:05:40:49:e9:44:20:cc:35:27:38:8b:9a: 31:25:da:f9:88:22:fb:c7:f6:a4:36:b1:83:5d:87:04: 16:15:be:28:19:94:63:ea:9f:bb:75:3b:4f:af:7c:03: cd:e9:0c:83:41:57:29:ca:da:1f:dc:e8:58:35:17:f5: fa:24:1f:4c:8e:7c:3f:d8:9c:d4:51:6a:41:68:79:56: 1a:a7:71:7b:1b:d9:1c:0c:16:90:4a:9d:cc:af:2e:ce: c2:b4:33:86:7c:67:e3:00:fe:50:f9:25:e4:77:1b:1a: 0c:42:a4:22:89:50:9d:a3:93:e7:9f:1e:36:01:8a:eb Fingerprint (SHA-256): 5E:60:E9:6C:D6:71:7A:43:C3:94:C4:60:B5:D4:A0:46:F6:58:66:82:32:89:7E:13:19:8F:E9:F2:25:D6:68:2F Fingerprint (SHA1): B5:3A:6E:37:5B:63:C7:8C:57:E0:AB:5D:CD:D5:DB:15:19:60:04:07 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3627: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154110 (0x1957563e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Apr 25 15:46:15 2016 Not After : Sun Apr 25 15:46:15 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:c8:b5:da:52:7d:d8:73:1a:d4:91:1f:4e:21:da:83: eb:2e:e3:f4:d6:e7:7e:34:c0:d2:48:98:e3:6e:1e:67: 3d:4a:ea:1d:66:36:58:34:53:30:17:94:59:70:14:f7: 0a:1f:56:d5:2f:99:1e:57:a4:bc:2e:e9:2f:b6:f9:f1: 38:61:2b:53:27:e5:47:3c:99:a3:28:ab:8b:02:a4:4b: 21:4b:ff:b6:4b:e1:79:be:0f:da:ba:a4:d9:66:8b:46: df:71:b2:fc:88:c9:82:0d:1c:d7:41:7a:0d:8b:e1:66: 93:f4:b2:e1:11:d0:0f:5a:a5:c9:b7:76:97:d9:53:e3: 8a:6e:cb:28:c8:9f:dd:53:ac:4e:be:3e:c8:ac:d0:a3: 7b:ce:2c:c8:94:0f:e4:af:03:c8:25:3b:3f:94:85:4e: 8c:6e:90:f4:1b:d2:d8:6f:10:9c:d1:38:3d:a0:74:ec: bd:63:a2:23:6d:bf:40:da:3e:ee:cc:d5:20:31:1d:7f: 71:bf:49:4e:91:1e:cb:ba:25:65:b8:33:ba:10:53:6a: 80:c7:dd:34:ae:93:6c:d3:3e:43:31:e5:f6:53:bd:60: e0:e0:02:4c:57:8a:a8:87:7c:c0:72:1a:ea:7c:d1:40: 46:52:28:f9:3e:df:f0:89:e8:73:6e:01:80:2e:53:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:38:b8:fb:7a:d9:76:56:4e:d4:f6:8f:45:27:f9:f9: 80:aa:83:30:1b:e2:21:fc:bf:14:9a:54:67:2e:e2:55: 92:ae:b6:9e:6e:9a:ba:c9:c0:97:67:57:82:a8:e1:52: 33:ef:83:ca:14:c0:77:2b:38:c8:2b:43:d3:32:41:2e: 03:b4:db:32:8a:ea:a5:9f:4d:b8:08:0b:5f:3a:a8:06: f4:10:db:5d:22:bc:b6:eb:c6:4a:d6:bf:e3:d2:e8:ee: d4:73:7d:88:6f:99:4f:86:ca:58:6c:ed:ad:24:e4:24: a6:10:e8:2a:ca:ba:ce:76:ee:3b:69:95:38:55:99:a8: 03:b5:49:21:34:d2:84:3a:72:67:c7:d7:da:48:45:d8: 01:49:9d:7f:79:0b:a4:8b:34:6e:c3:14:6d:4b:48:c5: 4d:68:46:0a:c7:42:64:b4:aa:e7:60:82:c0:b3:13:30: 33:41:1c:eb:59:5d:6f:80:4c:48:a3:74:4d:74:bc:f5: e2:12:98:2e:7c:14:20:e1:3b:63:fb:e2:73:e4:9b:b8: 38:db:53:ba:4c:b5:00:b6:fd:56:9d:ae:cd:2b:18:35: a0:d7:36:43:da:63:04:7d:c3:82:34:a0:6d:7a:69:5f: 00:c2:d6:77:08:4d:9a:80:f7:79:e8:b7:5d:ab:6c:bb Fingerprint (SHA-256): 01:A8:CB:74:7E:E6:56:6A:B0:6C:97:C9:5C:C2:95:17:29:81:99:2D:BE:69:FE:E6:05:09:2B:63:07:BD:9D:81 Fingerprint (SHA1): 87:AE:C6:9F:25:3C:BC:37:CA:4D:E0:F7:2C:93:75:00:A7:BE:F2:5D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3628: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154111 (0x1957563f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Apr 25 15:46:41 2016 Not After : Sun Apr 25 15:46:41 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:db:09:bb:ec:11:54:92:e6:54:d3:d7:ab:34:6a:7f: 16:20:38:11:5f:ef:9e:35:d5:37:e7:9a:87:de:3b:5e: b7:e4:af:37:de:7e:3f:6e:de:2b:16:15:9e:10:03:26: a6:12:cf:42:6f:39:27:45:87:02:63:8b:2d:45:db:42: b9:d9:a3:73:d9:56:8b:ae:0c:5e:c9:f8:1c:f1:16:b4: 2d:1c:84:b4:65:2d:94:96:5d:20:cd:22:4c:d3:3d:e4: 1d:eb:3b:fc:57:0c:db:b9:48:3a:e4:54:59:fb:53:ca: a0:43:0c:89:66:4b:d2:e8:0f:d5:9b:00:cd:01:9f:46: 90:61:98:f8:b2:4c:4e:dd:5b:7f:6c:c8:b4:5a:65:d0: ca:1a:f9:d3:7b:f8:aa:cb:5f:6f:c8:31:f0:b5:c7:9c: 9a:93:e8:22:73:96:c0:b7:55:e7:dc:6b:cd:3c:07:76: 04:d5:56:65:63:8a:d3:1d:29:c5:32:0f:c6:e7:a6:66: 05:c6:3d:1d:96:6c:3e:96:72:22:63:f9:e3:b3:1f:5e: 90:19:d0:da:0c:d3:2c:a3:c2:77:44:18:5b:8e:9a:31: 3a:fe:de:9a:3c:8c:54:c0:5c:92:01:be:83:f7:f1:d6: 4b:25:83:3a:23:c0:81:15:37:57:80:f0:20:9b:e5:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:10:35:bc:cc:32:90:bd:0d:4a:ba:ee:6d:63:ea:89: 37:43:ac:c7:f1:ed:70:03:c4:b0:e4:48:7c:f3:06:3c: 55:54:54:5a:86:f8:a7:9f:33:d5:b5:eb:9e:c5:21:1f: 9d:a3:db:d4:f7:c6:c3:33:84:6c:19:dd:07:a2:76:fe: f1:1f:d9:d7:21:92:dc:65:83:d4:55:51:60:a9:c9:7a: 12:7d:38:87:31:e3:66:12:3f:55:3d:6e:66:c4:23:d0: 8e:77:91:2e:5e:38:db:1a:2a:e9:38:d7:5b:9e:db:ad: 08:4b:10:ce:3e:ad:e6:ce:51:04:15:b2:61:1f:32:06: b3:0a:92:e7:4d:57:78:31:e5:c8:95:b1:94:24:c6:96: 64:13:99:5e:bb:08:7f:d9:6d:c4:08:34:b1:a8:8f:97: db:c3:6d:b9:53:a3:10:bd:47:de:88:08:54:d2:40:14: 9d:ba:29:55:fc:9f:23:52:d5:ac:1f:a7:9c:26:df:ed: a0:af:a5:7a:8f:3b:cb:e6:57:f7:b6:f6:4c:a2:90:84: 1e:f0:7b:32:2e:a9:f3:a9:26:db:6f:97:87:c3:4c:d2: 95:f3:e7:ff:d2:7a:b1:1e:aa:85:45:85:13:06:c2:1f: 73:d9:2d:e2:04:46:4f:e0:4c:83:86:4d:a3:c6:e9:d8 Fingerprint (SHA-256): FC:F1:39:6B:FA:75:12:65:92:A4:A5:4C:1E:C9:2D:C6:66:60:F3:64:CD:CF:A9:65:EF:EB:E2:22:FC:AF:F6:20 Fingerprint (SHA1): A6:A0:E1:C0:7E:A2:9C:E9:AD:F3:F0:31:FC:24:6C:4B:89:AF:6C:51 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3629: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154112 (0x19575640) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Apr 25 15:46:58 2016 Not After : Sun Apr 25 15:46:58 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:d9:38:d3:ac:e2:20:1e:ca:2a:1b:65:76:49:75:33: 6b:6f:1e:43:d5:45:88:32:65:6c:f8:90:1a:09:d9:a4: a6:56:5f:c8:91:ec:13:3b:41:99:67:ee:64:b2:ce:a4: aa:93:33:50:b7:5b:aa:5f:07:b5:90:a0:e3:7d:5a:01: a4:d0:5a:3c:21:8a:62:c0:e2:89:f4:14:9f:ed:20:fe: 91:84:bf:24:2f:90:ea:69:90:59:1a:f2:0a:54:1e:05: 96:ca:3b:08:14:8c:fe:95:af:3f:2e:3c:7b:7c:f7:43: 69:9c:3a:ad:70:c0:d6:58:94:9f:79:34:b4:e4:5b:da: 3c:96:9c:0b:88:a0:c0:96:38:f9:7a:47:86:f4:8c:40: b5:9f:55:06:dc:52:2c:64:38:44:39:e5:20:06:ee:18: 63:70:8f:b6:15:d6:03:42:90:84:97:80:7c:db:00:08: 86:11:37:2d:77:e9:06:b5:4a:7d:9c:df:ba:ff:7a:50: 48:fa:28:66:64:a2:2c:6e:ff:d3:1b:7b:2f:fb:3c:af: 95:9b:01:5a:23:84:bf:1a:67:dd:9d:13:2a:a0:50:d6: 4e:d8:b1:f9:c5:1a:e2:d8:e2:4d:7b:3b:a6:5d:78:f5: f0:03:b0:ba:20:78:4c:3f:b5:92:ff:a0:e3:20:5e:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:04:28:64:44:d6:cb:bc:4a:38:1e:5c:00:50:28:53: 39:ae:4f:c7:f4:b2:ef:18:2a:ee:72:8b:10:bb:86:bb: f6:4e:0b:61:e7:19:36:bd:b7:88:1d:1a:b3:81:e0:21: 9c:ec:90:63:d9:a0:1e:9f:10:7c:bb:bd:5e:a3:35:8f: 0f:84:99:f5:10:6c:41:02:d9:33:d6:7b:33:a5:b1:44: 59:83:f0:8b:a5:60:1b:d9:fb:72:dd:76:11:e5:58:5e: c1:42:96:98:4b:c1:c7:df:bf:62:84:5e:79:c2:d7:f5: 73:11:ab:38:24:64:97:88:01:47:9c:b5:22:4c:eb:3c: 70:a3:1b:62:14:bc:fe:c1:3d:fd:1b:91:25:b7:5b:db: 1e:7f:a5:9e:5b:2d:89:49:6d:9c:01:0b:e8:1a:d7:87: f4:d4:5e:3f:4b:f8:54:f0:9f:d6:e9:7d:d1:59:8e:20: 81:13:4e:f1:b8:2f:b4:60:c5:75:21:46:c5:76:32:e4: 0d:15:11:4d:15:52:6c:96:c1:b8:49:ad:b7:38:36:b4: 36:61:4b:74:63:01:4a:59:03:38:cb:1f:a8:87:7d:55: 71:aa:09:72:b1:fd:54:02:02:77:d4:5a:65:37:d5:5a: 83:23:25:41:d5:a9:69:e8:be:94:20:52:25:a6:e5:5f Fingerprint (SHA-256): 06:9F:B2:E1:88:F4:4C:D8:F3:A7:20:04:AA:B2:C9:EC:0B:D4:49:A1:10:41:AC:82:1B:34:0B:7D:1B:C2:30:BE Fingerprint (SHA1): D1:4A:91:A9:AD:BA:10:62:01:FE:87:6A:B6:BB:AF:AE:58:F5:06:B5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3630: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154113 (0x19575641) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Apr 25 15:47:13 2016 Not After : Sun Apr 25 15:47:13 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:ec:95:9a:98:b4:39:7a:64:83:4f:29:3d:d0:a3:7a: 78:15:84:25:27:30:96:b4:91:ab:2e:3c:22:d1:76:ea: 97:22:50:c8:b0:49:13:b7:7e:56:aa:bb:4b:ed:65:d3: ef:dd:fd:66:a2:90:2a:b7:96:36:bd:11:af:27:88:94: bf:a3:9b:69:ea:47:ea:bb:2e:b7:6d:9a:6f:bf:70:9a: 4a:0d:4b:85:2e:66:90:09:e2:ef:a3:ba:8f:d3:30:f0: f9:9c:33:41:2c:e8:5d:11:e9:fb:de:4d:42:49:a0:b6: 59:88:5f:64:67:be:75:d6:08:3b:48:99:bb:8b:af:1f: fd:1f:7f:b6:3d:cb:16:45:6b:29:a6:a2:80:4a:7c:f3: 9b:41:db:94:ac:bd:00:3d:3c:42:f1:16:8a:01:99:7c: 64:d7:fd:a6:31:ff:dc:f7:52:f1:94:63:cd:7a:0d:c3: 67:cf:f3:d7:e6:68:39:5e:28:9b:72:5a:8a:75:98:32: 4a:7f:9a:c5:75:13:b5:9b:30:bd:d6:e7:ef:15:54:0c: 7c:8a:8d:ed:74:2d:ef:65:14:c9:71:94:97:bd:2f:a2: 4a:c9:ba:97:d3:d2:32:12:70:5f:1c:45:4f:0a:73:88: 8c:d7:be:ab:08:f9:5e:a9:83:ba:02:b5:3d:82:f1:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:e6:ac:d0:a6:e8:d6:14:d4:6b:0b:d8:4c:16:2a:5f: ce:eb:10:7e:86:9f:20:1a:cb:72:7e:7a:7c:2b:7a:0e: 41:31:c9:44:e6:77:c5:13:b4:91:84:94:b9:ba:f8:57: 36:2b:6c:2c:47:c6:44:3f:b3:f8:01:1d:29:7e:a2:6e: 0e:1f:2a:ae:91:9b:cc:c8:4c:8f:b0:ba:6c:43:ec:b6: ef:1d:dd:86:ef:63:a2:06:fb:ca:13:46:dc:6e:e1:fc: c3:75:21:76:68:16:ce:95:ba:f5:4a:2c:0f:98:97:c7: da:b0:9f:91:a8:8c:ec:d1:05:0a:ce:3c:33:12:ba:45: 8e:23:82:e2:20:0d:f4:97:b6:53:b8:85:f3:ba:3b:55: 0e:cc:72:28:44:ac:83:42:1c:db:f2:d0:df:09:04:10: bb:ba:c6:ea:a9:4b:e3:84:0b:94:26:ef:6c:be:50:6f: 70:97:34:0d:26:89:d4:5c:e1:df:77:06:62:e9:20:97: 9a:d5:e4:b4:78:fa:ea:c1:d5:cf:7d:b0:99:ed:ac:cf: 8d:cf:1f:1f:96:f7:a2:c6:20:40:d6:6e:71:ca:12:50: e5:22:7d:fc:61:5e:e2:9c:d5:ea:ae:8c:d5:7a:b3:54: b4:02:0b:5f:18:c5:79:53:66:d9:00:f2:6a:3f:c4:c1 Fingerprint (SHA-256): 8C:3F:5F:3C:ED:A6:EB:8F:DD:51:8A:8F:00:FE:ED:C0:55:DA:69:5D:20:C6:2F:F7:B5:6C:E9:3C:1F:25:30:88 Fingerprint (SHA1): 29:37:17:0C:6B:48:04:B7:9C:41:E4:C4:43:3B:95:07:08:A7:B1:54 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3631: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154114 (0x19575642) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Apr 25 15:47:18 2016 Not After : Sun Apr 25 15:47:18 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:a9:bf:69:7e:78:d8:2e:c8:73:11:e0:a3:b3:1a:c3: 7a:cb:ec:d1:11:20:3a:39:51:d0:10:8a:86:fb:62:87: 47:92:c4:74:1b:64:6e:a4:63:4b:88:8a:eb:35:4f:14: 74:59:36:2f:94:2a:7a:9e:66:12:ac:ac:48:8c:8c:62: 51:e5:2c:41:26:3e:1a:7a:e8:97:22:8f:c5:c9:14:a9: 79:bb:84:50:bf:60:de:78:d3:17:99:4a:59:3c:5c:82: ae:5a:09:65:48:07:cb:32:ed:14:33:cc:66:57:3d:1c: 5e:e1:32:e3:a9:ed:78:d6:18:fd:e4:c2:c9:19:07:43: d6:36:e1:ce:c8:a7:37:4b:99:3c:75:d5:4d:cc:13:0e: 2f:9e:fc:2e:86:90:9b:c3:9c:82:f9:96:3c:f9:dd:81: dd:2f:7b:29:1e:b4:08:e0:16:71:1e:76:df:57:e0:56: 2e:18:b5:9d:6f:2b:5b:58:98:2a:2b:be:ef:99:8f:b7: a7:b9:8f:91:9f:1f:8d:a6:30:73:5f:f6:f9:0f:c3:b8: 6c:5d:7d:46:c1:39:6d:42:5e:0d:22:6f:ea:e8:e5:6a: 3b:ec:5a:02:3f:a7:22:21:18:3e:0f:ec:ba:0a:ba:ec: 54:7f:62:3d:7e:96:0d:53:87:b2:ac:dd:ac:d9:42:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:43:5d:2e:84:15:50:72:88:ab:69:d2:76:cb:21:ef: 8d:d8:62:5c:a1:d6:af:97:25:3f:c4:52:55:68:f0:41: e6:8f:dd:1f:97:9b:40:c2:88:9f:6f:b8:d3:09:2d:70: ed:bc:0f:82:b5:dc:b0:d8:c4:b6:fb:df:4d:c2:1e:58: 03:ad:d2:91:88:77:6d:d4:fd:e3:cc:65:d1:e8:ba:54: e2:1c:b7:c7:39:a9:f9:a3:0f:39:71:96:61:c9:19:2f: cd:34:53:88:1c:a1:b4:be:28:d8:7a:60:47:3d:04:c1: 01:5d:c9:67:9c:8a:49:79:8f:4e:b7:a0:13:4f:88:7f: 4f:22:b1:2b:a9:76:b5:90:98:02:2a:3c:d1:16:89:20: cb:e6:65:55:9c:66:7f:8c:7c:ae:d2:a4:cb:8d:51:fd: ca:14:83:ca:a5:bc:7e:c0:6f:48:75:40:2c:67:99:b9: 53:dc:2b:ce:3c:0c:72:c7:58:7b:b3:06:66:b2:98:b2: 12:87:51:68:dc:ee:c4:34:7a:e7:3b:12:81:7a:b3:ef: 0a:a1:8a:1c:38:60:77:f8:b4:46:e5:e0:0d:99:2c:87: ae:0c:db:db:1c:14:b6:f0:98:7c:02:03:4c:b3:f5:4e: 31:73:0d:89:5d:0b:ad:40:a4:af:14:a9:ca:a7:f7:fd Fingerprint (SHA-256): 7B:73:D9:46:92:B4:85:AE:54:F9:E1:39:C0:62:A1:C9:75:84:A7:35:BA:29:EE:C0:70:95:E3:B4:9F:27:1E:EB Fingerprint (SHA1): C4:85:E8:1A:6D:38:0B:3F:8E:4B:6B:12:AC:AF:50:0A:53:D0:41:1E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3632: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154115 (0x19575643) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Apr 25 15:47:31 2016 Not After : Sun Apr 25 15:47:31 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:05:a6:35:9b:29:0c:b2:42:25:5e:72:32:ee:be:1d: c4:7e:ad:64:87:44:7b:df:e9:89:40:99:2f:b3:ab:74: a3:c3:72:5e:70:63:a2:7a:96:4c:00:3e:28:37:f6:2d: 8f:63:2c:b9:93:28:4e:86:58:0a:42:dd:1a:da:f8:36: 9c:a7:55:e9:c7:f9:f6:6a:d8:48:22:0c:b3:33:f5:6c: 12:8d:40:de:32:33:ff:98:fe:78:43:fc:6b:cc:d7:3b: 7e:49:e0:aa:3d:97:bc:e4:6c:ed:32:4f:0d:bd:2f:77: 93:ee:2b:a6:6e:10:d8:ac:73:f0:7b:9e:2e:db:50:5c: 98:e0:86:8b:99:8c:eb:9e:8c:2f:13:8f:ce:16:9c:cd: 65:f9:fe:a4:0c:82:f3:9a:40:94:3c:47:2d:93:ae:e8: 0d:40:5f:88:c1:07:29:cd:13:23:f2:28:2b:4a:1a:fb: 93:d6:00:6b:f8:ce:44:c2:14:6e:08:66:91:96:5f:d3: 6b:ce:8b:18:ed:8c:4a:39:b0:d5:02:b7:0d:0c:4c:b9: 1c:ff:7c:8f:ec:e6:41:80:d6:89:7e:9e:02:6a:3d:2f: b6:10:b3:5b:47:87:f2:d5:27:8a:fa:a5:b8:16:ae:34: 82:fd:36:e0:f5:5f:8d:e5:60:c4:a5:a7:02:ec:5f:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:c6:46:71:9f:2c:9b:4f:fb:63:60:a0:fd:94:ca:ab: 9c:98:8a:7b:35:af:0c:11:7b:91:fc:b5:cc:43:c9:82: 90:97:14:7a:bc:d2:1b:f3:cd:d2:18:29:09:5a:4b:cf: cf:c7:62:37:ae:45:1a:14:31:c1:26:4d:30:de:4a:83: 8f:00:c3:37:49:ba:49:5a:c2:00:70:c7:c8:dc:eb:83: dc:7d:26:6c:dd:f9:64:bf:3b:3c:fe:16:04:14:48:e0: fb:f8:2b:77:a1:d9:32:59:b6:1a:1a:e9:6d:55:67:a0: dd:08:b1:bc:16:04:61:a1:bf:1b:6a:30:8a:69:5e:fa: e5:05:fa:ab:f0:b7:5d:18:74:9d:90:87:c4:ea:24:a8: da:c0:82:73:4f:d4:bf:58:c7:5d:4d:ba:8e:a5:cf:2c: 96:0e:72:01:23:60:42:83:7d:3a:b1:9f:1b:02:96:18: 97:03:c1:d3:c3:53:13:53:4b:c9:34:cf:0f:81:2a:8d: a7:17:bc:86:4b:f7:61:52:e5:91:7c:b9:dc:a4:03:f5: bb:e6:b1:70:a9:fb:ca:42:d9:f3:36:15:54:0a:cb:48: c6:6a:6e:90:d3:84:87:b2:4f:70:9f:e4:03:44:c5:dc: cf:39:af:25:e8:63:90:dd:2c:d4:5c:3d:48:3f:40:1e Fingerprint (SHA-256): E7:79:CC:1D:81:DF:55:C2:D3:61:43:9A:32:5C:90:43:3B:15:92:14:7D:1D:D4:C1:BF:61:46:0B:45:FA:16:8D Fingerprint (SHA1): DE:03:F6:CA:35:8E:6F:CC:DD:C7:53:86:94:6E:86:73:F9:ED:42:ED Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3633: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154116 (0x19575644) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Apr 25 15:47:42 2016 Not After : Sun Apr 25 15:47:42 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:63:a4:53:df:2d:b9:81:bb:8f:6f:99:f1:3b:8d:ea: a2:2d:39:79:65:ae:fa:aa:57:fe:b6:fc:57:b2:32:d8: 4f:49:1e:87:6b:60:e5:66:55:e2:91:b3:37:17:67:27: a0:c2:50:82:3f:60:9f:99:6d:12:32:84:ff:92:e8:bf: 89:73:70:e5:72:e0:85:03:80:1d:a2:6c:7f:23:05:cd: d9:39:2b:cd:78:a9:65:2f:70:1f:df:54:9c:e5:38:e8: ef:79:2d:68:ad:70:a9:92:b3:38:4d:2b:de:60:95:e4: 94:0c:b4:1d:d1:39:4f:35:d9:16:49:c6:0f:cf:6a:db: 10:cd:33:72:cb:78:9f:52:ef:16:d7:8a:d5:c4:c4:e5: 32:72:8a:40:af:e1:49:3f:c9:0e:b7:aa:c3:4b:1c:87: 5c:78:28:e5:2e:33:df:9f:14:49:78:38:d2:43:36:45: fb:90:a6:65:e1:8c:15:dc:f3:dc:f0:ec:ea:42:b6:12: 17:92:b0:e5:2c:16:13:b8:2f:27:1b:61:29:d9:f5:0e: cb:d1:54:d1:4c:77:c3:17:31:12:33:ad:b7:6b:2d:f9: a5:8a:4c:1e:da:76:7f:57:d8:1e:a6:3f:41:da:0a:c8: ef:bb:1d:09:04:e7:de:00:48:2c:69:bb:6b:c4:2f:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:2b:45:10:32:d5:d9:21:5c:34:44:32:69:79:11:7b: 3a:19:7f:fb:1a:cc:81:69:40:a1:ad:7f:4e:1e:95:b6: d1:18:02:6b:e7:0e:d8:16:11:c5:7f:1f:84:23:eb:47: 72:b0:3c:79:67:a4:2e:4d:e6:54:4e:44:f2:d4:a3:b3: 92:d8:3b:b3:ed:61:98:2e:5a:f4:1b:20:14:0d:80:77: 34:43:a6:53:51:55:7f:df:75:cf:d0:2d:6c:15:98:be: 0d:a7:25:1f:11:f1:e1:3e:2e:be:93:ee:df:fb:f8:94: 8b:14:f6:7d:1f:3a:fb:c5:47:b7:db:ea:0c:23:84:e5: cd:ac:11:f9:a5:86:b0:4c:40:c5:ba:fd:ee:c1:ad:31: cd:ad:ab:c2:53:67:42:a6:cc:a5:f0:d9:f4:cb:dc:1b: 97:f1:74:99:e0:42:2a:6c:7c:c0:e4:ec:f4:fc:12:f7: 4b:b7:14:2a:e8:4a:93:d9:02:64:42:e8:d1:4e:87:5f: 35:f3:5d:4b:d9:58:9d:bf:0e:20:23:c0:fa:fe:c1:b3: e0:53:93:be:46:d2:a8:32:a9:86:9a:00:50:2c:15:33: 84:48:2a:6f:af:31:cb:2b:9f:31:01:38:b1:ed:c3:b3: aa:e7:14:00:9e:23:02:26:a4:79:2e:ac:47:89:75:f1 Fingerprint (SHA-256): 8A:27:C5:8B:56:EE:9C:97:CF:82:C9:B4:28:EC:5C:F4:A2:B5:0A:ED:37:F2:EA:22:8E:D4:7E:72:FF:65:1B:80 Fingerprint (SHA1): 9D:0C:1E:CB:97:70:D4:FC:2C:DF:5D:F9:2D:8F:2E:29:DA:25:7F:1C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3634: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154117 (0x19575645) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Apr 25 15:48:01 2016 Not After : Sun Apr 25 15:48:01 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:83:ad:af:73:fa:10:4a:fc:1f:b1:0d:44:6f:d9:8e: 80:1c:b6:2a:f7:35:89:b5:2d:46:8b:e6:c4:76:f0:96: ec:5e:5a:ca:64:50:fa:96:7f:40:97:19:26:9f:dd:03: 87:5b:c1:cd:c3:cf:7f:94:26:eb:a6:1c:8d:af:26:4a: f2:c5:b0:73:ce:2f:b6:8a:75:af:22:b5:73:2d:4b:0f: 25:f4:34:d0:c4:39:ec:60:02:67:c2:f9:14:e9:c7:76: ff:f8:01:30:0e:67:0a:a3:3a:7f:3b:92:69:17:71:a1: 99:12:88:f8:b5:8a:f7:43:e0:1c:02:c6:41:c0:03:c1: d3:93:e6:f6:d6:21:14:12:a9:f8:44:bd:f9:11:ac:4b: 8e:9d:11:31:af:88:4e:af:96:f8:34:28:85:47:db:dc: 17:92:fa:97:88:92:64:50:90:1f:54:e4:d1:3f:f8:19: 9e:11:2d:46:5f:fc:f8:41:37:74:fa:2b:a6:c6:06:de: 32:f7:6e:c9:6f:b9:72:8d:a5:dc:dd:7e:da:ec:88:23: 9d:30:03:b5:6c:34:ed:5d:66:4a:6a:7b:54:1b:8d:cc: 4d:61:ac:56:d1:26:8e:ae:b8:0d:dd:cb:8f:b7:90:d8: 04:71:52:b9:1f:a3:fe:4b:3b:5b:91:07:bc:ae:89:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:ac:7b:6c:79:5c:be:f1:a1:65:ac:31:1f:d5:da:49: 40:b4:4f:14:6c:07:8a:70:d4:69:0a:ec:cf:93:0f:b5: 0e:22:5a:8a:14:a5:c5:b0:f0:49:cb:fa:88:d4:64:68: 27:63:b7:81:6a:2c:b3:f7:41:e0:33:df:51:f8:9f:dc: fd:7d:2b:ac:52:9d:cd:c6:cf:c5:7a:54:02:29:a4:72: 25:29:33:e5:d1:04:2d:d9:0c:8c:6c:b8:41:04:1d:ee: cb:4e:e1:46:00:91:2d:fa:eb:9c:05:be:2b:67:c8:f2: 3d:8a:69:e4:9b:a5:a2:1e:29:1e:96:61:ef:16:aa:5a: 40:13:33:cc:f5:47:f0:a4:fd:36:66:f0:55:47:6e:4a: 80:47:d0:c9:45:e6:27:4b:cc:31:03:36:76:36:95:de: 88:aa:c8:20:b3:43:60:87:30:31:74:ea:bb:1d:ac:32: 49:06:b1:f7:11:98:61:11:94:0b:13:30:54:c1:fa:05: 09:0d:6d:3e:77:c1:5b:a4:bb:88:31:29:fa:c4:fd:15: 0d:33:3d:24:94:0c:14:04:e3:67:66:4f:52:f7:9c:dc: 1f:ba:9d:da:59:23:f5:31:13:c1:a6:79:44:e1:59:93: e9:ee:98:d1:ca:65:f3:f3:2c:a0:f5:6f:72:5c:7c:c8 Fingerprint (SHA-256): C5:36:78:4A:9F:DF:D5:83:3F:E1:9E:78:E1:B5:9B:7D:77:5C:7C:68:E6:41:33:B7:14:F5:BD:64:FC:B6:3A:9F Fingerprint (SHA1): B7:0F:AD:B6:19:39:23:F7:03:7D:E5:B9:00:9A:1C:65:E1:97:A0:DA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3635: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3636: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154132 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3637: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3638: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3639: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3640: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154133 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3641: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3642: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3643: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3644: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154134 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3645: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3646: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3647: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3648: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425154135 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3649: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3650: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3651: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154132 (0x19575654) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:50:07 2016 Not After : Sun Apr 25 15:50:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:40:cd:25:dd:d7:d3:b7:ed:f6:7f:84:2f:99:08:c8: f1:d3:79:95:c0:5f:fb:dc:72:4b:a6:75:e3:d7:db:78: 5a:8b:43:66:98:da:62:2f:39:26:ef:20:f8:99:3c:c4: e2:82:7d:e0:89:41:d7:81:d3:a6:6b:ef:fe:d0:05:9d: 91:1f:63:b2:7b:a2:f9:05:77:95:ce:a2:34:e7:51:8c: 91:08:9a:b0:f2:bb:49:5c:f0:60:7c:86:60:6b:52:9d: 2e:f5:fb:81:1d:bd:f3:f2:f9:54:0f:cf:25:6a:3a:e0: 8a:5b:e8:53:bf:96:c4:6c:bb:06:9f:64:b9:cc:fd:c6: 48:42:60:78:11:dc:1c:a2:28:97:45:4f:52:e7:fa:49: ef:f0:ac:e8:1b:23:34:0f:e0:18:83:48:82:a7:f9:b3: 4c:12:dd:de:cc:c8:1c:75:07:07:71:c8:8d:82:6b:e5: bb:5d:3d:5c:40:78:bd:33:2d:3d:d2:8e:48:79:c5:c2: a2:f1:c3:b1:2b:63:8e:ae:ca:5f:07:74:25:a1:7b:78: 04:28:34:84:d8:23:b0:8d:22:cb:cb:95:b7:ee:c6:45: 50:4d:63:d0:f8:cc:0c:ea:48:20:fa:bc:b9:29:9d:e5: 4d:70:99:12:d7:f4:23:d4:90:30:f2:74:85:37:e2:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:67:d5:6a:83:bc:81:e6:c8:8c:2b:fe:0a:2c:e4:18: 71:d1:35:85:c6:33:78:21:20:18:4d:d4:0f:6d:8c:2e: e0:0f:3b:a6:ca:b6:73:7c:52:ab:d7:d1:8b:26:04:0c: 53:45:3d:14:19:0f:36:80:9a:49:ea:1d:72:3f:af:3f: 7d:c0:d5:be:29:19:38:ba:1e:99:f5:e0:ff:16:07:0e: e6:0c:bf:28:b0:e2:d7:13:76:74:04:49:6e:0e:c9:69: d9:ea:c3:59:ae:86:74:4e:03:94:fb:bc:6a:6d:7f:28: 2b:97:66:4a:14:c5:1c:2b:9b:a4:62:e0:1e:df:7c:e2: 3f:aa:9d:6e:3b:cd:85:6f:67:8f:e6:f0:f4:98:61:06: 15:8c:8d:c8:f3:90:18:67:e5:bc:5d:3f:88:8e:f4:f3: 3f:e7:72:42:0a:fa:f4:13:88:86:fc:7d:9c:e2:9a:0e: b5:3b:8d:83:51:41:6e:b1:37:49:7b:e6:e8:7d:4d:6b: 90:1d:50:e7:00:be:a9:27:1b:34:57:7c:15:0c:60:d4: a9:6a:7e:ad:a9:57:fe:cf:95:de:5e:c8:20:d9:50:e1: 2d:88:8d:51:7f:8e:72:65:e8:7b:84:88:3c:25:f0:fc: a4:9e:d7:a4:a9:53:b3:f6:b5:61:9c:fc:c1:8f:21:ab Fingerprint (SHA-256): B7:43:4B:A0:F0:54:90:F0:46:73:D3:94:C6:17:77:EE:6C:15:EE:F0:EA:2C:BE:1D:F5:3D:15:51:E7:78:A7:22 Fingerprint (SHA1): C0:1B:5D:59:89:CB:07:13:67:45:95:B0:DB:4C:42:0A:3E:6B:36:41 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3652: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3653: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154133 (0x19575655) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:50:13 2016 Not After : Sun Apr 25 15:50:13 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:78:ce:45:4d:84:a6:ea:24:4e:20:48:e5:bf:f4:8c: db:ef:57:08:28:51:be:1a:04:6a:55:07:c2:e6:17:9f: 93:06:da:f3:b0:be:55:e5:fa:56:26:4a:5c:17:35:40: 69:7f:5f:18:5d:de:32:b3:8c:cb:07:a0:15:13:9c:72: 81:6c:2f:81:b2:04:58:d6:cd:c8:9a:e6:16:48:a0:77: c5:43:21:db:fb:dd:24:d7:fe:2d:95:38:93:88:38:54: a2:ed:f2:da:3a:d6:a0:d8:ea:cd:45:b2:9d:59:8b:86: 96:5e:90:77:03:72:9e:9a:ef:6a:35:6b:fc:81:b5:80: 62:b6:28:ef:c0:e5:51:f9:cb:6e:31:15:96:df:1c:cc: a5:a7:c2:a0:31:92:ee:3e:7b:4b:05:e3:3f:0d:59:a4: 95:e3:7f:a4:4b:c1:db:f5:7a:93:3b:f5:50:21:f0:e2: 3c:dd:1a:a7:ef:d6:a2:fb:86:5d:7e:9a:b7:3c:93:99: 79:2c:4e:6f:38:71:66:76:e7:8e:52:97:30:e4:0d:04: c3:36:ff:6f:a7:47:20:a5:05:5b:ba:9e:3e:72:a1:32: 06:0c:8e:7c:cf:15:88:64:a0:1f:da:7f:c3:05:f3:4b: a3:ea:45:c4:fc:96:5d:57:03:4f:18:8d:c0:d7:f3:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:6a:a8:68:82:1e:f8:63:6c:5b:d9:a6:0b:c3:5b:dd: 8b:e0:05:8b:73:a1:9b:68:23:2e:1f:8d:5c:63:15:5a: b9:c3:a2:4f:fc:bd:56:66:c1:35:ea:cb:3e:be:d8:d6: a1:d2:64:56:48:77:e7:ac:6c:c7:97:19:cf:bb:de:27: 5c:23:0c:9a:5b:2f:27:6e:11:ed:fb:37:a6:f4:46:b5: 94:63:7e:c0:c8:c6:9e:18:b2:57:d3:5f:d8:7a:89:d6: 5d:cf:3e:50:b2:4f:f1:ce:95:64:8a:f4:4d:48:3f:f7: 53:58:22:45:0a:2a:30:b5:9a:0a:8f:9f:7f:3b:cd:97: f3:38:b1:eb:25:c3:db:e2:e6:32:cf:c2:9d:41:22:2c: 47:72:8c:c8:88:1b:50:90:94:57:f4:1c:d4:80:46:91: de:e0:0b:e6:34:b5:39:90:84:aa:37:c7:c8:9f:04:0c: 3b:e8:85:ae:9d:25:67:fa:98:97:89:f5:fd:38:2a:f3: 51:c6:e4:b7:6c:1f:1c:1e:da:1f:d0:1b:e9:11:b1:45: b7:da:e0:7b:80:91:c8:53:76:d3:1c:86:3d:57:ab:fc: c4:01:a8:0d:0e:bd:e5:bd:0f:91:af:6b:65:98:e2:70: 30:26:24:9b:f1:81:f0:63:54:7c:81:63:dc:cb:de:94 Fingerprint (SHA-256): 9A:CE:19:C8:62:78:4D:D5:8E:3C:3A:CF:4A:B9:03:42:39:B1:49:29:8D:CD:31:93:9F:FB:DC:F3:BB:37:A6:7E Fingerprint (SHA1): 50:2A:73:49:42:2C:77:33:BC:8A:8A:00:B3:F5:FD:D0:27:3A:15:44 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3654: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3655: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154134 (0x19575656) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 15:50:21 2016 Not After : Sun Apr 25 15:50:21 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:c2:7f:a4:cf:ab:aa:83:9c:32:d1:e9:18:d3:d9:28: 76:e2:2c:5b:08:b5:ee:47:67:cc:69:16:b0:27:fd:06: 59:c3:26:ce:3d:a3:57:24:aa:b8:d5:0b:b0:d2:4b:e6: 49:f0:b9:82:c9:10:56:66:12:23:4e:07:d7:2a:b2:b6: c3:d9:85:81:96:f4:d2:15:91:0d:7c:72:3c:37:73:b1: bc:6b:dd:6e:32:77:c3:20:96:83:ec:32:b5:88:6d:1f: c1:fd:de:66:95:a7:60:26:11:a5:81:b0:52:b2:9a:e6: 08:02:fb:a1:f7:29:42:87:b6:5b:d2:a3:97:7a:d2:31: a8:6f:23:eb:47:dc:56:7c:d2:09:ca:ec:84:9d:86:04: a6:1f:8e:dc:13:a4:ea:5e:ea:a0:da:0b:4b:b7:54:47: 8c:42:f9:6a:26:08:ac:e3:c4:79:7a:25:bc:47:32:87: 62:b4:29:6d:de:0f:1c:2e:6e:76:3e:48:cd:c7:64:20: 85:fc:ac:4f:0b:be:b6:d4:ad:0f:a6:b1:38:b3:b2:df: a0:a7:e3:a2:ce:53:4b:33:34:d6:da:66:9c:dd:ff:ed: a1:39:af:9d:7c:d8:3f:f5:e6:57:49:cf:38:c7:bc:5b: a3:93:5f:74:57:e3:9a:43:1d:52:f2:1f:c1:ed:ba:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:da:46:b0:cf:c5:d8:15:3d:ff:b4:56:7a:a9:a6:45: df:82:39:fd:dc:bb:7a:94:8f:09:6e:e6:45:be:eb:fb: 0c:41:10:fd:78:cc:c1:7c:17:71:33:3e:ab:c2:bc:1a: 6d:46:4b:23:0f:a6:75:6b:7b:cf:17:9f:ec:3b:df:97: 54:61:d2:e8:99:26:25:c9:10:6b:06:73:91:8c:f3:3c: 05:e9:4f:6e:f0:38:23:14:e5:ef:89:41:ae:cd:1c:29: 79:0d:d1:25:4d:aa:97:2c:6d:cb:67:e6:b9:ed:27:c9: eb:c1:b6:8d:aa:ff:b4:9a:35:69:1c:91:04:a4:3a:5b: 32:13:08:1f:69:cc:b9:55:12:9e:b8:e5:6b:55:1b:d0: f5:11:ad:9c:41:44:f8:a6:98:d4:c9:35:b2:a1:f5:79: 20:5b:34:68:0b:39:7c:6d:ef:c6:8e:c1:fb:c9:bf:07: e8:58:91:b6:dc:8a:a6:ce:60:9c:e9:98:37:f8:30:80: 6d:0f:9c:3f:1e:e5:dc:6b:7f:72:f9:07:40:b0:75:0e: fa:93:c8:d4:52:9e:58:1f:a2:15:e2:20:4c:09:9f:e1: 57:83:6c:31:81:79:65:70:64:45:7b:37:f1:c3:4a:39: 3e:bf:f0:8c:4e:4b:83:5b:0b:c8:d6:d1:2f:c9:82:89 Fingerprint (SHA-256): 98:F0:49:2B:DD:65:91:10:3F:8B:A1:C4:A2:8C:6E:E8:11:BC:2B:05:BD:BA:33:7F:7D:FA:43:E1:89:E7:2E:97 Fingerprint (SHA1): 45:49:03:A6:A6:3D:90:EC:65:52:28:F7:87:7A:CA:59:EB:B5:70:72 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3656: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3657: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3658: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3659: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3660: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154132 (0x19575654) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:50:07 2016 Not After : Sun Apr 25 15:50:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:40:cd:25:dd:d7:d3:b7:ed:f6:7f:84:2f:99:08:c8: f1:d3:79:95:c0:5f:fb:dc:72:4b:a6:75:e3:d7:db:78: 5a:8b:43:66:98:da:62:2f:39:26:ef:20:f8:99:3c:c4: e2:82:7d:e0:89:41:d7:81:d3:a6:6b:ef:fe:d0:05:9d: 91:1f:63:b2:7b:a2:f9:05:77:95:ce:a2:34:e7:51:8c: 91:08:9a:b0:f2:bb:49:5c:f0:60:7c:86:60:6b:52:9d: 2e:f5:fb:81:1d:bd:f3:f2:f9:54:0f:cf:25:6a:3a:e0: 8a:5b:e8:53:bf:96:c4:6c:bb:06:9f:64:b9:cc:fd:c6: 48:42:60:78:11:dc:1c:a2:28:97:45:4f:52:e7:fa:49: ef:f0:ac:e8:1b:23:34:0f:e0:18:83:48:82:a7:f9:b3: 4c:12:dd:de:cc:c8:1c:75:07:07:71:c8:8d:82:6b:e5: bb:5d:3d:5c:40:78:bd:33:2d:3d:d2:8e:48:79:c5:c2: a2:f1:c3:b1:2b:63:8e:ae:ca:5f:07:74:25:a1:7b:78: 04:28:34:84:d8:23:b0:8d:22:cb:cb:95:b7:ee:c6:45: 50:4d:63:d0:f8:cc:0c:ea:48:20:fa:bc:b9:29:9d:e5: 4d:70:99:12:d7:f4:23:d4:90:30:f2:74:85:37:e2:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:67:d5:6a:83:bc:81:e6:c8:8c:2b:fe:0a:2c:e4:18: 71:d1:35:85:c6:33:78:21:20:18:4d:d4:0f:6d:8c:2e: e0:0f:3b:a6:ca:b6:73:7c:52:ab:d7:d1:8b:26:04:0c: 53:45:3d:14:19:0f:36:80:9a:49:ea:1d:72:3f:af:3f: 7d:c0:d5:be:29:19:38:ba:1e:99:f5:e0:ff:16:07:0e: e6:0c:bf:28:b0:e2:d7:13:76:74:04:49:6e:0e:c9:69: d9:ea:c3:59:ae:86:74:4e:03:94:fb:bc:6a:6d:7f:28: 2b:97:66:4a:14:c5:1c:2b:9b:a4:62:e0:1e:df:7c:e2: 3f:aa:9d:6e:3b:cd:85:6f:67:8f:e6:f0:f4:98:61:06: 15:8c:8d:c8:f3:90:18:67:e5:bc:5d:3f:88:8e:f4:f3: 3f:e7:72:42:0a:fa:f4:13:88:86:fc:7d:9c:e2:9a:0e: b5:3b:8d:83:51:41:6e:b1:37:49:7b:e6:e8:7d:4d:6b: 90:1d:50:e7:00:be:a9:27:1b:34:57:7c:15:0c:60:d4: a9:6a:7e:ad:a9:57:fe:cf:95:de:5e:c8:20:d9:50:e1: 2d:88:8d:51:7f:8e:72:65:e8:7b:84:88:3c:25:f0:fc: a4:9e:d7:a4:a9:53:b3:f6:b5:61:9c:fc:c1:8f:21:ab Fingerprint (SHA-256): B7:43:4B:A0:F0:54:90:F0:46:73:D3:94:C6:17:77:EE:6C:15:EE:F0:EA:2C:BE:1D:F5:3D:15:51:E7:78:A7:22 Fingerprint (SHA1): C0:1B:5D:59:89:CB:07:13:67:45:95:B0:DB:4C:42:0A:3E:6B:36:41 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3661: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3662: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154133 (0x19575655) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:50:13 2016 Not After : Sun Apr 25 15:50:13 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:78:ce:45:4d:84:a6:ea:24:4e:20:48:e5:bf:f4:8c: db:ef:57:08:28:51:be:1a:04:6a:55:07:c2:e6:17:9f: 93:06:da:f3:b0:be:55:e5:fa:56:26:4a:5c:17:35:40: 69:7f:5f:18:5d:de:32:b3:8c:cb:07:a0:15:13:9c:72: 81:6c:2f:81:b2:04:58:d6:cd:c8:9a:e6:16:48:a0:77: c5:43:21:db:fb:dd:24:d7:fe:2d:95:38:93:88:38:54: a2:ed:f2:da:3a:d6:a0:d8:ea:cd:45:b2:9d:59:8b:86: 96:5e:90:77:03:72:9e:9a:ef:6a:35:6b:fc:81:b5:80: 62:b6:28:ef:c0:e5:51:f9:cb:6e:31:15:96:df:1c:cc: a5:a7:c2:a0:31:92:ee:3e:7b:4b:05:e3:3f:0d:59:a4: 95:e3:7f:a4:4b:c1:db:f5:7a:93:3b:f5:50:21:f0:e2: 3c:dd:1a:a7:ef:d6:a2:fb:86:5d:7e:9a:b7:3c:93:99: 79:2c:4e:6f:38:71:66:76:e7:8e:52:97:30:e4:0d:04: c3:36:ff:6f:a7:47:20:a5:05:5b:ba:9e:3e:72:a1:32: 06:0c:8e:7c:cf:15:88:64:a0:1f:da:7f:c3:05:f3:4b: a3:ea:45:c4:fc:96:5d:57:03:4f:18:8d:c0:d7:f3:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:6a:a8:68:82:1e:f8:63:6c:5b:d9:a6:0b:c3:5b:dd: 8b:e0:05:8b:73:a1:9b:68:23:2e:1f:8d:5c:63:15:5a: b9:c3:a2:4f:fc:bd:56:66:c1:35:ea:cb:3e:be:d8:d6: a1:d2:64:56:48:77:e7:ac:6c:c7:97:19:cf:bb:de:27: 5c:23:0c:9a:5b:2f:27:6e:11:ed:fb:37:a6:f4:46:b5: 94:63:7e:c0:c8:c6:9e:18:b2:57:d3:5f:d8:7a:89:d6: 5d:cf:3e:50:b2:4f:f1:ce:95:64:8a:f4:4d:48:3f:f7: 53:58:22:45:0a:2a:30:b5:9a:0a:8f:9f:7f:3b:cd:97: f3:38:b1:eb:25:c3:db:e2:e6:32:cf:c2:9d:41:22:2c: 47:72:8c:c8:88:1b:50:90:94:57:f4:1c:d4:80:46:91: de:e0:0b:e6:34:b5:39:90:84:aa:37:c7:c8:9f:04:0c: 3b:e8:85:ae:9d:25:67:fa:98:97:89:f5:fd:38:2a:f3: 51:c6:e4:b7:6c:1f:1c:1e:da:1f:d0:1b:e9:11:b1:45: b7:da:e0:7b:80:91:c8:53:76:d3:1c:86:3d:57:ab:fc: c4:01:a8:0d:0e:bd:e5:bd:0f:91:af:6b:65:98:e2:70: 30:26:24:9b:f1:81:f0:63:54:7c:81:63:dc:cb:de:94 Fingerprint (SHA-256): 9A:CE:19:C8:62:78:4D:D5:8E:3C:3A:CF:4A:B9:03:42:39:B1:49:29:8D:CD:31:93:9F:FB:DC:F3:BB:37:A6:7E Fingerprint (SHA1): 50:2A:73:49:42:2C:77:33:BC:8A:8A:00:B3:F5:FD:D0:27:3A:15:44 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3663: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3664: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154134 (0x19575656) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 15:50:21 2016 Not After : Sun Apr 25 15:50:21 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:c2:7f:a4:cf:ab:aa:83:9c:32:d1:e9:18:d3:d9:28: 76:e2:2c:5b:08:b5:ee:47:67:cc:69:16:b0:27:fd:06: 59:c3:26:ce:3d:a3:57:24:aa:b8:d5:0b:b0:d2:4b:e6: 49:f0:b9:82:c9:10:56:66:12:23:4e:07:d7:2a:b2:b6: c3:d9:85:81:96:f4:d2:15:91:0d:7c:72:3c:37:73:b1: bc:6b:dd:6e:32:77:c3:20:96:83:ec:32:b5:88:6d:1f: c1:fd:de:66:95:a7:60:26:11:a5:81:b0:52:b2:9a:e6: 08:02:fb:a1:f7:29:42:87:b6:5b:d2:a3:97:7a:d2:31: a8:6f:23:eb:47:dc:56:7c:d2:09:ca:ec:84:9d:86:04: a6:1f:8e:dc:13:a4:ea:5e:ea:a0:da:0b:4b:b7:54:47: 8c:42:f9:6a:26:08:ac:e3:c4:79:7a:25:bc:47:32:87: 62:b4:29:6d:de:0f:1c:2e:6e:76:3e:48:cd:c7:64:20: 85:fc:ac:4f:0b:be:b6:d4:ad:0f:a6:b1:38:b3:b2:df: a0:a7:e3:a2:ce:53:4b:33:34:d6:da:66:9c:dd:ff:ed: a1:39:af:9d:7c:d8:3f:f5:e6:57:49:cf:38:c7:bc:5b: a3:93:5f:74:57:e3:9a:43:1d:52:f2:1f:c1:ed:ba:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:da:46:b0:cf:c5:d8:15:3d:ff:b4:56:7a:a9:a6:45: df:82:39:fd:dc:bb:7a:94:8f:09:6e:e6:45:be:eb:fb: 0c:41:10:fd:78:cc:c1:7c:17:71:33:3e:ab:c2:bc:1a: 6d:46:4b:23:0f:a6:75:6b:7b:cf:17:9f:ec:3b:df:97: 54:61:d2:e8:99:26:25:c9:10:6b:06:73:91:8c:f3:3c: 05:e9:4f:6e:f0:38:23:14:e5:ef:89:41:ae:cd:1c:29: 79:0d:d1:25:4d:aa:97:2c:6d:cb:67:e6:b9:ed:27:c9: eb:c1:b6:8d:aa:ff:b4:9a:35:69:1c:91:04:a4:3a:5b: 32:13:08:1f:69:cc:b9:55:12:9e:b8:e5:6b:55:1b:d0: f5:11:ad:9c:41:44:f8:a6:98:d4:c9:35:b2:a1:f5:79: 20:5b:34:68:0b:39:7c:6d:ef:c6:8e:c1:fb:c9:bf:07: e8:58:91:b6:dc:8a:a6:ce:60:9c:e9:98:37:f8:30:80: 6d:0f:9c:3f:1e:e5:dc:6b:7f:72:f9:07:40:b0:75:0e: fa:93:c8:d4:52:9e:58:1f:a2:15:e2:20:4c:09:9f:e1: 57:83:6c:31:81:79:65:70:64:45:7b:37:f1:c3:4a:39: 3e:bf:f0:8c:4e:4b:83:5b:0b:c8:d6:d1:2f:c9:82:89 Fingerprint (SHA-256): 98:F0:49:2B:DD:65:91:10:3F:8B:A1:C4:A2:8C:6E:E8:11:BC:2B:05:BD:BA:33:7F:7D:FA:43:E1:89:E7:2E:97 Fingerprint (SHA1): 45:49:03:A6:A6:3D:90:EC:65:52:28:F7:87:7A:CA:59:EB:B5:70:72 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3665: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3666: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3667: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154136 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3668: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3669: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3670: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3671: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154137 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3672: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3673: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3674: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3675: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154138 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3676: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3677: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3678: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3679: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425154139 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3680: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3681: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3682: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3683: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425154140 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3684: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3685: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3686: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154136 (0x19575658) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:50:51 2016 Not After : Sun Apr 25 15:50:51 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:36:80:89:c7:3e:26:7a:e8:38:52:b6:4c:a6:fc:b1: d5:26:c9:93:b3:d0:19:17:72:29:21:89:18:22:75:27: 42:97:59:a2:68:63:8e:4e:51:cb:0b:9c:27:07:23:97: 4e:c8:0a:3a:33:17:76:4f:6a:9f:c6:d1:72:04:b5:7e: d8:4a:9f:31:87:b1:1d:bc:47:9b:18:a1:02:8f:0f:a1: 27:a1:84:65:39:38:43:0e:38:d2:35:23:df:f0:d9:1b: ad:ed:35:8a:d6:37:e3:f8:b7:be:e3:02:0d:ea:35:74: 13:f5:5d:72:1d:92:a8:90:61:61:c4:bb:d9:5d:df:2e: 9f:47:8c:a1:52:03:a3:d1:97:cb:77:fd:d5:93:97:a2: 76:74:84:48:12:1b:d8:3a:f8:03:7a:47:10:64:96:67: e2:0b:6b:a1:1f:96:be:ad:80:6d:1a:b3:a6:bc:aa:d7: 93:fa:0e:89:26:21:43:6a:89:a5:97:a7:48:ca:3c:25: 15:ae:9c:52:0a:15:d1:36:c1:fc:73:10:24:70:26:08: 44:e7:55:38:f8:c4:cd:5f:cd:38:0f:ef:ec:e1:8f:87: d5:97:87:4a:73:c8:31:76:7d:d7:6b:62:57:0e:4b:b0: ad:b5:63:ed:7e:b2:fa:b5:08:d4:fa:77:9d:a3:95:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:67:bd:49:9c:09:3e:1a:4b:0a:c6:65:27:41:ff:77: 12:d0:99:0d:1e:b5:64:df:52:f2:62:32:9d:42:c3:01: 4c:e9:52:8d:84:d5:bc:71:de:9f:b7:3f:ef:41:d1:46: e2:9b:67:5f:d2:2f:f7:25:45:1e:24:ac:77:a6:02:47: 63:c9:d3:79:2d:ee:df:dd:f6:91:9f:f5:74:f7:6d:b1: e6:6d:42:8c:32:d3:c2:f6:c0:54:39:15:dc:c4:22:68: 4d:a9:47:d6:aa:67:63:db:b2:eb:6c:a9:41:b2:8e:50: 51:04:7f:ad:94:e9:3b:f3:b3:81:fc:3d:dd:46:fa:67: 2e:84:4d:57:7a:32:26:80:14:3d:c5:6e:d1:04:32:d4: 36:33:51:a5:45:5a:77:42:fc:3a:a9:76:fb:19:58:ed: 21:a3:9a:63:c5:be:36:35:2c:39:c5:da:15:84:bb:25: 11:a2:e9:7a:23:ee:5e:53:69:a0:0d:b0:7e:d9:c7:22: e9:eb:e5:4b:0a:35:72:92:b7:e0:53:73:ef:87:ea:58: c0:60:43:9f:dc:74:0e:21:ab:e1:d9:eb:fa:a9:0f:a0: 3e:c7:f6:de:45:be:20:e8:b0:b7:ea:40:b2:ba:20:2f: 81:54:75:16:47:82:b9:86:ef:5e:6e:97:08:fc:0e:0d Fingerprint (SHA-256): 2C:C6:A1:7C:BE:2C:C9:8D:D4:38:21:72:78:5E:5F:34:CA:1A:91:ED:9E:C4:ED:1E:20:6E:9C:0E:A9:5B:04:7A Fingerprint (SHA1): CC:3B:D0:7B:6F:98:FA:2C:67:1A:D5:85:FB:1A:EE:37:F7:67:0D:CC Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3687: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3688: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154137 (0x19575659) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:51:01 2016 Not After : Sun Apr 25 15:51:01 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:7d:32:e1:a5:06:e2:3e:9e:8d:09:54:a1:bc:2c:61: 6a:11:30:38:54:ff:03:fa:2a:74:54:ab:33:92:02:1f: bc:a8:25:07:61:f0:33:10:2f:9e:cf:93:cc:c7:0f:d5: 18:be:20:c8:b7:58:09:38:f4:c3:6c:54:cd:17:4d:4e: 80:a6:94:e7:dc:fe:bd:f4:2c:a5:11:87:49:87:3e:96: 84:df:15:91:68:1a:d6:16:c7:f2:e9:8e:98:54:d9:5b: d9:ea:2c:ef:d6:f2:37:69:ee:9f:28:ef:91:ae:70:6b: 79:9f:c7:d1:37:76:73:ec:73:b5:93:56:71:41:2d:4b: df:ef:30:b2:33:77:de:05:f7:e0:4f:6a:8c:c9:e9:18: aa:5d:15:79:38:49:31:a2:b2:a4:de:51:e4:75:31:d1: f6:bb:16:5f:5f:ee:1c:51:d7:5d:5a:20:28:ba:ae:f7: f4:25:bf:88:ee:58:ca:d3:65:53:ff:92:6c:a3:31:0e: e4:52:de:ce:f7:59:8f:8f:6b:ee:b9:86:3d:6b:2b:0a: f3:c9:00:e5:84:b9:42:df:29:2f:2f:75:1e:c2:7f:85: 7b:4f:a3:e2:b3:64:a0:f9:98:b2:65:dc:3b:bf:7f:34: 66:6e:78:52:4b:c1:cc:d1:6e:68:30:51:a6:d2:a1:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:0a:d2:4d:35:c5:b7:58:65:03:11:48:a2:01:1c:c0: e1:e9:85:c9:bd:8c:d8:3c:84:f5:d0:ad:4a:d2:62:f2: 9e:1b:99:0a:26:d8:39:fa:dd:cf:dd:ad:79:78:76:ac: 9c:b0:02:be:5b:e3:12:1f:a8:01:b8:11:cf:9b:69:18: 4e:04:88:30:e8:e0:1d:54:44:7d:04:26:28:3c:85:d0: 63:d7:62:29:fc:bf:ff:a8:e4:50:6c:27:c4:bf:97:fb: d4:7d:cb:20:34:3d:da:a0:06:dc:6a:93:6f:af:72:92: 70:c9:93:d5:45:7a:28:37:5c:b6:28:aa:66:60:ad:6a: cb:82:ff:ec:63:f5:19:25:46:89:cf:95:83:44:4a:d8: d2:f2:04:0d:59:8e:5e:fc:c8:6d:78:c4:55:b0:c9:26: 38:c8:ae:2d:f0:10:6b:52:5b:5c:e3:54:55:b7:10:68: 9b:cd:ea:c3:b6:43:8f:86:34:34:2d:87:39:5d:b6:d5: 67:5f:5b:e4:3d:6f:8d:db:a0:64:9a:43:58:b5:0e:64: 66:86:27:43:5c:4a:52:93:af:11:26:43:19:b2:62:bc: ea:7d:5c:c3:57:ac:a6:6e:00:9f:2c:7c:c6:49:05:37: 04:f2:97:4c:e7:79:cf:10:19:38:0d:25:b3:33:93:8f Fingerprint (SHA-256): 5F:1C:54:25:76:29:D2:C0:6C:F1:57:BB:BC:13:F9:E7:5C:CB:2B:1A:09:8E:BF:19:5F:E0:44:90:5E:50:AD:BE Fingerprint (SHA1): F7:7B:F3:5F:E4:74:2B:76:15:EE:4E:86:AF:14:04:43:C0:6D:16:06 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3689: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3690: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154138 (0x1957565a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 15:51:19 2016 Not After : Sun Apr 25 15:51:19 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:f6:ef:da:26:0e:a3:97:ac:b1:46:ef:48:4b:7e:79: c7:99:42:98:ab:16:d8:c4:c2:aa:fe:29:69:d7:11:27: 59:48:4a:1b:55:e1:03:f4:46:33:e1:c0:b5:6f:b1:cf: 5e:bb:4e:dc:ac:81:d9:a9:a7:28:e5:c3:94:a8:3a:2b: ae:be:2b:1d:cc:1c:fe:64:76:b0:b0:24:da:60:70:60: fb:75:6e:3c:49:e9:56:52:bb:6b:0f:10:c1:c1:90:91: 45:5e:79:49:a1:d8:d0:c9:04:9b:7b:83:89:11:f9:8e: 1e:9b:2e:e8:76:bd:c8:37:56:cd:a8:53:27:9c:c8:0e: e3:c8:46:33:57:f8:08:0c:5f:ce:44:45:c3:e4:27:40: fb:84:f4:df:92:89:3a:86:0a:38:c4:49:76:d5:12:f9: 4b:e4:09:b9:5d:a8:37:2d:12:bb:39:bb:d7:5e:0d:77: 7b:86:e4:23:fa:d8:48:8b:75:e3:d3:09:12:9e:d3:ab: ae:d5:6a:01:ac:3d:5c:ce:99:d1:b6:cc:fe:09:98:8b: 71:df:5b:6e:35:71:6b:16:7b:6a:6f:3b:69:33:5a:90: a5:e4:79:5a:e1:d8:d6:84:18:7a:38:d2:23:f8:61:d4: 7a:4b:3c:a4:9f:36:bc:4b:be:6d:1c:09:bb:5d:bb:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:9f:ee:f4:12:e6:2f:a3:64:53:56:3f:5b:30:fc:33: 6f:61:70:74:79:ec:57:1d:24:bb:fa:47:58:7f:0d:57: 5a:e9:ed:32:72:dd:12:af:be:a8:e6:28:43:e3:c2:34: cf:6f:d4:8d:f5:de:94:cf:1d:bf:25:81:2b:bb:5e:ca: 17:5f:9d:c9:5a:29:d3:5d:a4:3e:8b:89:9e:79:20:de: 59:91:71:dc:61:da:3e:3c:62:30:20:a2:05:97:63:44: 24:80:43:e5:a1:d2:8a:bb:47:ef:09:7f:bf:e1:e2:02: 51:9a:e3:b9:07:83:21:76:d1:e8:27:b7:1d:5d:5a:ce: 0a:2a:d0:e4:af:15:0b:b7:0f:1b:fb:62:d7:5d:f8:ad: d0:4a:5d:85:50:ce:b1:3e:f2:45:37:93:f7:30:a5:44: 61:cb:93:16:77:0f:a6:37:01:47:b7:e4:18:d9:57:9f: 68:1e:de:26:dd:7e:f3:fe:ce:16:75:c5:9f:47:c9:a4: 56:2c:17:2b:48:a0:56:c5:b4:42:43:02:71:b1:c6:51: 67:f2:d2:1d:42:27:78:c7:14:09:87:9b:7a:39:16:f7: 93:e3:d9:68:19:45:6b:78:97:a8:72:87:84:d9:3c:2e: e6:17:2e:18:00:b2:5f:5b:24:d2:e4:52:ea:5d:47:b7 Fingerprint (SHA-256): DE:8B:72:88:D2:6C:36:34:17:5E:EF:F3:52:6C:30:80:A6:18:0B:17:F7:44:9D:24:62:F8:81:49:0B:20:53:E6 Fingerprint (SHA1): B8:9A:9A:F5:00:11:26:81:38:56:D9:D7:49:EF:3C:06:42:DF:3B:00 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3691: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3692: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3693: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3694: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3695: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154136 (0x19575658) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:50:51 2016 Not After : Sun Apr 25 15:50:51 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:36:80:89:c7:3e:26:7a:e8:38:52:b6:4c:a6:fc:b1: d5:26:c9:93:b3:d0:19:17:72:29:21:89:18:22:75:27: 42:97:59:a2:68:63:8e:4e:51:cb:0b:9c:27:07:23:97: 4e:c8:0a:3a:33:17:76:4f:6a:9f:c6:d1:72:04:b5:7e: d8:4a:9f:31:87:b1:1d:bc:47:9b:18:a1:02:8f:0f:a1: 27:a1:84:65:39:38:43:0e:38:d2:35:23:df:f0:d9:1b: ad:ed:35:8a:d6:37:e3:f8:b7:be:e3:02:0d:ea:35:74: 13:f5:5d:72:1d:92:a8:90:61:61:c4:bb:d9:5d:df:2e: 9f:47:8c:a1:52:03:a3:d1:97:cb:77:fd:d5:93:97:a2: 76:74:84:48:12:1b:d8:3a:f8:03:7a:47:10:64:96:67: e2:0b:6b:a1:1f:96:be:ad:80:6d:1a:b3:a6:bc:aa:d7: 93:fa:0e:89:26:21:43:6a:89:a5:97:a7:48:ca:3c:25: 15:ae:9c:52:0a:15:d1:36:c1:fc:73:10:24:70:26:08: 44:e7:55:38:f8:c4:cd:5f:cd:38:0f:ef:ec:e1:8f:87: d5:97:87:4a:73:c8:31:76:7d:d7:6b:62:57:0e:4b:b0: ad:b5:63:ed:7e:b2:fa:b5:08:d4:fa:77:9d:a3:95:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:67:bd:49:9c:09:3e:1a:4b:0a:c6:65:27:41:ff:77: 12:d0:99:0d:1e:b5:64:df:52:f2:62:32:9d:42:c3:01: 4c:e9:52:8d:84:d5:bc:71:de:9f:b7:3f:ef:41:d1:46: e2:9b:67:5f:d2:2f:f7:25:45:1e:24:ac:77:a6:02:47: 63:c9:d3:79:2d:ee:df:dd:f6:91:9f:f5:74:f7:6d:b1: e6:6d:42:8c:32:d3:c2:f6:c0:54:39:15:dc:c4:22:68: 4d:a9:47:d6:aa:67:63:db:b2:eb:6c:a9:41:b2:8e:50: 51:04:7f:ad:94:e9:3b:f3:b3:81:fc:3d:dd:46:fa:67: 2e:84:4d:57:7a:32:26:80:14:3d:c5:6e:d1:04:32:d4: 36:33:51:a5:45:5a:77:42:fc:3a:a9:76:fb:19:58:ed: 21:a3:9a:63:c5:be:36:35:2c:39:c5:da:15:84:bb:25: 11:a2:e9:7a:23:ee:5e:53:69:a0:0d:b0:7e:d9:c7:22: e9:eb:e5:4b:0a:35:72:92:b7:e0:53:73:ef:87:ea:58: c0:60:43:9f:dc:74:0e:21:ab:e1:d9:eb:fa:a9:0f:a0: 3e:c7:f6:de:45:be:20:e8:b0:b7:ea:40:b2:ba:20:2f: 81:54:75:16:47:82:b9:86:ef:5e:6e:97:08:fc:0e:0d Fingerprint (SHA-256): 2C:C6:A1:7C:BE:2C:C9:8D:D4:38:21:72:78:5E:5F:34:CA:1A:91:ED:9E:C4:ED:1E:20:6E:9C:0E:A9:5B:04:7A Fingerprint (SHA1): CC:3B:D0:7B:6F:98:FA:2C:67:1A:D5:85:FB:1A:EE:37:F7:67:0D:CC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3696: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3697: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154137 (0x19575659) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:51:01 2016 Not After : Sun Apr 25 15:51:01 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:7d:32:e1:a5:06:e2:3e:9e:8d:09:54:a1:bc:2c:61: 6a:11:30:38:54:ff:03:fa:2a:74:54:ab:33:92:02:1f: bc:a8:25:07:61:f0:33:10:2f:9e:cf:93:cc:c7:0f:d5: 18:be:20:c8:b7:58:09:38:f4:c3:6c:54:cd:17:4d:4e: 80:a6:94:e7:dc:fe:bd:f4:2c:a5:11:87:49:87:3e:96: 84:df:15:91:68:1a:d6:16:c7:f2:e9:8e:98:54:d9:5b: d9:ea:2c:ef:d6:f2:37:69:ee:9f:28:ef:91:ae:70:6b: 79:9f:c7:d1:37:76:73:ec:73:b5:93:56:71:41:2d:4b: df:ef:30:b2:33:77:de:05:f7:e0:4f:6a:8c:c9:e9:18: aa:5d:15:79:38:49:31:a2:b2:a4:de:51:e4:75:31:d1: f6:bb:16:5f:5f:ee:1c:51:d7:5d:5a:20:28:ba:ae:f7: f4:25:bf:88:ee:58:ca:d3:65:53:ff:92:6c:a3:31:0e: e4:52:de:ce:f7:59:8f:8f:6b:ee:b9:86:3d:6b:2b:0a: f3:c9:00:e5:84:b9:42:df:29:2f:2f:75:1e:c2:7f:85: 7b:4f:a3:e2:b3:64:a0:f9:98:b2:65:dc:3b:bf:7f:34: 66:6e:78:52:4b:c1:cc:d1:6e:68:30:51:a6:d2:a1:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:0a:d2:4d:35:c5:b7:58:65:03:11:48:a2:01:1c:c0: e1:e9:85:c9:bd:8c:d8:3c:84:f5:d0:ad:4a:d2:62:f2: 9e:1b:99:0a:26:d8:39:fa:dd:cf:dd:ad:79:78:76:ac: 9c:b0:02:be:5b:e3:12:1f:a8:01:b8:11:cf:9b:69:18: 4e:04:88:30:e8:e0:1d:54:44:7d:04:26:28:3c:85:d0: 63:d7:62:29:fc:bf:ff:a8:e4:50:6c:27:c4:bf:97:fb: d4:7d:cb:20:34:3d:da:a0:06:dc:6a:93:6f:af:72:92: 70:c9:93:d5:45:7a:28:37:5c:b6:28:aa:66:60:ad:6a: cb:82:ff:ec:63:f5:19:25:46:89:cf:95:83:44:4a:d8: d2:f2:04:0d:59:8e:5e:fc:c8:6d:78:c4:55:b0:c9:26: 38:c8:ae:2d:f0:10:6b:52:5b:5c:e3:54:55:b7:10:68: 9b:cd:ea:c3:b6:43:8f:86:34:34:2d:87:39:5d:b6:d5: 67:5f:5b:e4:3d:6f:8d:db:a0:64:9a:43:58:b5:0e:64: 66:86:27:43:5c:4a:52:93:af:11:26:43:19:b2:62:bc: ea:7d:5c:c3:57:ac:a6:6e:00:9f:2c:7c:c6:49:05:37: 04:f2:97:4c:e7:79:cf:10:19:38:0d:25:b3:33:93:8f Fingerprint (SHA-256): 5F:1C:54:25:76:29:D2:C0:6C:F1:57:BB:BC:13:F9:E7:5C:CB:2B:1A:09:8E:BF:19:5F:E0:44:90:5E:50:AD:BE Fingerprint (SHA1): F7:7B:F3:5F:E4:74:2B:76:15:EE:4E:86:AF:14:04:43:C0:6D:16:06 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3698: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3699: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154138 (0x1957565a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 15:51:19 2016 Not After : Sun Apr 25 15:51:19 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:f6:ef:da:26:0e:a3:97:ac:b1:46:ef:48:4b:7e:79: c7:99:42:98:ab:16:d8:c4:c2:aa:fe:29:69:d7:11:27: 59:48:4a:1b:55:e1:03:f4:46:33:e1:c0:b5:6f:b1:cf: 5e:bb:4e:dc:ac:81:d9:a9:a7:28:e5:c3:94:a8:3a:2b: ae:be:2b:1d:cc:1c:fe:64:76:b0:b0:24:da:60:70:60: fb:75:6e:3c:49:e9:56:52:bb:6b:0f:10:c1:c1:90:91: 45:5e:79:49:a1:d8:d0:c9:04:9b:7b:83:89:11:f9:8e: 1e:9b:2e:e8:76:bd:c8:37:56:cd:a8:53:27:9c:c8:0e: e3:c8:46:33:57:f8:08:0c:5f:ce:44:45:c3:e4:27:40: fb:84:f4:df:92:89:3a:86:0a:38:c4:49:76:d5:12:f9: 4b:e4:09:b9:5d:a8:37:2d:12:bb:39:bb:d7:5e:0d:77: 7b:86:e4:23:fa:d8:48:8b:75:e3:d3:09:12:9e:d3:ab: ae:d5:6a:01:ac:3d:5c:ce:99:d1:b6:cc:fe:09:98:8b: 71:df:5b:6e:35:71:6b:16:7b:6a:6f:3b:69:33:5a:90: a5:e4:79:5a:e1:d8:d6:84:18:7a:38:d2:23:f8:61:d4: 7a:4b:3c:a4:9f:36:bc:4b:be:6d:1c:09:bb:5d:bb:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:9f:ee:f4:12:e6:2f:a3:64:53:56:3f:5b:30:fc:33: 6f:61:70:74:79:ec:57:1d:24:bb:fa:47:58:7f:0d:57: 5a:e9:ed:32:72:dd:12:af:be:a8:e6:28:43:e3:c2:34: cf:6f:d4:8d:f5:de:94:cf:1d:bf:25:81:2b:bb:5e:ca: 17:5f:9d:c9:5a:29:d3:5d:a4:3e:8b:89:9e:79:20:de: 59:91:71:dc:61:da:3e:3c:62:30:20:a2:05:97:63:44: 24:80:43:e5:a1:d2:8a:bb:47:ef:09:7f:bf:e1:e2:02: 51:9a:e3:b9:07:83:21:76:d1:e8:27:b7:1d:5d:5a:ce: 0a:2a:d0:e4:af:15:0b:b7:0f:1b:fb:62:d7:5d:f8:ad: d0:4a:5d:85:50:ce:b1:3e:f2:45:37:93:f7:30:a5:44: 61:cb:93:16:77:0f:a6:37:01:47:b7:e4:18:d9:57:9f: 68:1e:de:26:dd:7e:f3:fe:ce:16:75:c5:9f:47:c9:a4: 56:2c:17:2b:48:a0:56:c5:b4:42:43:02:71:b1:c6:51: 67:f2:d2:1d:42:27:78:c7:14:09:87:9b:7a:39:16:f7: 93:e3:d9:68:19:45:6b:78:97:a8:72:87:84:d9:3c:2e: e6:17:2e:18:00:b2:5f:5b:24:d2:e4:52:ea:5d:47:b7 Fingerprint (SHA-256): DE:8B:72:88:D2:6C:36:34:17:5E:EF:F3:52:6C:30:80:A6:18:0B:17:F7:44:9D:24:62:F8:81:49:0B:20:53:E6 Fingerprint (SHA1): B8:9A:9A:F5:00:11:26:81:38:56:D9:D7:49:EF:3C:06:42:DF:3B:00 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3700: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3701: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154136 (0x19575658) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:50:51 2016 Not After : Sun Apr 25 15:50:51 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:36:80:89:c7:3e:26:7a:e8:38:52:b6:4c:a6:fc:b1: d5:26:c9:93:b3:d0:19:17:72:29:21:89:18:22:75:27: 42:97:59:a2:68:63:8e:4e:51:cb:0b:9c:27:07:23:97: 4e:c8:0a:3a:33:17:76:4f:6a:9f:c6:d1:72:04:b5:7e: d8:4a:9f:31:87:b1:1d:bc:47:9b:18:a1:02:8f:0f:a1: 27:a1:84:65:39:38:43:0e:38:d2:35:23:df:f0:d9:1b: ad:ed:35:8a:d6:37:e3:f8:b7:be:e3:02:0d:ea:35:74: 13:f5:5d:72:1d:92:a8:90:61:61:c4:bb:d9:5d:df:2e: 9f:47:8c:a1:52:03:a3:d1:97:cb:77:fd:d5:93:97:a2: 76:74:84:48:12:1b:d8:3a:f8:03:7a:47:10:64:96:67: e2:0b:6b:a1:1f:96:be:ad:80:6d:1a:b3:a6:bc:aa:d7: 93:fa:0e:89:26:21:43:6a:89:a5:97:a7:48:ca:3c:25: 15:ae:9c:52:0a:15:d1:36:c1:fc:73:10:24:70:26:08: 44:e7:55:38:f8:c4:cd:5f:cd:38:0f:ef:ec:e1:8f:87: d5:97:87:4a:73:c8:31:76:7d:d7:6b:62:57:0e:4b:b0: ad:b5:63:ed:7e:b2:fa:b5:08:d4:fa:77:9d:a3:95:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:67:bd:49:9c:09:3e:1a:4b:0a:c6:65:27:41:ff:77: 12:d0:99:0d:1e:b5:64:df:52:f2:62:32:9d:42:c3:01: 4c:e9:52:8d:84:d5:bc:71:de:9f:b7:3f:ef:41:d1:46: e2:9b:67:5f:d2:2f:f7:25:45:1e:24:ac:77:a6:02:47: 63:c9:d3:79:2d:ee:df:dd:f6:91:9f:f5:74:f7:6d:b1: e6:6d:42:8c:32:d3:c2:f6:c0:54:39:15:dc:c4:22:68: 4d:a9:47:d6:aa:67:63:db:b2:eb:6c:a9:41:b2:8e:50: 51:04:7f:ad:94:e9:3b:f3:b3:81:fc:3d:dd:46:fa:67: 2e:84:4d:57:7a:32:26:80:14:3d:c5:6e:d1:04:32:d4: 36:33:51:a5:45:5a:77:42:fc:3a:a9:76:fb:19:58:ed: 21:a3:9a:63:c5:be:36:35:2c:39:c5:da:15:84:bb:25: 11:a2:e9:7a:23:ee:5e:53:69:a0:0d:b0:7e:d9:c7:22: e9:eb:e5:4b:0a:35:72:92:b7:e0:53:73:ef:87:ea:58: c0:60:43:9f:dc:74:0e:21:ab:e1:d9:eb:fa:a9:0f:a0: 3e:c7:f6:de:45:be:20:e8:b0:b7:ea:40:b2:ba:20:2f: 81:54:75:16:47:82:b9:86:ef:5e:6e:97:08:fc:0e:0d Fingerprint (SHA-256): 2C:C6:A1:7C:BE:2C:C9:8D:D4:38:21:72:78:5E:5F:34:CA:1A:91:ED:9E:C4:ED:1E:20:6E:9C:0E:A9:5B:04:7A Fingerprint (SHA1): CC:3B:D0:7B:6F:98:FA:2C:67:1A:D5:85:FB:1A:EE:37:F7:67:0D:CC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3702: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154136 (0x19575658) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:50:51 2016 Not After : Sun Apr 25 15:50:51 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:36:80:89:c7:3e:26:7a:e8:38:52:b6:4c:a6:fc:b1: d5:26:c9:93:b3:d0:19:17:72:29:21:89:18:22:75:27: 42:97:59:a2:68:63:8e:4e:51:cb:0b:9c:27:07:23:97: 4e:c8:0a:3a:33:17:76:4f:6a:9f:c6:d1:72:04:b5:7e: d8:4a:9f:31:87:b1:1d:bc:47:9b:18:a1:02:8f:0f:a1: 27:a1:84:65:39:38:43:0e:38:d2:35:23:df:f0:d9:1b: ad:ed:35:8a:d6:37:e3:f8:b7:be:e3:02:0d:ea:35:74: 13:f5:5d:72:1d:92:a8:90:61:61:c4:bb:d9:5d:df:2e: 9f:47:8c:a1:52:03:a3:d1:97:cb:77:fd:d5:93:97:a2: 76:74:84:48:12:1b:d8:3a:f8:03:7a:47:10:64:96:67: e2:0b:6b:a1:1f:96:be:ad:80:6d:1a:b3:a6:bc:aa:d7: 93:fa:0e:89:26:21:43:6a:89:a5:97:a7:48:ca:3c:25: 15:ae:9c:52:0a:15:d1:36:c1:fc:73:10:24:70:26:08: 44:e7:55:38:f8:c4:cd:5f:cd:38:0f:ef:ec:e1:8f:87: d5:97:87:4a:73:c8:31:76:7d:d7:6b:62:57:0e:4b:b0: ad:b5:63:ed:7e:b2:fa:b5:08:d4:fa:77:9d:a3:95:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:67:bd:49:9c:09:3e:1a:4b:0a:c6:65:27:41:ff:77: 12:d0:99:0d:1e:b5:64:df:52:f2:62:32:9d:42:c3:01: 4c:e9:52:8d:84:d5:bc:71:de:9f:b7:3f:ef:41:d1:46: e2:9b:67:5f:d2:2f:f7:25:45:1e:24:ac:77:a6:02:47: 63:c9:d3:79:2d:ee:df:dd:f6:91:9f:f5:74:f7:6d:b1: e6:6d:42:8c:32:d3:c2:f6:c0:54:39:15:dc:c4:22:68: 4d:a9:47:d6:aa:67:63:db:b2:eb:6c:a9:41:b2:8e:50: 51:04:7f:ad:94:e9:3b:f3:b3:81:fc:3d:dd:46:fa:67: 2e:84:4d:57:7a:32:26:80:14:3d:c5:6e:d1:04:32:d4: 36:33:51:a5:45:5a:77:42:fc:3a:a9:76:fb:19:58:ed: 21:a3:9a:63:c5:be:36:35:2c:39:c5:da:15:84:bb:25: 11:a2:e9:7a:23:ee:5e:53:69:a0:0d:b0:7e:d9:c7:22: e9:eb:e5:4b:0a:35:72:92:b7:e0:53:73:ef:87:ea:58: c0:60:43:9f:dc:74:0e:21:ab:e1:d9:eb:fa:a9:0f:a0: 3e:c7:f6:de:45:be:20:e8:b0:b7:ea:40:b2:ba:20:2f: 81:54:75:16:47:82:b9:86:ef:5e:6e:97:08:fc:0e:0d Fingerprint (SHA-256): 2C:C6:A1:7C:BE:2C:C9:8D:D4:38:21:72:78:5E:5F:34:CA:1A:91:ED:9E:C4:ED:1E:20:6E:9C:0E:A9:5B:04:7A Fingerprint (SHA1): CC:3B:D0:7B:6F:98:FA:2C:67:1A:D5:85:FB:1A:EE:37:F7:67:0D:CC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3703: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154137 (0x19575659) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:51:01 2016 Not After : Sun Apr 25 15:51:01 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:7d:32:e1:a5:06:e2:3e:9e:8d:09:54:a1:bc:2c:61: 6a:11:30:38:54:ff:03:fa:2a:74:54:ab:33:92:02:1f: bc:a8:25:07:61:f0:33:10:2f:9e:cf:93:cc:c7:0f:d5: 18:be:20:c8:b7:58:09:38:f4:c3:6c:54:cd:17:4d:4e: 80:a6:94:e7:dc:fe:bd:f4:2c:a5:11:87:49:87:3e:96: 84:df:15:91:68:1a:d6:16:c7:f2:e9:8e:98:54:d9:5b: d9:ea:2c:ef:d6:f2:37:69:ee:9f:28:ef:91:ae:70:6b: 79:9f:c7:d1:37:76:73:ec:73:b5:93:56:71:41:2d:4b: df:ef:30:b2:33:77:de:05:f7:e0:4f:6a:8c:c9:e9:18: aa:5d:15:79:38:49:31:a2:b2:a4:de:51:e4:75:31:d1: f6:bb:16:5f:5f:ee:1c:51:d7:5d:5a:20:28:ba:ae:f7: f4:25:bf:88:ee:58:ca:d3:65:53:ff:92:6c:a3:31:0e: e4:52:de:ce:f7:59:8f:8f:6b:ee:b9:86:3d:6b:2b:0a: f3:c9:00:e5:84:b9:42:df:29:2f:2f:75:1e:c2:7f:85: 7b:4f:a3:e2:b3:64:a0:f9:98:b2:65:dc:3b:bf:7f:34: 66:6e:78:52:4b:c1:cc:d1:6e:68:30:51:a6:d2:a1:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:0a:d2:4d:35:c5:b7:58:65:03:11:48:a2:01:1c:c0: e1:e9:85:c9:bd:8c:d8:3c:84:f5:d0:ad:4a:d2:62:f2: 9e:1b:99:0a:26:d8:39:fa:dd:cf:dd:ad:79:78:76:ac: 9c:b0:02:be:5b:e3:12:1f:a8:01:b8:11:cf:9b:69:18: 4e:04:88:30:e8:e0:1d:54:44:7d:04:26:28:3c:85:d0: 63:d7:62:29:fc:bf:ff:a8:e4:50:6c:27:c4:bf:97:fb: d4:7d:cb:20:34:3d:da:a0:06:dc:6a:93:6f:af:72:92: 70:c9:93:d5:45:7a:28:37:5c:b6:28:aa:66:60:ad:6a: cb:82:ff:ec:63:f5:19:25:46:89:cf:95:83:44:4a:d8: d2:f2:04:0d:59:8e:5e:fc:c8:6d:78:c4:55:b0:c9:26: 38:c8:ae:2d:f0:10:6b:52:5b:5c:e3:54:55:b7:10:68: 9b:cd:ea:c3:b6:43:8f:86:34:34:2d:87:39:5d:b6:d5: 67:5f:5b:e4:3d:6f:8d:db:a0:64:9a:43:58:b5:0e:64: 66:86:27:43:5c:4a:52:93:af:11:26:43:19:b2:62:bc: ea:7d:5c:c3:57:ac:a6:6e:00:9f:2c:7c:c6:49:05:37: 04:f2:97:4c:e7:79:cf:10:19:38:0d:25:b3:33:93:8f Fingerprint (SHA-256): 5F:1C:54:25:76:29:D2:C0:6C:F1:57:BB:BC:13:F9:E7:5C:CB:2B:1A:09:8E:BF:19:5F:E0:44:90:5E:50:AD:BE Fingerprint (SHA1): F7:7B:F3:5F:E4:74:2B:76:15:EE:4E:86:AF:14:04:43:C0:6D:16:06 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3704: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154137 (0x19575659) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 15:51:01 2016 Not After : Sun Apr 25 15:51:01 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:7d:32:e1:a5:06:e2:3e:9e:8d:09:54:a1:bc:2c:61: 6a:11:30:38:54:ff:03:fa:2a:74:54:ab:33:92:02:1f: bc:a8:25:07:61:f0:33:10:2f:9e:cf:93:cc:c7:0f:d5: 18:be:20:c8:b7:58:09:38:f4:c3:6c:54:cd:17:4d:4e: 80:a6:94:e7:dc:fe:bd:f4:2c:a5:11:87:49:87:3e:96: 84:df:15:91:68:1a:d6:16:c7:f2:e9:8e:98:54:d9:5b: d9:ea:2c:ef:d6:f2:37:69:ee:9f:28:ef:91:ae:70:6b: 79:9f:c7:d1:37:76:73:ec:73:b5:93:56:71:41:2d:4b: df:ef:30:b2:33:77:de:05:f7:e0:4f:6a:8c:c9:e9:18: aa:5d:15:79:38:49:31:a2:b2:a4:de:51:e4:75:31:d1: f6:bb:16:5f:5f:ee:1c:51:d7:5d:5a:20:28:ba:ae:f7: f4:25:bf:88:ee:58:ca:d3:65:53:ff:92:6c:a3:31:0e: e4:52:de:ce:f7:59:8f:8f:6b:ee:b9:86:3d:6b:2b:0a: f3:c9:00:e5:84:b9:42:df:29:2f:2f:75:1e:c2:7f:85: 7b:4f:a3:e2:b3:64:a0:f9:98:b2:65:dc:3b:bf:7f:34: 66:6e:78:52:4b:c1:cc:d1:6e:68:30:51:a6:d2:a1:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:0a:d2:4d:35:c5:b7:58:65:03:11:48:a2:01:1c:c0: e1:e9:85:c9:bd:8c:d8:3c:84:f5:d0:ad:4a:d2:62:f2: 9e:1b:99:0a:26:d8:39:fa:dd:cf:dd:ad:79:78:76:ac: 9c:b0:02:be:5b:e3:12:1f:a8:01:b8:11:cf:9b:69:18: 4e:04:88:30:e8:e0:1d:54:44:7d:04:26:28:3c:85:d0: 63:d7:62:29:fc:bf:ff:a8:e4:50:6c:27:c4:bf:97:fb: d4:7d:cb:20:34:3d:da:a0:06:dc:6a:93:6f:af:72:92: 70:c9:93:d5:45:7a:28:37:5c:b6:28:aa:66:60:ad:6a: cb:82:ff:ec:63:f5:19:25:46:89:cf:95:83:44:4a:d8: d2:f2:04:0d:59:8e:5e:fc:c8:6d:78:c4:55:b0:c9:26: 38:c8:ae:2d:f0:10:6b:52:5b:5c:e3:54:55:b7:10:68: 9b:cd:ea:c3:b6:43:8f:86:34:34:2d:87:39:5d:b6:d5: 67:5f:5b:e4:3d:6f:8d:db:a0:64:9a:43:58:b5:0e:64: 66:86:27:43:5c:4a:52:93:af:11:26:43:19:b2:62:bc: ea:7d:5c:c3:57:ac:a6:6e:00:9f:2c:7c:c6:49:05:37: 04:f2:97:4c:e7:79:cf:10:19:38:0d:25:b3:33:93:8f Fingerprint (SHA-256): 5F:1C:54:25:76:29:D2:C0:6C:F1:57:BB:BC:13:F9:E7:5C:CB:2B:1A:09:8E:BF:19:5F:E0:44:90:5E:50:AD:BE Fingerprint (SHA1): F7:7B:F3:5F:E4:74:2B:76:15:EE:4E:86:AF:14:04:43:C0:6D:16:06 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3705: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154138 (0x1957565a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 15:51:19 2016 Not After : Sun Apr 25 15:51:19 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:f6:ef:da:26:0e:a3:97:ac:b1:46:ef:48:4b:7e:79: c7:99:42:98:ab:16:d8:c4:c2:aa:fe:29:69:d7:11:27: 59:48:4a:1b:55:e1:03:f4:46:33:e1:c0:b5:6f:b1:cf: 5e:bb:4e:dc:ac:81:d9:a9:a7:28:e5:c3:94:a8:3a:2b: ae:be:2b:1d:cc:1c:fe:64:76:b0:b0:24:da:60:70:60: fb:75:6e:3c:49:e9:56:52:bb:6b:0f:10:c1:c1:90:91: 45:5e:79:49:a1:d8:d0:c9:04:9b:7b:83:89:11:f9:8e: 1e:9b:2e:e8:76:bd:c8:37:56:cd:a8:53:27:9c:c8:0e: e3:c8:46:33:57:f8:08:0c:5f:ce:44:45:c3:e4:27:40: fb:84:f4:df:92:89:3a:86:0a:38:c4:49:76:d5:12:f9: 4b:e4:09:b9:5d:a8:37:2d:12:bb:39:bb:d7:5e:0d:77: 7b:86:e4:23:fa:d8:48:8b:75:e3:d3:09:12:9e:d3:ab: ae:d5:6a:01:ac:3d:5c:ce:99:d1:b6:cc:fe:09:98:8b: 71:df:5b:6e:35:71:6b:16:7b:6a:6f:3b:69:33:5a:90: a5:e4:79:5a:e1:d8:d6:84:18:7a:38:d2:23:f8:61:d4: 7a:4b:3c:a4:9f:36:bc:4b:be:6d:1c:09:bb:5d:bb:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:9f:ee:f4:12:e6:2f:a3:64:53:56:3f:5b:30:fc:33: 6f:61:70:74:79:ec:57:1d:24:bb:fa:47:58:7f:0d:57: 5a:e9:ed:32:72:dd:12:af:be:a8:e6:28:43:e3:c2:34: cf:6f:d4:8d:f5:de:94:cf:1d:bf:25:81:2b:bb:5e:ca: 17:5f:9d:c9:5a:29:d3:5d:a4:3e:8b:89:9e:79:20:de: 59:91:71:dc:61:da:3e:3c:62:30:20:a2:05:97:63:44: 24:80:43:e5:a1:d2:8a:bb:47:ef:09:7f:bf:e1:e2:02: 51:9a:e3:b9:07:83:21:76:d1:e8:27:b7:1d:5d:5a:ce: 0a:2a:d0:e4:af:15:0b:b7:0f:1b:fb:62:d7:5d:f8:ad: d0:4a:5d:85:50:ce:b1:3e:f2:45:37:93:f7:30:a5:44: 61:cb:93:16:77:0f:a6:37:01:47:b7:e4:18:d9:57:9f: 68:1e:de:26:dd:7e:f3:fe:ce:16:75:c5:9f:47:c9:a4: 56:2c:17:2b:48:a0:56:c5:b4:42:43:02:71:b1:c6:51: 67:f2:d2:1d:42:27:78:c7:14:09:87:9b:7a:39:16:f7: 93:e3:d9:68:19:45:6b:78:97:a8:72:87:84:d9:3c:2e: e6:17:2e:18:00:b2:5f:5b:24:d2:e4:52:ea:5d:47:b7 Fingerprint (SHA-256): DE:8B:72:88:D2:6C:36:34:17:5E:EF:F3:52:6C:30:80:A6:18:0B:17:F7:44:9D:24:62:F8:81:49:0B:20:53:E6 Fingerprint (SHA1): B8:9A:9A:F5:00:11:26:81:38:56:D9:D7:49:EF:3C:06:42:DF:3B:00 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3706: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154138 (0x1957565a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 15:51:19 2016 Not After : Sun Apr 25 15:51:19 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:f6:ef:da:26:0e:a3:97:ac:b1:46:ef:48:4b:7e:79: c7:99:42:98:ab:16:d8:c4:c2:aa:fe:29:69:d7:11:27: 59:48:4a:1b:55:e1:03:f4:46:33:e1:c0:b5:6f:b1:cf: 5e:bb:4e:dc:ac:81:d9:a9:a7:28:e5:c3:94:a8:3a:2b: ae:be:2b:1d:cc:1c:fe:64:76:b0:b0:24:da:60:70:60: fb:75:6e:3c:49:e9:56:52:bb:6b:0f:10:c1:c1:90:91: 45:5e:79:49:a1:d8:d0:c9:04:9b:7b:83:89:11:f9:8e: 1e:9b:2e:e8:76:bd:c8:37:56:cd:a8:53:27:9c:c8:0e: e3:c8:46:33:57:f8:08:0c:5f:ce:44:45:c3:e4:27:40: fb:84:f4:df:92:89:3a:86:0a:38:c4:49:76:d5:12:f9: 4b:e4:09:b9:5d:a8:37:2d:12:bb:39:bb:d7:5e:0d:77: 7b:86:e4:23:fa:d8:48:8b:75:e3:d3:09:12:9e:d3:ab: ae:d5:6a:01:ac:3d:5c:ce:99:d1:b6:cc:fe:09:98:8b: 71:df:5b:6e:35:71:6b:16:7b:6a:6f:3b:69:33:5a:90: a5:e4:79:5a:e1:d8:d6:84:18:7a:38:d2:23:f8:61:d4: 7a:4b:3c:a4:9f:36:bc:4b:be:6d:1c:09:bb:5d:bb:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:9f:ee:f4:12:e6:2f:a3:64:53:56:3f:5b:30:fc:33: 6f:61:70:74:79:ec:57:1d:24:bb:fa:47:58:7f:0d:57: 5a:e9:ed:32:72:dd:12:af:be:a8:e6:28:43:e3:c2:34: cf:6f:d4:8d:f5:de:94:cf:1d:bf:25:81:2b:bb:5e:ca: 17:5f:9d:c9:5a:29:d3:5d:a4:3e:8b:89:9e:79:20:de: 59:91:71:dc:61:da:3e:3c:62:30:20:a2:05:97:63:44: 24:80:43:e5:a1:d2:8a:bb:47:ef:09:7f:bf:e1:e2:02: 51:9a:e3:b9:07:83:21:76:d1:e8:27:b7:1d:5d:5a:ce: 0a:2a:d0:e4:af:15:0b:b7:0f:1b:fb:62:d7:5d:f8:ad: d0:4a:5d:85:50:ce:b1:3e:f2:45:37:93:f7:30:a5:44: 61:cb:93:16:77:0f:a6:37:01:47:b7:e4:18:d9:57:9f: 68:1e:de:26:dd:7e:f3:fe:ce:16:75:c5:9f:47:c9:a4: 56:2c:17:2b:48:a0:56:c5:b4:42:43:02:71:b1:c6:51: 67:f2:d2:1d:42:27:78:c7:14:09:87:9b:7a:39:16:f7: 93:e3:d9:68:19:45:6b:78:97:a8:72:87:84:d9:3c:2e: e6:17:2e:18:00:b2:5f:5b:24:d2:e4:52:ea:5d:47:b7 Fingerprint (SHA-256): DE:8B:72:88:D2:6C:36:34:17:5E:EF:F3:52:6C:30:80:A6:18:0B:17:F7:44:9D:24:62:F8:81:49:0B:20:53:E6 Fingerprint (SHA1): B8:9A:9A:F5:00:11:26:81:38:56:D9:D7:49:EF:3C:06:42:DF:3B:00 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3707: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3708: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154141 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3709: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3710: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3711: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3712: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425154142 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3713: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3714: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3715: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3716: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154143 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3717: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3718: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3719: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3720: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 425154144 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3721: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3722: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3723: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3724: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425154145 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3725: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3726: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3727: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3728: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425154146 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3729: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3730: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #3731: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3732: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 425154147 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3733: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3734: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3735: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #3736: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #3737: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3738: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #3739: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154141 (0x1957565d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:52:12 2016 Not After : Sun Apr 25 15:52:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:80:56:4a:8d:5b:ee:6f:83:c0:f8:b4:5c:c3:d7:72: cc:b6:09:70:6a:02:ef:5a:2f:6e:69:90:ee:26:15:06: bc:13:0e:dc:35:bf:85:50:61:6e:6e:99:a8:0b:97:2b: 75:ea:3f:79:59:74:e3:01:45:73:6b:2a:44:5f:9c:26: 8c:c6:c2:b0:d0:4d:81:d0:57:21:06:b5:c6:aa:6f:d5: 97:75:8a:e2:ed:60:ff:a9:1a:68:fe:4e:9f:5d:66:41: 81:35:58:a2:d5:dc:f6:32:3e:5b:c5:7d:6c:b2:e9:02: e6:1e:1e:de:c5:4a:69:cc:41:17:d0:74:8f:40:e7:0b: 41:18:90:34:46:e0:49:32:10:28:26:7d:da:8e:d5:72: df:5f:21:fb:d7:6c:f5:b7:34:5b:67:95:a6:4f:32:2a: e6:b2:55:74:e0:88:56:b6:38:f7:15:ad:83:f3:dd:a5: 78:ee:57:a3:b8:38:5b:db:f4:04:27:5d:33:2f:2d:ff: 41:ab:54:13:9e:e0:58:17:02:ec:9e:19:cd:77:be:c1: e8:a2:56:58:f4:5e:ce:c7:0c:c8:20:c4:aa:e7:ce:83: ac:c0:a8:19:85:81:6a:b3:9f:6b:bf:97:77:3e:8e:25: 3f:fa:27:60:9c:f0:3d:81:2d:59:b8:da:da:d0:dc:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:f3:b1:59:15:a9:75:fc:71:3c:33:7e:a8:cf:b3:4c: 11:a4:db:14:32:2d:7f:e6:b0:96:37:99:a0:59:a0:7b: 8c:5c:03:e5:9f:2a:41:17:53:d5:e2:f5:7e:12:e2:a5: be:08:d3:c3:03:16:b5:10:4f:82:ef:3c:3e:10:a9:e9: 26:6f:0b:da:ca:a3:23:89:f3:d0:bb:8f:7e:82:5b:28: 89:21:51:0f:21:28:b9:5f:0d:dc:d6:5b:ff:3f:3f:4e: 8b:4a:76:3c:8b:36:a1:ad:3a:83:d3:3f:80:64:35:33: 75:ad:d2:8a:56:f8:a4:76:87:7d:e3:ab:b2:56:a4:45: 52:68:2d:d3:b5:59:5d:4b:10:7a:48:73:67:7f:ff:d9: 02:1b:c6:e9:fc:be:eb:5f:f0:32:e0:51:1c:1f:a9:cb: cc:e3:22:de:ab:d7:1a:16:6c:9f:ed:e2:dd:5b:b6:d3: f0:05:94:bd:7f:5a:69:04:3c:41:91:9f:7c:38:ba:de: b7:5e:55:30:ea:57:6c:68:37:e1:c3:f1:44:2d:fd:6b: b3:5f:d9:bc:44:49:ef:7d:5a:0a:d4:41:03:c1:e3:f3: f7:45:09:af:e4:04:b7:ee:16:74:06:06:a5:2e:08:93: 65:42:a0:f3:ee:a4:e4:4c:de:7b:63:d9:dd:fa:f5:da Fingerprint (SHA-256): 20:5A:22:95:BB:29:4D:3A:15:16:0B:EE:39:25:FB:FE:FE:B9:F5:A7:37:B4:2D:A0:FE:21:1A:39:34:CD:16:26 Fingerprint (SHA1): A7:E8:76:75:EF:7F:B6:09:EC:80:D3:93:08:04:EE:8C:0D:CF:17:76 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3740: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3741: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3742: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3743: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154141 (0x1957565d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:52:12 2016 Not After : Sun Apr 25 15:52:12 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:80:56:4a:8d:5b:ee:6f:83:c0:f8:b4:5c:c3:d7:72: cc:b6:09:70:6a:02:ef:5a:2f:6e:69:90:ee:26:15:06: bc:13:0e:dc:35:bf:85:50:61:6e:6e:99:a8:0b:97:2b: 75:ea:3f:79:59:74:e3:01:45:73:6b:2a:44:5f:9c:26: 8c:c6:c2:b0:d0:4d:81:d0:57:21:06:b5:c6:aa:6f:d5: 97:75:8a:e2:ed:60:ff:a9:1a:68:fe:4e:9f:5d:66:41: 81:35:58:a2:d5:dc:f6:32:3e:5b:c5:7d:6c:b2:e9:02: e6:1e:1e:de:c5:4a:69:cc:41:17:d0:74:8f:40:e7:0b: 41:18:90:34:46:e0:49:32:10:28:26:7d:da:8e:d5:72: df:5f:21:fb:d7:6c:f5:b7:34:5b:67:95:a6:4f:32:2a: e6:b2:55:74:e0:88:56:b6:38:f7:15:ad:83:f3:dd:a5: 78:ee:57:a3:b8:38:5b:db:f4:04:27:5d:33:2f:2d:ff: 41:ab:54:13:9e:e0:58:17:02:ec:9e:19:cd:77:be:c1: e8:a2:56:58:f4:5e:ce:c7:0c:c8:20:c4:aa:e7:ce:83: ac:c0:a8:19:85:81:6a:b3:9f:6b:bf:97:77:3e:8e:25: 3f:fa:27:60:9c:f0:3d:81:2d:59:b8:da:da:d0:dc:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:f3:b1:59:15:a9:75:fc:71:3c:33:7e:a8:cf:b3:4c: 11:a4:db:14:32:2d:7f:e6:b0:96:37:99:a0:59:a0:7b: 8c:5c:03:e5:9f:2a:41:17:53:d5:e2:f5:7e:12:e2:a5: be:08:d3:c3:03:16:b5:10:4f:82:ef:3c:3e:10:a9:e9: 26:6f:0b:da:ca:a3:23:89:f3:d0:bb:8f:7e:82:5b:28: 89:21:51:0f:21:28:b9:5f:0d:dc:d6:5b:ff:3f:3f:4e: 8b:4a:76:3c:8b:36:a1:ad:3a:83:d3:3f:80:64:35:33: 75:ad:d2:8a:56:f8:a4:76:87:7d:e3:ab:b2:56:a4:45: 52:68:2d:d3:b5:59:5d:4b:10:7a:48:73:67:7f:ff:d9: 02:1b:c6:e9:fc:be:eb:5f:f0:32:e0:51:1c:1f:a9:cb: cc:e3:22:de:ab:d7:1a:16:6c:9f:ed:e2:dd:5b:b6:d3: f0:05:94:bd:7f:5a:69:04:3c:41:91:9f:7c:38:ba:de: b7:5e:55:30:ea:57:6c:68:37:e1:c3:f1:44:2d:fd:6b: b3:5f:d9:bc:44:49:ef:7d:5a:0a:d4:41:03:c1:e3:f3: f7:45:09:af:e4:04:b7:ee:16:74:06:06:a5:2e:08:93: 65:42:a0:f3:ee:a4:e4:4c:de:7b:63:d9:dd:fa:f5:da Fingerprint (SHA-256): 20:5A:22:95:BB:29:4D:3A:15:16:0B:EE:39:25:FB:FE:FE:B9:F5:A7:37:B4:2D:A0:FE:21:1A:39:34:CD:16:26 Fingerprint (SHA1): A7:E8:76:75:EF:7F:B6:09:EC:80:D3:93:08:04:EE:8C:0D:CF:17:76 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3744: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3745: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3746: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154148 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3747: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3748: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3749: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3750: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425154149 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3751: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3752: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #3753: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3754: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 425154150 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3755: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3756: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #3757: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3758: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 425154151 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3759: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3760: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3761: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3762: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 425154152 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3763: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3764: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #3765: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3766: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 425154153 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3767: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3768: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #3769: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3770: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 425154154 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3771: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3772: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3773: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3774: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 425154155 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3775: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3776: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #3777: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3778: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 425154156 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3779: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3780: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #3781: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3782: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 425154157 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3783: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3784: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3785: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3786: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 425154158 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3787: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3788: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #3789: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3790: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 425154159 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3791: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3792: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #3793: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3794: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 425154160 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3795: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3796: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3797: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3798: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 425154161 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3799: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3800: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #3801: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3802: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 425154162 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3803: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3804: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #3805: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3806: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 425154163 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3807: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3808: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #3809: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3810: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 425154164 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3811: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3812: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #3813: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3814: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 425154165 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3815: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3816: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #3817: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3818: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 425154166 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3819: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3820: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #3821: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3822: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 425154167 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3823: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3824: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #3825: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3826: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 425154168 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3827: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3828: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #3829: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3830: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 425154169 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3831: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3832: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #3833: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3834: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 425154170 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3835: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3836: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #3837: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3838: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 425154171 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3839: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3840: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #3841: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3842: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 425154172 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3843: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3844: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #3845: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3846: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 425154173 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3847: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3848: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #3849: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3850: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 425154174 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3851: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3852: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3853: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3854: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 425154175 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3855: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3856: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3857: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3858: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 425154176 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3859: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3860: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3861: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3862: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 425154177 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3863: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3864: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3865: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3866: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3867: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3868: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3869: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3870: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3871: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3872: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3873: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3874: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3875: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3876: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3877: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3878: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3879: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3880: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3881: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3882: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3883: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3884: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3885: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3886: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3887: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154148 (0x19575664) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 15:53:56 2016 Not After : Sun Apr 25 15:53:56 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:8e:c9:61:46:e7:a0:e5:c6:b6:a2:63:4f:b8:96:28: 38:5d:fe:07:81:5a:9a:5e:95:07:f4:3c:41:e3:54:22: 59:78:b3:11:fb:18:17:90:22:e4:d3:b1:65:32:e4:3b: ac:43:0e:a3:ef:97:9e:b1:be:c7:dd:be:8e:34:f0:8f: 3f:cc:7c:59:57:7f:3c:8f:b1:72:86:04:56:62:54:36: 92:6a:7d:83:1b:75:f5:1c:eb:3d:dc:90:ab:85:c4:70: f9:62:6e:66:9a:fe:54:77:74:20:49:4c:eb:3e:25:09: 7f:41:7f:1d:a7:b2:29:e6:36:15:67:61:77:2a:56:b5: f5:70:cb:be:8d:7d:6e:34:ee:fd:b1:f1:b7:6d:7f:fe: 65:8b:0b:19:4b:0c:45:ea:93:3a:20:77:22:e4:e3:95: 0c:7e:0f:39:3e:14:53:af:ed:7c:fe:55:33:5c:66:1d: 8a:7e:5e:cf:8b:39:95:c4:41:f7:de:9d:02:77:91:ba: da:4e:cc:1a:5c:d0:36:cb:f6:3c:b1:08:51:d1:7a:9d: 82:b1:df:17:dc:47:d0:9d:c7:b6:d5:5f:6e:d2:2f:1b: 9a:a2:78:c4:f0:da:0b:e8:a7:1f:71:ee:8c:7b:36:b1: 78:8b:43:73:45:8e:25:70:22:58:2e:ce:28:20:c1:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:20:da:36:48:9d:e2:df:80:1d:07:17:8d:5c:1b:ae: b4:82:77:19:85:92:37:2c:40:33:57:c2:1e:67:d4:b2: 29:7a:e5:db:3f:88:96:22:4a:1d:a2:1d:78:ee:27:e1: b3:0b:31:e1:3a:d1:89:81:38:f5:57:ab:cb:35:2d:a8: 28:85:fc:c7:02:09:cb:a5:b9:65:7b:52:4a:9f:e4:d0: 3f:a7:9a:d2:14:bf:87:bb:f0:1b:b7:64:2b:19:65:ff: 28:c3:c3:24:e9:75:d1:59:ea:18:d4:9f:ba:03:ba:67: fc:d3:76:6a:5e:bf:06:f3:44:7c:8b:30:ca:eb:01:e0: 74:07:dc:73:86:c2:04:5d:99:79:2a:6f:8e:93:8c:d1: b4:39:4a:92:81:d4:e0:8e:43:96:95:fc:72:ca:ce:29: bc:11:eb:16:6e:93:7d:be:ae:b5:ba:07:49:36:48:42: 04:75:ce:54:6c:8b:8a:8a:a2:72:c0:d5:4d:11:8e:22: 3a:29:f4:ad:85:8a:6d:ff:a0:75:ab:eb:a3:d7:7d:9d: 4f:b9:41:80:6f:ff:4f:c0:ac:1d:1d:24:6f:88:5f:65: a3:10:1c:be:62:ec:c9:71:bb:fc:88:50:8d:30:02:f3: f3:05:2d:03:e7:0e:1f:0d:d9:ea:a3:f9:53:7d:f7:ff Fingerprint (SHA-256): 2A:5C:AA:4E:CD:77:9F:49:82:F2:14:97:E9:ED:75:8F:79:32:B0:B4:BC:76:E2:5F:56:53:66:84:FB:B3:FE:83 Fingerprint (SHA1): 6A:53:4A:7A:D0:B7:EB:81:02:C0:BE:C2:B3:DE:B5:1B:80:98:67:D5 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3888: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3889: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3890: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154178 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3891: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3892: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3893: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3894: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 425154179 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3895: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3896: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3897: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3898: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 425154180 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3899: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3900: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3901: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3902: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 425154181 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3903: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3904: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3905: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3906: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 425154182 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3907: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3908: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3909: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3910: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 425154183 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3911: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3912: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3913: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3914: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 425154184 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3915: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3916: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3917: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154178 (0x19575682) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:00:01 2016 Not After : Sun Apr 25 16:00:01 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:6f:68:d0:95:8c:ae:f6:25:f4:ce:82:79:d8:8b:5c: ff:21:5a:03:27:dc:1b:7f:4d:a3:19:66:63:1c:8e:ef: 31:1c:e0:66:58:3c:aa:66:ec:01:fa:a7:b9:c3:b9:dd: f1:84:cf:68:7a:0b:32:40:0a:03:5e:cb:70:9f:a0:a4: 80:b3:45:5b:d6:e8:dd:57:5c:86:32:34:8e:9a:21:17: 95:63:ac:4e:d9:75:cb:90:6a:d0:56:23:e4:96:b1:5a: a9:ca:98:c2:9d:d4:a0:f1:1c:95:9c:2b:81:e5:1c:66: 13:e3:5e:9e:c5:91:41:37:08:22:3c:9d:86:3b:bd:27: e8:b2:ce:43:ff:aa:fd:c9:37:6c:7b:ce:74:e4:75:4c: 5c:9d:43:3e:d3:a2:91:96:33:41:41:a2:d8:6f:6c:3b: c2:b0:32:bf:f4:65:fe:ae:01:f2:d6:05:83:ac:d5:ae: 61:1c:20:93:9d:36:87:a0:c6:e9:3e:91:08:05:81:af: e2:d8:ad:cd:fb:d3:b2:a2:fd:35:1f:37:b7:66:c4:d0: ac:b3:11:2a:bc:64:7a:70:98:25:18:71:87:b3:34:e7: 04:32:b1:cb:6e:ad:06:41:0f:13:d8:de:36:c2:11:95: 96:56:95:63:84:07:f3:3e:32:88:3b:e8:ae:a7:6f:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:0c:78:c4:10:f6:0b:b3:d5:81:c0:69:09:eb:e6:8b: d0:07:9e:34:2b:41:51:6b:91:39:62:72:fe:4d:a4:0e: 04:05:19:0c:f8:85:3f:48:4c:5f:46:d6:b6:c4:1d:02: 18:f5:89:e5:a7:c5:ed:64:f4:bc:71:57:e1:7f:02:50: aa:46:6d:31:8e:72:f4:8f:b9:47:b9:c5:fe:e2:46:07: 0a:3a:46:71:a1:d1:9e:e8:10:7f:21:79:19:23:12:fa: 3f:57:c0:35:68:93:cc:29:b9:66:00:c3:7f:d2:41:41: bc:1d:96:e9:00:d7:b6:73:c3:7d:88:db:84:8c:2a:67: 14:3d:74:a9:c4:2f:c6:48:f5:06:5d:45:3d:28:ef:5c: e9:73:44:eb:2f:68:41:20:9c:d2:78:4f:2c:0b:97:28: 56:df:f9:1e:59:da:93:18:11:99:f3:52:7f:d3:3b:3b: 39:8f:5d:03:94:8a:c0:3a:6f:26:21:88:9e:64:a9:98: 35:09:8f:c9:84:1f:07:e7:e0:db:8f:a9:96:a3:f8:3f: 02:8e:ea:03:c9:31:09:09:24:30:db:fa:7a:90:21:86: e3:a0:46:cc:77:11:9e:de:4e:76:e9:86:8b:90:cb:8a: 13:72:d4:ae:58:06:79:c3:c0:ae:c3:f6:39:48:09:d1 Fingerprint (SHA-256): B6:2D:D8:36:4F:BB:70:FC:D2:50:ED:CB:65:40:66:53:52:B1:F1:1E:1E:0F:97:65:1B:39:D1:18:4B:22:46:F9 Fingerprint (SHA1): DB:23:00:3B:B8:59:85:20:4A:99:93:3F:AA:5D:18:3F:36:75:5D:CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3918: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3919: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3920: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3921: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154178 (0x19575682) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:00:01 2016 Not After : Sun Apr 25 16:00:01 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:6f:68:d0:95:8c:ae:f6:25:f4:ce:82:79:d8:8b:5c: ff:21:5a:03:27:dc:1b:7f:4d:a3:19:66:63:1c:8e:ef: 31:1c:e0:66:58:3c:aa:66:ec:01:fa:a7:b9:c3:b9:dd: f1:84:cf:68:7a:0b:32:40:0a:03:5e:cb:70:9f:a0:a4: 80:b3:45:5b:d6:e8:dd:57:5c:86:32:34:8e:9a:21:17: 95:63:ac:4e:d9:75:cb:90:6a:d0:56:23:e4:96:b1:5a: a9:ca:98:c2:9d:d4:a0:f1:1c:95:9c:2b:81:e5:1c:66: 13:e3:5e:9e:c5:91:41:37:08:22:3c:9d:86:3b:bd:27: e8:b2:ce:43:ff:aa:fd:c9:37:6c:7b:ce:74:e4:75:4c: 5c:9d:43:3e:d3:a2:91:96:33:41:41:a2:d8:6f:6c:3b: c2:b0:32:bf:f4:65:fe:ae:01:f2:d6:05:83:ac:d5:ae: 61:1c:20:93:9d:36:87:a0:c6:e9:3e:91:08:05:81:af: e2:d8:ad:cd:fb:d3:b2:a2:fd:35:1f:37:b7:66:c4:d0: ac:b3:11:2a:bc:64:7a:70:98:25:18:71:87:b3:34:e7: 04:32:b1:cb:6e:ad:06:41:0f:13:d8:de:36:c2:11:95: 96:56:95:63:84:07:f3:3e:32:88:3b:e8:ae:a7:6f:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:0c:78:c4:10:f6:0b:b3:d5:81:c0:69:09:eb:e6:8b: d0:07:9e:34:2b:41:51:6b:91:39:62:72:fe:4d:a4:0e: 04:05:19:0c:f8:85:3f:48:4c:5f:46:d6:b6:c4:1d:02: 18:f5:89:e5:a7:c5:ed:64:f4:bc:71:57:e1:7f:02:50: aa:46:6d:31:8e:72:f4:8f:b9:47:b9:c5:fe:e2:46:07: 0a:3a:46:71:a1:d1:9e:e8:10:7f:21:79:19:23:12:fa: 3f:57:c0:35:68:93:cc:29:b9:66:00:c3:7f:d2:41:41: bc:1d:96:e9:00:d7:b6:73:c3:7d:88:db:84:8c:2a:67: 14:3d:74:a9:c4:2f:c6:48:f5:06:5d:45:3d:28:ef:5c: e9:73:44:eb:2f:68:41:20:9c:d2:78:4f:2c:0b:97:28: 56:df:f9:1e:59:da:93:18:11:99:f3:52:7f:d3:3b:3b: 39:8f:5d:03:94:8a:c0:3a:6f:26:21:88:9e:64:a9:98: 35:09:8f:c9:84:1f:07:e7:e0:db:8f:a9:96:a3:f8:3f: 02:8e:ea:03:c9:31:09:09:24:30:db:fa:7a:90:21:86: e3:a0:46:cc:77:11:9e:de:4e:76:e9:86:8b:90:cb:8a: 13:72:d4:ae:58:06:79:c3:c0:ae:c3:f6:39:48:09:d1 Fingerprint (SHA-256): B6:2D:D8:36:4F:BB:70:FC:D2:50:ED:CB:65:40:66:53:52:B1:F1:1E:1E:0F:97:65:1B:39:D1:18:4B:22:46:F9 Fingerprint (SHA1): DB:23:00:3B:B8:59:85:20:4A:99:93:3F:AA:5D:18:3F:36:75:5D:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3922: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3923: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3924: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3925: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154185 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3926: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3927: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3928: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3929: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154186 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3930: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3931: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3932: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3933: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154187 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3934: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3935: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3936: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3937: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425154188 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3938: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3939: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3940: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3941: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3942: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3943: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154185 (0x19575689) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:01:30 2016 Not After : Sun Apr 25 16:01:30 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:4d:e9:08:2f:47:80:45:b7:27:64:80:63:34:97:c2: 99:28:4b:07:14:4b:bd:ae:41:be:5e:be:a6:3a:7d:04: 7d:23:5c:a1:e9:ee:ad:4e:63:f7:97:fc:71:8d:46:1d: b0:20:e1:1f:f8:a1:ec:31:eb:b4:a0:5f:c0:25:49:38: f1:73:3f:ab:52:61:79:4c:1f:08:82:58:29:90:1e:1e: 7f:b6:c7:27:99:33:ab:e0:e2:be:eb:c8:0d:13:1c:4b: aa:13:44:5e:98:76:df:2a:96:a6:92:a8:db:3c:02:94: 80:29:c2:e1:83:29:0d:20:06:ff:1d:6d:fe:ea:01:67: 6b:19:0e:f1:73:d5:fc:d0:9e:34:b1:10:5c:88:eb:6f: 8a:fd:27:97:db:5d:ce:a0:17:98:34:f0:3d:98:8e:be: 0e:39:4c:d1:49:a4:cf:35:ae:c7:64:68:ea:75:9f:94: df:4e:11:3d:4c:f5:f3:79:08:e6:b8:5c:44:83:e9:aa: ad:36:f7:f4:d1:4b:a2:0a:bf:7c:7c:d5:a4:0e:45:7d: 03:70:df:8e:08:9c:99:c4:03:87:64:1c:1c:d3:2a:bf: 8d:51:8f:9b:63:76:e0:31:dd:9a:59:af:ab:3a:66:4f: 46:38:82:db:6e:60:4c:f6:30:c9:68:5a:78:ad:87:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:01:d0:51:ca:70:b9:d5:d2:a1:00:ae:f3:c3:30:9c: 2f:7b:3c:1f:93:d7:9b:a6:d4:c1:24:2f:51:78:ad:a9: 51:e1:08:05:51:f9:3b:bc:80:ba:ae:60:0f:9b:44:c7: e7:c9:49:81:94:ba:a0:84:6f:dd:09:4b:cf:f9:dc:58: 40:16:e4:f2:f1:4a:03:b1:ed:9d:a8:51:b9:0e:ee:62: 97:2e:e0:bc:21:b8:c1:53:c9:7f:bd:a0:a3:df:1a:f6: a4:08:34:ce:63:25:4b:0c:ef:e2:1a:1e:3a:9e:51:61: 51:c0:e5:4d:69:f4:bc:f7:bc:e1:10:47:e2:bc:9f:e7: 34:77:15:8c:83:b4:7a:50:f6:c5:eb:a7:f5:ec:d9:2d: 4d:f6:83:45:ea:b2:da:31:c2:be:53:ca:e5:41:76:a9: f8:47:0e:9e:46:8d:62:6a:5b:25:75:ef:d7:f2:7c:13: 83:98:64:4c:d4:eb:b3:42:55:53:cc:76:1d:3b:7f:32: a2:51:39:3b:d9:b4:04:ae:4f:01:c2:43:94:7d:c3:b2: 5c:fa:b4:58:12:71:7a:5d:91:22:9d:f3:82:3d:cd:68: 48:57:77:15:7e:e9:0e:34:01:18:ca:31:69:8c:d3:b7: 89:1e:63:83:6e:af:22:5f:35:06:e3:9b:4f:12:fc:a5 Fingerprint (SHA-256): 2D:84:67:08:B6:7D:49:07:FF:92:EC:0B:A3:96:05:99:E0:AF:FE:13:25:F8:45:22:F7:CB:68:57:3C:17:0F:53 Fingerprint (SHA1): 46:71:90:76:0B:66:F0:F5:E5:CF:CA:34:A7:31:11:58:0B:5A:4A:04 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3944: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3945: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3946: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154186 (0x1957568a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:01:40 2016 Not After : Sun Apr 25 16:01:40 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:3c:3e:bb:3c:81:4f:2e:fc:ed:c4:bc:a9:5d:18:97: e7:bf:2a:65:f9:08:02:8a:d7:d3:a0:57:0a:24:fb:6b: 45:a8:21:33:ae:7e:33:e5:75:43:97:d0:71:db:98:35: 8b:75:42:38:85:56:ec:15:da:ab:20:28:63:a1:50:a0: 23:8b:71:c1:e2:0b:08:10:27:32:8e:8e:7f:43:1f:0c: 0b:65:eb:71:bb:d7:39:1b:56:1a:6e:67:9e:88:44:0c: 6b:96:f9:84:05:03:d5:5f:cc:9d:f8:81:70:be:93:c3: 8f:46:ac:a3:d0:2a:ca:fd:db:f9:46:2d:fd:0a:79:41: 69:18:7a:49:73:af:01:d8:2e:78:5b:9f:57:1f:d2:36: 88:1c:5d:67:d2:38:e4:4f:12:12:0a:1a:f0:56:d6:ff: 0d:42:ec:f6:53:ed:0b:e7:68:7c:00:37:8b:d5:a4:27: be:08:f3:94:6f:9e:84:62:25:bb:78:5c:b5:7b:2c:92: 8c:9c:22:df:82:7c:25:1f:35:ce:96:f9:1f:cd:1c:b0: 3e:c4:eb:9c:f0:f4:6b:c1:23:50:0c:d4:55:4c:a5:79: 93:f9:a9:a7:21:47:00:c8:61:f9:65:ab:f1:ce:7b:f5: 8b:ac:c3:ed:48:da:e3:ed:d7:f0:19:69:58:e8:c9:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:93:62:c1:12:b0:53:3d:e7:4e:95:39:b1:32:87:d0: 83:b2:1d:14:e1:74:01:5c:6e:f6:9d:0d:ca:18:21:40: f2:a0:15:ba:b9:69:94:b3:7a:cb:c2:af:33:7c:4c:53: 18:aa:ab:6a:6c:88:5e:06:5a:a3:85:35:5e:d3:d8:49: f1:a1:b5:79:39:9b:9b:2a:5b:ce:16:c4:eb:19:a6:52: e8:8d:ac:d2:3d:64:a3:c1:9c:44:8a:c0:66:f7:73:75: 31:d9:86:01:ef:79:de:4c:77:98:20:4d:4d:61:f2:0f: 7b:20:23:30:35:7c:82:cc:ff:47:19:39:a7:09:bb:66: 46:dc:8c:48:af:e8:9e:f7:be:39:c5:d3:3a:31:65:5e: f5:49:31:2d:0a:48:39:8b:8b:d8:ce:eb:4c:f4:0d:de: a7:49:d8:3a:d8:f3:59:bd:24:13:5a:44:d1:e5:5f:d3: 9b:74:ff:96:79:a0:e4:dd:65:85:29:ec:73:27:ea:a0: 86:a0:d9:b6:cd:17:54:0b:3a:b6:4b:69:b4:6a:6b:7c: 6b:6b:15:2f:3a:9f:00:d1:0f:74:26:cc:c3:1a:e7:77: 6d:ae:32:17:19:47:bc:39:ea:2d:9f:bb:42:81:e2:37: a1:be:63:c8:dc:fe:13:fc:fd:a7:f4:a9:37:53:55:1c Fingerprint (SHA-256): 26:6E:53:CE:14:ED:4E:19:80:96:5F:7A:2F:6E:67:05:01:69:68:ED:F7:68:4E:60:FB:B3:81:E7:AA:C5:BF:9A Fingerprint (SHA1): 19:FF:FF:A1:9C:6E:EB:82:B1:08:EE:36:20:6C:B8:9F:8E:4E:8B:91 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3947: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3948: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154187 (0x1957568b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:02:00 2016 Not After : Sun Apr 25 16:02:00 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:f2:22:18:47:3e:60:63:19:dd:2a:34:59:5f:b4:4e: e1:55:3b:86:1c:79:6b:26:05:27:49:38:2f:f4:38:30: b9:c6:2a:63:c8:1f:05:7d:b3:44:12:2a:cd:2b:50:93: 55:83:6c:de:a3:03:87:24:11:5c:d0:d3:09:c6:7a:72: 11:2f:94:4a:47:24:1e:86:23:2c:71:94:ee:61:44:98: b8:fe:b0:a2:ac:ba:25:b9:c0:87:c1:47:1f:fe:dd:75: fa:54:83:21:b5:0b:b7:0a:d1:2d:e3:3f:f6:07:27:13: 73:8c:0c:d9:16:ae:e2:6c:fc:72:9f:af:ae:04:91:33: 66:82:96:2d:72:5d:1e:03:34:ed:cd:75:27:37:87:a9: 31:d7:21:5e:dc:f5:e6:ec:c0:a5:4e:16:ff:bc:ba:39: 41:e2:4c:74:e6:03:a0:30:1f:6e:3f:5c:bb:0e:4b:79: 79:dd:61:8d:71:69:35:d2:60:ae:70:19:70:9b:43:d2: af:45:04:24:31:84:52:4f:4a:67:98:0b:24:46:28:26: 32:63:40:31:b5:d7:5e:69:e9:36:dc:44:8e:19:4a:52: a0:b5:4f:9d:01:19:7a:82:5b:8b:d0:85:c6:0f:e8:9b: bb:5b:af:f4:8c:f8:d1:67:1f:40:70:e9:81:78:5c:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:d5:fa:73:05:fa:92:3c:7a:ef:fb:ad:36:71:1f:79: a2:02:7c:d3:95:c9:77:71:17:11:28:64:51:f3:dc:77: af:75:09:2e:cc:2b:41:d6:b1:2c:33:c3:15:9b:7f:f9: 5c:90:42:e9:c6:38:90:bc:f3:fa:51:2a:41:e6:da:18: 00:6a:83:e0:7b:94:df:18:4a:fa:a9:54:cc:18:2b:ca: e9:d6:70:ef:47:84:09:36:97:fb:b1:db:ff:13:40:45: 64:0e:cd:f1:0a:b2:cc:63:44:78:2f:61:a1:f5:72:a0: f5:e7:53:a7:d9:e7:22:a2:52:73:4f:33:b8:9c:83:56: a0:76:92:e9:89:b6:a0:3f:80:8c:d2:25:cf:a6:88:fe: 54:6a:c3:31:d1:fd:2f:a2:e3:04:13:14:bb:33:3a:6a: 2c:7c:a2:98:50:ef:44:69:f8:56:84:93:37:6b:ba:fd: da:60:d0:b3:61:c7:4e:86:9e:c1:81:be:2e:9c:c8:18: f1:0b:3a:1c:08:1d:c3:97:49:6c:1e:bd:6c:53:36:94: 5f:b2:d4:77:92:92:e9:c8:b8:83:8b:e2:19:a2:cd:c8: dc:fa:28:4e:9c:dc:fe:ca:1f:0e:1c:76:52:1b:e7:7c: 1e:30:28:2e:be:b0:0c:be:2a:b6:43:51:95:93:72:82 Fingerprint (SHA-256): 53:33:A8:BB:68:60:F8:7A:F2:D2:3D:99:5D:97:5D:7C:4A:D1:E2:5D:41:C3:F6:07:BE:49:72:35:E6:64:FD:A5 Fingerprint (SHA1): B5:10:AF:00:BD:EB:80:89:B7:29:18:D9:17:BA:63:9A:9C:10:EF:9F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3949: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3950: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154189 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3951: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3952: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3953: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3954: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154190 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3955: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3956: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3957: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3958: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154191 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3959: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3960: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3961: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3962: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 425154192 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3963: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3964: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3965: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3966: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 425154193 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3967: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3968: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3969: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3970: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3971: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3972: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3973: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154189 (0x1957568d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:02:24 2016 Not After : Sun Apr 25 16:02:24 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:1f:b4:40:a7:0c:30:d1:94:cc:01:fa:b2:1d:2b:54: ed:1f:fc:7e:59:94:e3:0e:16:47:98:e7:42:77:c4:e5: dd:97:be:ba:74:6b:d5:4d:6a:20:13:22:88:0e:c5:54: 19:c9:e7:b8:2d:d9:db:ba:77:1a:fc:2a:c7:f1:1f:51: 29:40:df:34:1a:34:d6:c0:fc:8b:d9:f3:6e:b6:36:8e: d4:4b:09:ff:21:a6:bb:97:95:45:62:8d:e4:b0:38:c3: bd:43:63:95:41:00:4a:ce:1f:1f:93:57:99:08:47:34: 93:5b:71:35:fa:d8:c9:7a:d0:de:00:ed:8b:41:b5:5c: df:41:1d:00:9e:69:ac:f9:c8:42:be:28:79:1a:3f:6d: 0d:49:46:76:7f:a4:8e:c6:03:9a:1a:a1:39:47:62:37: dc:00:37:d5:89:f7:57:0d:20:38:bc:af:66:31:f5:6b: ff:27:84:25:80:df:10:32:dc:59:80:5e:dc:fd:01:dd: 46:fb:48:50:ad:e0:40:dd:ca:25:f1:a8:f7:bd:70:19: cb:a1:ba:37:52:77:70:43:a3:02:61:54:dd:51:15:45: ff:d1:6a:ba:c1:26:e9:e3:6b:1c:6a:8a:4f:ed:b0:cb: e1:32:63:80:54:fb:0f:56:83:6a:54:ba:cc:b3:73:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:ed:60:fe:15:6d:9d:84:99:05:72:5b:ac:44:c1:28: 48:94:cf:84:6b:1a:7e:75:4c:72:dd:55:07:88:1d:40: f6:5f:14:86:eb:90:db:1b:0c:3e:76:bf:85:c5:4f:56: dc:68:4f:ca:7e:49:5c:57:41:a1:b7:17:bf:37:bf:56: 65:94:64:05:9c:e9:f8:49:d1:3a:ba:f4:97:b0:77:6e: fb:bb:39:5e:e0:08:29:49:b2:93:c3:d1:44:b4:0a:7b: 4e:97:5c:f6:45:e4:74:9d:66:ce:0b:37:c2:05:79:25: 1b:8a:17:cc:15:36:fa:dd:d3:68:b4:07:1d:b7:6b:e0: fc:95:0f:c5:e5:44:16:f9:ea:2a:c4:c5:96:25:13:10: 41:a3:4f:6b:74:61:73:7e:bb:11:75:f6:72:42:92:d7: 22:40:ae:01:53:24:f8:15:53:84:9b:1d:a0:bd:7d:bb: 1e:e6:95:5f:30:a5:7e:53:42:c6:3d:ac:97:82:03:f6: 1e:11:2a:c3:15:f2:27:3d:31:7d:d7:e3:c1:85:71:08: 03:07:ca:23:6b:b0:7d:49:b9:4b:2d:f4:d2:37:10:5f: 10:b8:e7:f6:cb:20:ee:27:59:01:72:66:e8:5e:72:60: d7:36:eb:f3:10:31:7e:5a:58:7e:b6:3b:b6:48:71:64 Fingerprint (SHA-256): F0:58:11:8F:68:56:20:D1:5D:58:31:D5:88:3E:EC:0A:16:21:9E:73:68:1D:E0:C3:C6:FE:CB:12:A1:43:CA:38 Fingerprint (SHA1): 1F:AF:07:28:76:60:9A:94:17:80:6A:C7:B6:38:E9:CF:40:D1:F3:47 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3974: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3975: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154190 (0x1957568e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:02:35 2016 Not After : Sun Apr 25 16:02:35 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:9f:39:3f:73:df:bc:a3:d9:47:12:6a:c4:fe:15:f3: 12:c6:de:6e:c2:aa:ad:be:05:9e:4c:28:c3:91:e0:61: 1b:dc:ff:9a:0d:69:68:00:e3:2a:b8:ac:bd:57:01:b4: 2d:fd:68:47:38:36:e6:27:2d:ea:b7:d4:4f:9a:0d:73: 72:c4:9e:62:89:83:e0:f4:09:4c:32:b1:c9:b5:f8:33: 3b:7a:ff:31:42:58:0e:54:a2:18:d6:0e:64:a7:bf:41: b4:d0:6e:47:35:ec:0b:79:6a:54:af:e2:e1:45:c5:5e: 1a:7a:b1:ec:98:46:ad:0a:02:aa:a9:1d:32:9f:b7:5c: 2e:f0:5d:78:ff:d8:f7:54:9d:c8:1e:bd:f5:d0:47:94: d4:20:da:82:b6:a2:9f:dd:e4:a1:b7:15:b1:17:29:e4: 55:62:f7:ff:97:77:55:1c:a9:73:ff:b9:4d:55:b2:7f: 37:81:86:60:c8:32:27:7d:9a:06:1f:ea:40:79:0d:a2: 3e:27:ce:89:a8:b0:4b:07:55:f5:4c:88:39:ed:da:34: 68:f4:04:51:9b:c0:96:b4:63:2b:7e:54:66:3b:8f:68: 1f:9d:10:31:a3:31:96:c1:d0:80:7e:6c:8b:c2:49:90: ca:27:12:8a:32:17:55:80:2b:d3:5b:c6:50:06:95:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:23:10:52:71:07:23:75:52:96:30:73:cb:2f:7b:28: 45:7d:79:55:65:41:74:57:99:a7:01:60:4a:92:cb:ed: b8:ec:f1:c1:c0:66:a2:97:1c:7e:76:cf:1c:b7:58:33: 5c:06:2d:02:c9:eb:d5:df:f2:d0:8e:3a:47:66:70:7a: 48:3d:64:9d:b1:17:f1:b5:65:48:57:06:36:3f:28:64: e0:81:6b:43:5e:72:11:5f:09:76:4f:c1:82:47:f5:db: 37:87:62:c4:b2:7b:54:f3:fb:7f:e1:a6:0a:01:79:00: 2f:21:39:6a:6c:48:45:19:e5:f2:fe:6b:0c:cc:41:bc: 7a:28:69:7f:2d:fa:6d:8e:60:d0:eb:b9:c0:0d:ef:e9: 1d:c8:ab:87:e7:35:0b:7b:54:98:28:82:f6:db:68:0c: 32:cb:9c:23:27:35:fd:44:0d:9b:1a:65:be:b3:76:00: 0e:eb:d8:23:f4:eb:b2:68:49:85:81:da:c9:99:b4:53: 36:77:55:8a:3e:fc:2c:a3:ca:9a:9b:f1:58:05:43:a7: 33:92:ab:1f:e1:54:fc:b5:0b:da:0b:ee:d4:5d:0d:ea: 59:26:31:06:9c:46:27:bf:2d:fb:40:20:e1:a0:8b:36: 80:a9:a2:1a:b4:a9:ad:26:5a:35:f4:f9:25:50:8b:a1 Fingerprint (SHA-256): D6:AE:11:21:CE:ED:64:E9:4B:F9:CB:6D:3A:53:97:DB:B5:C9:40:29:05:DF:5D:0D:65:60:2B:A0:AD:E7:F9:39 Fingerprint (SHA1): 41:C0:3A:EF:50:CE:D2:4F:6F:AD:48:6C:BA:D9:12:93:93:4D:F1:A5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3976: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3977: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3978: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154191 (0x1957568f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:02:42 2016 Not After : Sun Apr 25 16:02:42 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:18:8c:70:27:c7:23:27:a2:7d:af:b9:54:2c:50:89: 59:32:3e:cb:e3:28:fa:f5:43:96:d9:a5:8b:b5:d5:33: 48:47:55:ce:06:f6:03:3b:1f:dd:66:41:78:c9:e6:b1: ad:3b:fc:b4:e9:8e:0f:da:d3:c1:08:60:74:08:5f:9d: cc:17:17:df:41:80:bf:bc:97:65:e7:99:0d:6b:7f:69: a0:64:57:6a:2a:2d:57:64:45:7c:2e:56:0d:f1:06:f6: 75:53:56:24:47:cb:2d:22:f8:7c:23:ff:b1:d0:b2:69: 7c:c5:f6:a5:5a:97:46:50:e5:b4:fc:bb:ce:9b:9e:f2: d2:77:43:f2:e3:f2:fa:d2:46:c3:27:0c:56:b3:7c:0e: 7d:07:fb:aa:a7:e2:9f:97:34:ea:03:d8:4f:38:a8:9e: 25:49:0f:d0:c0:24:51:0c:93:cb:fa:f5:e8:de:62:55: eb:3d:54:68:36:d3:e9:ef:7c:1b:58:50:47:32:1a:b9: 51:8a:6d:5d:1a:8c:a7:b5:68:91:7c:e6:c5:55:75:10: 89:d5:db:2e:81:d0:02:e0:05:5f:57:b3:df:a6:c4:5d: 8a:b4:c6:9d:1e:75:ac:11:70:dc:77:ed:cf:2d:f7:f7: d0:a3:2a:90:56:ac:b1:d9:1a:03:19:a5:71:9c:ff:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:50:33:fd:d6:c2:71:e2:38:ee:3e:e0:e8:f1:00:87: 4d:1e:e0:8e:58:90:25:c0:88:1c:41:52:a0:31:3d:c9: 3f:c0:4f:7c:26:0f:0d:b2:34:b5:d9:c2:8d:13:0c:d9: fb:0e:25:56:5c:23:19:78:27:59:9c:f0:a9:d8:a2:f3: f2:65:bf:1e:fb:13:d6:61:54:85:c1:a3:23:3d:6a:d9: 78:98:01:b6:56:81:a1:83:dd:cf:84:54:8d:c2:da:fa: 7a:36:de:a5:1a:29:f5:8d:c0:e2:83:b9:6d:fe:b6:2f: a2:2f:f4:e5:7c:4f:f7:4a:22:a3:b3:68:d2:0f:31:ef: 16:30:9b:c5:5c:b8:82:73:4d:33:6b:74:d5:8d:07:f7: 1d:36:21:9a:fd:86:37:b9:86:33:00:30:d0:fd:ad:3a: d0:72:22:f1:5b:74:78:c1:e4:fc:60:15:7e:35:0b:2d: 8c:a4:80:ce:bb:58:0e:c3:32:7d:84:4b:df:23:a2:54: e3:56:15:d9:80:62:15:73:79:0b:86:be:3d:92:a6:e7: 72:62:93:a6:47:e9:35:c6:d5:e8:1a:6c:6c:de:ad:b3: 0e:bd:48:b7:d9:47:47:1a:91:1e:ca:da:e1:5c:37:26: a7:71:af:69:6c:1d:d1:3c:f1:0b:b7:f3:fb:4f:03:32 Fingerprint (SHA-256): DE:4B:9C:AB:9C:05:02:17:DC:EE:0C:60:EF:75:18:FE:1D:F4:71:9A:2D:81:2A:E8:D4:B3:63:2C:0E:AC:E2:FE Fingerprint (SHA1): CC:FE:BA:47:4D:D1:22:B4:1C:B8:A4:7C:10:71:95:C9:43:9E:32:C5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3979: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3980: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154194 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3981: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3982: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3983: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3984: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154195 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3985: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3986: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3987: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3988: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154196 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA1Root-425154103.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3989: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3990: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3991: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3992: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425154197 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3993: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3994: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3995: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154194 (0x19575692) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:03:38 2016 Not After : Sun Apr 25 16:03:38 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:61:83:f6:38:82:1c:85:63:0c:17:0b:eb:e5:2b:39: 17:98:88:14:18:e5:1a:d1:9c:64:24:d7:3c:1a:33:0b: e9:97:48:b3:8a:9c:c9:4a:40:53:f8:fd:76:4a:f2:6e: 8a:f7:de:16:50:f9:80:54:da:cc:52:90:d4:54:42:bd: a6:76:ab:13:07:56:e3:62:3e:a9:eb:c9:c3:13:eb:b3: c7:9d:92:ce:4c:c2:b3:15:c6:ee:8b:77:81:6b:84:68: d4:45:66:32:b3:d6:93:57:53:ff:57:be:5a:19:ec:cf: d1:8c:bb:00:6d:8b:fa:98:32:b5:41:83:8e:f5:96:36: 9b:8c:0b:54:50:f0:02:b4:d5:13:c2:46:b4:9c:3a:ee: 28:77:fd:f3:fc:12:5a:65:db:30:74:c5:93:14:32:e5: ad:b9:40:51:3d:cd:18:35:b8:07:0e:d6:3a:a3:ae:28: 84:cb:43:13:66:51:22:86:81:3b:0f:52:c7:7a:89:74: 84:a6:b0:7b:c3:80:93:a8:20:28:45:99:38:1e:96:1d: 43:37:92:b4:c1:16:12:93:d2:96:d7:57:a4:5d:bd:bd: 5a:d3:fb:62:b8:51:ee:1f:64:c6:60:74:11:6b:ef:75: 58:87:ab:47:36:ce:2c:57:86:d3:67:a6:9c:ff:45:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:3a:5c:33:48:9d:74:5f:bd:6d:73:be:e0:eb:16:3c: 45:f0:7d:5f:dc:51:a4:3f:e5:b4:e9:c1:25:22:99:ae: b1:1e:f8:de:3f:36:6f:59:e0:b6:14:8e:89:af:5b:de: 39:05:d4:35:68:10:c0:f1:ca:23:53:5b:c9:ff:a5:d2: b6:2d:33:a8:9a:26:db:ba:ed:44:04:f5:e5:aa:12:c7: 1d:cf:c1:a7:f4:11:77:e6:b2:75:a7:78:23:1c:a9:96: ee:7e:e1:9c:88:9d:86:66:b0:1b:b1:65:46:79:74:dd: 17:10:92:98:30:64:7a:9d:95:03:9d:5c:d9:91:3f:10: 0b:8a:08:c1:70:d1:42:b3:8d:95:14:34:99:09:eb:42: 71:7b:0d:2a:7a:22:07:85:a4:86:4f:1c:13:4f:13:9c: 0e:c3:40:0b:12:d8:7c:a6:e6:45:4a:16:c2:84:3f:b6: d1:74:27:7b:4a:6d:59:f4:0e:f6:b1:6f:38:8c:ca:2a: 59:aa:db:38:32:53:0e:54:62:c9:f9:49:f7:c2:0e:a4: a7:05:bb:00:ac:85:e5:3a:ca:03:f6:cf:e0:62:de:92: 20:11:f9:01:f6:75:4a:90:18:08:6c:38:7b:2e:62:a8: 5e:f0:ba:8c:c5:38:a3:2e:71:a6:b8:72:a9:6a:b0:e7 Fingerprint (SHA-256): 50:B9:3A:EA:E5:BF:7E:DC:AA:40:FF:20:FD:39:49:AE:FD:39:9F:61:FB:FC:76:57:57:DD:2E:F0:DA:E2:84:80 Fingerprint (SHA1): 98:92:42:96:B5:07:CE:09:9B:68:AC:F3:FB:C7:C8:C4:92:A6:21:66 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3996: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3997: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154198 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3998: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3999: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4000: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154199 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4001: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4002: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4003: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4004: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425154200 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4005: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4006: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425154201 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4007: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4008: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4009: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4010: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4011: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425154202 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425154104.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4012: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4013: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4014: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4015: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154203 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4016: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4017: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4018: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4019: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154199 (0x19575697) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:04:30 2016 Not After : Sun Apr 25 16:04:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:70:75:8c:c3:8d:e7:25:6c:ec:57:d6:e8:9c:88:e8: 83:01:7c:35:a5:e9:15:ba:3a:ad:30:92:03:de:dd:07: 8b:2c:84:80:9a:ce:c1:ca:f9:34:bb:e8:5c:8c:bf:81: 23:05:ce:9c:fa:0d:e2:d8:5b:31:37:45:f1:66:3f:90: d0:6c:b2:ce:39:ed:8c:0d:d5:07:19:34:ea:7a:be:28: 46:c5:d2:84:aa:28:89:70:ff:98:b3:db:8d:9e:c0:98: 29:75:06:bf:00:62:7a:4d:50:15:5d:4f:77:4c:8f:3f: e9:89:5a:4c:3d:a0:71:75:da:28:0c:c9:0d:5d:4d:26: ce:87:df:84:71:01:b3:fb:6a:de:e4:12:f9:35:e4:61: c1:db:d0:15:42:02:ce:8c:5a:1a:2e:62:ff:d1:82:91: 34:d6:33:1d:ef:f2:61:33:c2:6f:6c:d8:e4:7f:78:24: be:e2:10:64:b4:af:2d:ed:91:fd:ae:77:fb:c9:d5:1c: 96:d5:1f:c5:2e:4b:6e:4d:84:d3:c6:e2:ff:38:46:15: 41:61:e4:d2:57:eb:f0:92:7b:90:cf:0c:bd:71:68:25: 38:3a:4d:94:c6:1f:77:03:08:82:85:87:30:22:bf:f3: 64:9b:8d:32:1f:3f:fb:95:ac:5d:b4:af:6f:c5:94:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:d4:90:ec:10:ac:1e:4c:aa:59:4b:29:af:8b:88:78: ac:12:30:f4:6b:c8:96:99:6f:0e:85:74:de:df:1b:7f: dd:0e:f9:13:70:83:ac:e9:e4:33:ac:44:17:c6:4f:e8: 4c:5a:e6:77:36:4e:f1:f8:96:d5:a4:d3:b3:79:99:38: e1:23:e1:d7:7d:5e:a3:0a:6a:d6:1b:4e:fd:5c:cb:dc: 59:5b:ba:da:49:1a:6c:bc:5a:6c:9a:43:79:e8:f5:16: 27:3e:eb:84:22:91:00:0f:ef:28:61:1e:f0:8c:66:85: 27:0d:a4:37:89:8b:29:80:4c:f3:8a:8e:65:15:5a:f0: 2d:d9:4a:95:20:a8:03:25:bd:ad:6d:bd:7e:4c:1e:24: 9a:04:84:bd:26:2d:38:61:12:d1:99:70:ad:e0:cb:7d: e6:ad:e4:42:de:41:96:20:1f:fd:d1:18:44:b3:3c:95: e9:0a:b9:b2:15:3a:14:02:d3:b6:2e:f3:d0:d3:4a:42: 8e:d1:95:52:0b:87:bb:00:85:59:59:68:cb:c4:a5:8f: eb:16:67:18:9f:ae:d7:68:be:2e:37:42:8d:36:5e:15: 35:f3:bf:c8:12:8d:ed:ca:33:c0:d9:6a:eb:b9:65:bf: 1c:66:b3:a7:bf:a2:6b:48:d1:d3:9c:04:01:1e:5a:e2 Fingerprint (SHA-256): 3C:12:46:ED:8A:1D:4C:49:B8:3A:DC:AD:7E:F4:AD:09:1F:A7:F5:F3:D2:AA:E8:8C:BD:00:FA:2E:48:5E:81:5B Fingerprint (SHA1): 5C:7E:25:E4:0F:A6:2C:CA:8B:D1:69:2C:90:BC:2F:1B:30:F9:21:C7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4020: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154199 (0x19575697) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:04:30 2016 Not After : Sun Apr 25 16:04:30 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:70:75:8c:c3:8d:e7:25:6c:ec:57:d6:e8:9c:88:e8: 83:01:7c:35:a5:e9:15:ba:3a:ad:30:92:03:de:dd:07: 8b:2c:84:80:9a:ce:c1:ca:f9:34:bb:e8:5c:8c:bf:81: 23:05:ce:9c:fa:0d:e2:d8:5b:31:37:45:f1:66:3f:90: d0:6c:b2:ce:39:ed:8c:0d:d5:07:19:34:ea:7a:be:28: 46:c5:d2:84:aa:28:89:70:ff:98:b3:db:8d:9e:c0:98: 29:75:06:bf:00:62:7a:4d:50:15:5d:4f:77:4c:8f:3f: e9:89:5a:4c:3d:a0:71:75:da:28:0c:c9:0d:5d:4d:26: ce:87:df:84:71:01:b3:fb:6a:de:e4:12:f9:35:e4:61: c1:db:d0:15:42:02:ce:8c:5a:1a:2e:62:ff:d1:82:91: 34:d6:33:1d:ef:f2:61:33:c2:6f:6c:d8:e4:7f:78:24: be:e2:10:64:b4:af:2d:ed:91:fd:ae:77:fb:c9:d5:1c: 96:d5:1f:c5:2e:4b:6e:4d:84:d3:c6:e2:ff:38:46:15: 41:61:e4:d2:57:eb:f0:92:7b:90:cf:0c:bd:71:68:25: 38:3a:4d:94:c6:1f:77:03:08:82:85:87:30:22:bf:f3: 64:9b:8d:32:1f:3f:fb:95:ac:5d:b4:af:6f:c5:94:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:d4:90:ec:10:ac:1e:4c:aa:59:4b:29:af:8b:88:78: ac:12:30:f4:6b:c8:96:99:6f:0e:85:74:de:df:1b:7f: dd:0e:f9:13:70:83:ac:e9:e4:33:ac:44:17:c6:4f:e8: 4c:5a:e6:77:36:4e:f1:f8:96:d5:a4:d3:b3:79:99:38: e1:23:e1:d7:7d:5e:a3:0a:6a:d6:1b:4e:fd:5c:cb:dc: 59:5b:ba:da:49:1a:6c:bc:5a:6c:9a:43:79:e8:f5:16: 27:3e:eb:84:22:91:00:0f:ef:28:61:1e:f0:8c:66:85: 27:0d:a4:37:89:8b:29:80:4c:f3:8a:8e:65:15:5a:f0: 2d:d9:4a:95:20:a8:03:25:bd:ad:6d:bd:7e:4c:1e:24: 9a:04:84:bd:26:2d:38:61:12:d1:99:70:ad:e0:cb:7d: e6:ad:e4:42:de:41:96:20:1f:fd:d1:18:44:b3:3c:95: e9:0a:b9:b2:15:3a:14:02:d3:b6:2e:f3:d0:d3:4a:42: 8e:d1:95:52:0b:87:bb:00:85:59:59:68:cb:c4:a5:8f: eb:16:67:18:9f:ae:d7:68:be:2e:37:42:8d:36:5e:15: 35:f3:bf:c8:12:8d:ed:ca:33:c0:d9:6a:eb:b9:65:bf: 1c:66:b3:a7:bf:a2:6b:48:d1:d3:9c:04:01:1e:5a:e2 Fingerprint (SHA-256): 3C:12:46:ED:8A:1D:4C:49:B8:3A:DC:AD:7E:F4:AD:09:1F:A7:F5:F3:D2:AA:E8:8C:BD:00:FA:2E:48:5E:81:5B Fingerprint (SHA1): 5C:7E:25:E4:0F:A6:2C:CA:8B:D1:69:2C:90:BC:2F:1B:30:F9:21:C7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4021: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4022: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154204 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4023: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4024: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4025: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154205 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4026: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4027: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4028: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4029: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425154206 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4030: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4031: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425154207 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4032: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4033: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4034: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4035: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4036: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425154208 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425154105.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4037: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4038: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4039: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4040: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154209 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4041: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4042: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4043: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4044: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425154210 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-BridgeNavy-425154106.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4045: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4046: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4047: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4048: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425154211 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4049: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4050: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4051: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4052: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154205 (0x1957569d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:05:34 2016 Not After : Sun Apr 25 16:05:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:a5:c0:e7:ed:11:e5:c1:84:f8:1a:55:8b:ef:23:c2: b9:2e:74:27:6b:9d:eb:bd:68:22:0d:3a:95:25:5c:6e: 07:5c:13:af:a9:2d:0d:0b:57:0c:db:8b:f4:2a:96:7f: 33:30:86:7c:b2:62:94:06:b5:54:48:53:3b:ae:a5:2c: 04:08:47:6b:51:c3:6d:10:a2:06:b7:08:80:a5:97:af: 77:bb:73:b0:2e:d9:af:63:95:cb:01:0e:51:91:d8:a1: 2d:57:0b:56:60:77:2c:04:a9:63:79:cd:f9:08:ff:13: 0b:11:0b:39:a5:3c:89:f5:1f:ce:e9:6c:58:51:f8:35: e6:89:1b:00:ad:47:02:6c:21:14:07:a9:27:94:eb:fe: f8:fa:d2:6f:28:01:f2:dd:b0:54:03:04:7b:92:fa:4d: 06:c5:92:14:e2:9d:a7:eb:0a:1b:92:94:53:97:22:7e: 74:4f:e2:76:23:d8:f3:37:35:38:dc:98:e2:86:15:5a: 56:cf:cf:45:ba:76:24:9b:e6:27:b0:0a:77:49:db:6c: 9b:e3:45:c4:ac:02:13:4f:85:cc:70:49:cb:d1:c8:59: 6d:b1:a4:a5:d4:ab:cd:37:39:5c:74:c4:c1:26:fa:b2: 17:8a:3a:d0:b0:24:3d:11:b5:41:8d:e5:c0:33:79:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:7f:26:ee:f4:80:3b:1c:87:3c:58:98:ee:a1:d1:54: a6:fa:54:da:e1:73:0c:7a:52:c3:9b:7f:3b:fc:45:33: d8:33:b3:98:1a:e1:6d:52:18:76:6e:3c:13:0c:9f:59: 43:24:32:7a:c9:cf:51:af:b5:39:9b:9f:fd:1a:3a:42: 4e:9e:af:4e:c5:74:3b:31:c9:63:64:9d:31:8d:c1:a7: d1:ce:71:28:0d:6c:53:87:2a:06:41:36:29:4b:8a:c8: 3c:02:1f:a2:3e:15:01:23:48:2e:e1:12:6c:05:20:59: 3b:c1:a5:57:ce:df:4a:88:3e:13:10:b2:ec:a6:fd:d2: 56:77:d3:2e:9e:ca:60:d8:2c:b4:ca:9a:cb:8f:aa:a2: 7a:f6:9a:c2:0a:b6:7a:03:1f:02:d3:30:b0:50:2e:ac: 12:b4:c8:25:30:b1:99:4e:bc:b2:35:07:5e:8d:7c:97: c6:6c:5f:7b:51:3f:d1:b3:c9:5b:cd:b4:de:16:34:67: 04:f8:12:a4:b3:c5:ce:1e:10:94:16:c4:a2:fe:fc:44: 38:ef:69:c8:c8:03:e9:1f:92:c3:54:4b:17:f1:a2:92: 32:b4:0b:99:01:ec:bf:90:6f:08:6e:fa:4d:21:0d:c5: 84:97:bf:74:b1:40:95:72:42:1f:c6:2a:c3:c8:4f:9d Fingerprint (SHA-256): 9D:F5:11:55:D6:2D:AE:A6:12:84:75:BF:C0:BB:40:10:AB:74:35:20:D6:2E:92:9A:DC:34:DA:70:6D:FF:55:02 Fingerprint (SHA1): 76:11:39:C8:32:4F:4C:B2:43:62:78:5A:3A:AE:D2:29:E8:5F:2E:31 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4053: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154205 (0x1957569d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:05:34 2016 Not After : Sun Apr 25 16:05:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:a5:c0:e7:ed:11:e5:c1:84:f8:1a:55:8b:ef:23:c2: b9:2e:74:27:6b:9d:eb:bd:68:22:0d:3a:95:25:5c:6e: 07:5c:13:af:a9:2d:0d:0b:57:0c:db:8b:f4:2a:96:7f: 33:30:86:7c:b2:62:94:06:b5:54:48:53:3b:ae:a5:2c: 04:08:47:6b:51:c3:6d:10:a2:06:b7:08:80:a5:97:af: 77:bb:73:b0:2e:d9:af:63:95:cb:01:0e:51:91:d8:a1: 2d:57:0b:56:60:77:2c:04:a9:63:79:cd:f9:08:ff:13: 0b:11:0b:39:a5:3c:89:f5:1f:ce:e9:6c:58:51:f8:35: e6:89:1b:00:ad:47:02:6c:21:14:07:a9:27:94:eb:fe: f8:fa:d2:6f:28:01:f2:dd:b0:54:03:04:7b:92:fa:4d: 06:c5:92:14:e2:9d:a7:eb:0a:1b:92:94:53:97:22:7e: 74:4f:e2:76:23:d8:f3:37:35:38:dc:98:e2:86:15:5a: 56:cf:cf:45:ba:76:24:9b:e6:27:b0:0a:77:49:db:6c: 9b:e3:45:c4:ac:02:13:4f:85:cc:70:49:cb:d1:c8:59: 6d:b1:a4:a5:d4:ab:cd:37:39:5c:74:c4:c1:26:fa:b2: 17:8a:3a:d0:b0:24:3d:11:b5:41:8d:e5:c0:33:79:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:7f:26:ee:f4:80:3b:1c:87:3c:58:98:ee:a1:d1:54: a6:fa:54:da:e1:73:0c:7a:52:c3:9b:7f:3b:fc:45:33: d8:33:b3:98:1a:e1:6d:52:18:76:6e:3c:13:0c:9f:59: 43:24:32:7a:c9:cf:51:af:b5:39:9b:9f:fd:1a:3a:42: 4e:9e:af:4e:c5:74:3b:31:c9:63:64:9d:31:8d:c1:a7: d1:ce:71:28:0d:6c:53:87:2a:06:41:36:29:4b:8a:c8: 3c:02:1f:a2:3e:15:01:23:48:2e:e1:12:6c:05:20:59: 3b:c1:a5:57:ce:df:4a:88:3e:13:10:b2:ec:a6:fd:d2: 56:77:d3:2e:9e:ca:60:d8:2c:b4:ca:9a:cb:8f:aa:a2: 7a:f6:9a:c2:0a:b6:7a:03:1f:02:d3:30:b0:50:2e:ac: 12:b4:c8:25:30:b1:99:4e:bc:b2:35:07:5e:8d:7c:97: c6:6c:5f:7b:51:3f:d1:b3:c9:5b:cd:b4:de:16:34:67: 04:f8:12:a4:b3:c5:ce:1e:10:94:16:c4:a2:fe:fc:44: 38:ef:69:c8:c8:03:e9:1f:92:c3:54:4b:17:f1:a2:92: 32:b4:0b:99:01:ec:bf:90:6f:08:6e:fa:4d:21:0d:c5: 84:97:bf:74:b1:40:95:72:42:1f:c6:2a:c3:c8:4f:9d Fingerprint (SHA-256): 9D:F5:11:55:D6:2D:AE:A6:12:84:75:BF:C0:BB:40:10:AB:74:35:20:D6:2E:92:9A:DC:34:DA:70:6D:FF:55:02 Fingerprint (SHA1): 76:11:39:C8:32:4F:4C:B2:43:62:78:5A:3A:AE:D2:29:E8:5F:2E:31 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4054: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #4055: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154204 (0x1957569c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 16:05:22 2016 Not After : Sun Apr 25 16:05:22 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:86:69:f3:76:5c:48:78:b1:63:eb:de:26:24:b0:45: 05:4c:17:89:fd:e2:bb:df:7b:23:ba:a0:8a:27:06:29: 3b:ff:cf:fe:6c:10:2e:65:6a:85:65:51:11:be:0e:e3: fa:82:fa:24:ae:3e:68:b9:95:ff:85:35:9c:9a:0c:32: 0f:b0:56:10:bf:86:52:ea:77:c9:2d:0b:aa:8d:fd:a4: ad:00:68:b6:b7:81:16:de:13:db:92:70:0e:1c:cb:33: 83:f5:61:47:f5:eb:31:65:36:5b:fb:60:da:1f:96:e4: e6:62:2b:b3:b2:57:0f:ca:79:5c:d7:46:c2:21:16:1d: a3:0b:48:47:3e:07:79:38:43:36:99:38:4f:19:04:4d: 81:92:28:76:ae:8b:35:d2:8b:41:27:19:e9:b5:5e:d8: 57:c2:c0:0b:e3:80:91:c0:b7:d8:10:39:d8:53:d2:d9: d2:5b:b7:79:45:a5:1e:1c:c0:c5:f5:bb:40:b0:3b:f6: 20:33:fb:6c:1b:01:22:0e:12:4f:b7:47:18:be:a2:5c: af:80:ea:c2:6a:28:f5:40:99:7e:90:da:4b:79:c7:b3: c7:f7:cd:c0:5e:30:30:45:c6:04:96:b1:61:16:02:5e: a8:ea:f7:f0:77:bf:b9:6f:fb:2d:19:d2:77:64:6a:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:34:c8:a7:12:74:01:6e:a4:2d:41:82:9a:87:ac:c6: 25:b3:21:e2:a4:f8:f3:6d:ae:78:f7:01:af:9f:44:13: a8:8c:7b:3c:8f:70:a8:8d:46:00:a4:35:a2:0a:8e:ec: 7c:10:e9:a9:10:02:c0:c9:1d:77:80:9a:89:91:2d:74: 4d:0e:a2:bc:b9:ec:31:d3:bd:25:59:f1:cb:c8:88:1e: a1:c5:20:25:e1:9d:b9:77:33:b2:a6:15:5a:07:f9:de: 25:25:4f:44:78:02:e2:56:49:7a:f1:7e:ce:aa:07:a4: 36:aa:00:59:34:aa:a2:3e:b1:bb:59:18:4f:f6:6b:68: 77:24:1e:46:eb:04:20:a6:4f:fd:a1:e9:86:4c:cc:ec: 8d:11:7f:39:33:1c:66:d5:dd:86:e1:d3:7f:10:b5:6f: 51:e4:e1:b9:bd:dc:d5:0b:71:14:df:66:cd:f8:f1:b3: cc:bf:01:65:97:ca:9d:d6:a8:af:79:ed:01:0c:9f:40: ba:ea:e0:8e:02:39:4c:17:21:8c:48:cc:d3:15:53:e9: 6c:b9:de:b1:ac:4b:00:f1:9a:c5:90:b7:fc:4d:31:b4: b3:1a:41:2f:02:64:29:19:bd:35:70:2d:2f:0a:3d:eb: b3:e9:b0:0a:2e:f7:3d:22:c6:0a:61:75:e6:c7:54:cc Fingerprint (SHA-256): 7C:B5:DE:C3:2A:7B:3D:36:31:02:B8:95:4B:12:49:37:07:69:47:A1:EB:B8:4E:71:EE:D7:16:D3:01:D9:A2:E9 Fingerprint (SHA1): 79:9A:7F:8A:0D:D4:D2:11:C7:3D:D4:07:49:19:F3:36:E7:6E:86:90 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4056: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154205 (0x1957569d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:05:34 2016 Not After : Sun Apr 25 16:05:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:a5:c0:e7:ed:11:e5:c1:84:f8:1a:55:8b:ef:23:c2: b9:2e:74:27:6b:9d:eb:bd:68:22:0d:3a:95:25:5c:6e: 07:5c:13:af:a9:2d:0d:0b:57:0c:db:8b:f4:2a:96:7f: 33:30:86:7c:b2:62:94:06:b5:54:48:53:3b:ae:a5:2c: 04:08:47:6b:51:c3:6d:10:a2:06:b7:08:80:a5:97:af: 77:bb:73:b0:2e:d9:af:63:95:cb:01:0e:51:91:d8:a1: 2d:57:0b:56:60:77:2c:04:a9:63:79:cd:f9:08:ff:13: 0b:11:0b:39:a5:3c:89:f5:1f:ce:e9:6c:58:51:f8:35: e6:89:1b:00:ad:47:02:6c:21:14:07:a9:27:94:eb:fe: f8:fa:d2:6f:28:01:f2:dd:b0:54:03:04:7b:92:fa:4d: 06:c5:92:14:e2:9d:a7:eb:0a:1b:92:94:53:97:22:7e: 74:4f:e2:76:23:d8:f3:37:35:38:dc:98:e2:86:15:5a: 56:cf:cf:45:ba:76:24:9b:e6:27:b0:0a:77:49:db:6c: 9b:e3:45:c4:ac:02:13:4f:85:cc:70:49:cb:d1:c8:59: 6d:b1:a4:a5:d4:ab:cd:37:39:5c:74:c4:c1:26:fa:b2: 17:8a:3a:d0:b0:24:3d:11:b5:41:8d:e5:c0:33:79:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:7f:26:ee:f4:80:3b:1c:87:3c:58:98:ee:a1:d1:54: a6:fa:54:da:e1:73:0c:7a:52:c3:9b:7f:3b:fc:45:33: d8:33:b3:98:1a:e1:6d:52:18:76:6e:3c:13:0c:9f:59: 43:24:32:7a:c9:cf:51:af:b5:39:9b:9f:fd:1a:3a:42: 4e:9e:af:4e:c5:74:3b:31:c9:63:64:9d:31:8d:c1:a7: d1:ce:71:28:0d:6c:53:87:2a:06:41:36:29:4b:8a:c8: 3c:02:1f:a2:3e:15:01:23:48:2e:e1:12:6c:05:20:59: 3b:c1:a5:57:ce:df:4a:88:3e:13:10:b2:ec:a6:fd:d2: 56:77:d3:2e:9e:ca:60:d8:2c:b4:ca:9a:cb:8f:aa:a2: 7a:f6:9a:c2:0a:b6:7a:03:1f:02:d3:30:b0:50:2e:ac: 12:b4:c8:25:30:b1:99:4e:bc:b2:35:07:5e:8d:7c:97: c6:6c:5f:7b:51:3f:d1:b3:c9:5b:cd:b4:de:16:34:67: 04:f8:12:a4:b3:c5:ce:1e:10:94:16:c4:a2:fe:fc:44: 38:ef:69:c8:c8:03:e9:1f:92:c3:54:4b:17:f1:a2:92: 32:b4:0b:99:01:ec:bf:90:6f:08:6e:fa:4d:21:0d:c5: 84:97:bf:74:b1:40:95:72:42:1f:c6:2a:c3:c8:4f:9d Fingerprint (SHA-256): 9D:F5:11:55:D6:2D:AE:A6:12:84:75:BF:C0:BB:40:10:AB:74:35:20:D6:2E:92:9A:DC:34:DA:70:6D:FF:55:02 Fingerprint (SHA1): 76:11:39:C8:32:4F:4C:B2:43:62:78:5A:3A:AE:D2:29:E8:5F:2E:31 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4057: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154205 (0x1957569d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:05:34 2016 Not After : Sun Apr 25 16:05:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:a5:c0:e7:ed:11:e5:c1:84:f8:1a:55:8b:ef:23:c2: b9:2e:74:27:6b:9d:eb:bd:68:22:0d:3a:95:25:5c:6e: 07:5c:13:af:a9:2d:0d:0b:57:0c:db:8b:f4:2a:96:7f: 33:30:86:7c:b2:62:94:06:b5:54:48:53:3b:ae:a5:2c: 04:08:47:6b:51:c3:6d:10:a2:06:b7:08:80:a5:97:af: 77:bb:73:b0:2e:d9:af:63:95:cb:01:0e:51:91:d8:a1: 2d:57:0b:56:60:77:2c:04:a9:63:79:cd:f9:08:ff:13: 0b:11:0b:39:a5:3c:89:f5:1f:ce:e9:6c:58:51:f8:35: e6:89:1b:00:ad:47:02:6c:21:14:07:a9:27:94:eb:fe: f8:fa:d2:6f:28:01:f2:dd:b0:54:03:04:7b:92:fa:4d: 06:c5:92:14:e2:9d:a7:eb:0a:1b:92:94:53:97:22:7e: 74:4f:e2:76:23:d8:f3:37:35:38:dc:98:e2:86:15:5a: 56:cf:cf:45:ba:76:24:9b:e6:27:b0:0a:77:49:db:6c: 9b:e3:45:c4:ac:02:13:4f:85:cc:70:49:cb:d1:c8:59: 6d:b1:a4:a5:d4:ab:cd:37:39:5c:74:c4:c1:26:fa:b2: 17:8a:3a:d0:b0:24:3d:11:b5:41:8d:e5:c0:33:79:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:7f:26:ee:f4:80:3b:1c:87:3c:58:98:ee:a1:d1:54: a6:fa:54:da:e1:73:0c:7a:52:c3:9b:7f:3b:fc:45:33: d8:33:b3:98:1a:e1:6d:52:18:76:6e:3c:13:0c:9f:59: 43:24:32:7a:c9:cf:51:af:b5:39:9b:9f:fd:1a:3a:42: 4e:9e:af:4e:c5:74:3b:31:c9:63:64:9d:31:8d:c1:a7: d1:ce:71:28:0d:6c:53:87:2a:06:41:36:29:4b:8a:c8: 3c:02:1f:a2:3e:15:01:23:48:2e:e1:12:6c:05:20:59: 3b:c1:a5:57:ce:df:4a:88:3e:13:10:b2:ec:a6:fd:d2: 56:77:d3:2e:9e:ca:60:d8:2c:b4:ca:9a:cb:8f:aa:a2: 7a:f6:9a:c2:0a:b6:7a:03:1f:02:d3:30:b0:50:2e:ac: 12:b4:c8:25:30:b1:99:4e:bc:b2:35:07:5e:8d:7c:97: c6:6c:5f:7b:51:3f:d1:b3:c9:5b:cd:b4:de:16:34:67: 04:f8:12:a4:b3:c5:ce:1e:10:94:16:c4:a2:fe:fc:44: 38:ef:69:c8:c8:03:e9:1f:92:c3:54:4b:17:f1:a2:92: 32:b4:0b:99:01:ec:bf:90:6f:08:6e:fa:4d:21:0d:c5: 84:97:bf:74:b1:40:95:72:42:1f:c6:2a:c3:c8:4f:9d Fingerprint (SHA-256): 9D:F5:11:55:D6:2D:AE:A6:12:84:75:BF:C0:BB:40:10:AB:74:35:20:D6:2E:92:9A:DC:34:DA:70:6D:FF:55:02 Fingerprint (SHA1): 76:11:39:C8:32:4F:4C:B2:43:62:78:5A:3A:AE:D2:29:E8:5F:2E:31 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4058: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4059: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154212 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4060: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4061: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4062: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154213 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4063: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4064: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #4065: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4066: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 425154214 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4067: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4068: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #4069: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4070: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 425154215 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4071: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4072: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4073: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4074: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 425154216 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4075: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4076: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 425154217 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4077: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4078: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #4079: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4080: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4081: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425154218 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4082: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4083: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4084: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4085: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425154219 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4086: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4087: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4088: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4089: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154220 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4090: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4091: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4092: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4093: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425154221 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4094: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4095: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4096: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154212 (0x195756a4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 16:07:00 2016 Not After : Sun Apr 25 16:07:00 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:89:c3:12:37:f0:ed:66:53:fb:a6:19:34:49:bb:3e: e1:36:6e:e3:23:ee:04:b0:12:3f:bc:f1:90:15:e6:97: 15:cd:cb:ee:39:6e:f5:6f:f6:fb:2e:0d:9f:e2:fa:7e: 35:3c:1c:58:23:23:98:18:60:09:69:76:a0:41:62:d3: 74:b3:51:b4:a2:c1:f4:15:9e:e0:e0:57:b1:7f:c5:cd: a3:e6:a2:f6:14:73:5e:a3:26:5e:80:da:55:80:bf:fa: 58:55:7d:12:3a:2a:68:93:6d:76:ce:dc:51:81:29:aa: bd:ee:b5:4a:97:0e:87:12:a6:ca:e1:c0:95:fd:4e:98: 3e:f1:81:38:f5:21:5a:d2:6a:d4:51:e4:00:b4:61:10: 4c:96:3c:54:41:ef:ce:5d:70:c9:90:62:0f:29:57:8b: 58:a9:8d:a1:c2:7a:6d:36:6c:14:c0:19:c4:af:28:d5: a8:0d:ff:b4:86:dd:43:90:82:75:77:28:5d:81:62:ee: 7d:9e:8b:93:0f:e7:b4:ba:5d:ab:f8:4d:33:0f:f9:4f: 0d:77:25:e7:62:16:0e:a9:a5:d0:62:51:cd:1d:01:ba: ef:92:c0:d8:8c:00:a6:2b:cf:5c:8f:f9:83:90:be:38: 0d:27:6f:ff:e8:04:52:a5:01:d1:3c:b9:2e:d6:43:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:ec:14:78:66:b8:02:36:4a:ac:d5:91:0a:35:30:73: 33:61:4c:23:cd:91:c4:da:29:6f:d8:16:f1:1a:00:23: 56:94:4b:20:dd:62:6b:29:bc:17:2a:3a:02:39:9d:d0: 7a:33:b7:22:6c:f2:8f:9e:69:b9:b9:cf:ef:dd:8a:49: b4:95:2d:71:d0:d7:26:46:bc:3c:c0:df:6c:be:79:2d: 9a:44:ba:55:1e:bb:86:07:0d:7e:1d:44:89:2c:dd:f5: 57:11:fa:6c:e1:50:d4:e2:8d:4f:83:28:d6:96:5b:45: 8a:fa:cf:58:25:dd:40:fa:76:e5:83:ef:8b:d8:50:51: 93:be:36:e6:ef:4f:6a:0d:5e:63:18:30:00:5d:19:ea: cf:50:1b:4e:ea:ff:02:6d:be:dd:32:f1:bc:78:60:36: 7e:7d:a7:3e:88:76:83:9d:a5:c5:0b:06:b0:af:ec:a8: 06:02:44:40:51:df:f2:91:83:fe:6e:3e:17:2b:2c:48: ed:87:24:c6:6c:b9:93:e7:2b:45:54:08:0f:5f:bb:54: 3b:8e:60:66:9f:6d:c7:8b:37:b5:e5:50:89:4b:07:c2: db:63:6e:34:b5:90:d7:44:48:56:ed:89:6e:40:28:24: a6:74:8a:90:cf:3c:b7:f6:98:17:bd:0e:04:62:2b:a9 Fingerprint (SHA-256): 04:1F:92:1A:56:2C:B8:5E:A1:05:76:15:44:7D:30:09:17:9C:C0:61:F0:94:EE:92:40:E0:02:35:F1:4D:96:42 Fingerprint (SHA1): C9:0A:2A:0C:81:32:90:1D:2E:83:A8:5E:05:BF:09:CC:1A:1F:DF:A4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #4097: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4098: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4099: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4100: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4101: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4102: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4103: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4104: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4105: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154213 (0x195756a5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:07:06 2016 Not After : Sun Apr 25 16:07:06 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:96:c4:07:30:a4:c1:6e:50:f9:4d:4c:90:e8:c2:c4: 24:85:92:29:ab:e5:66:f4:7d:ee:28:72:ef:24:a2:c5: bc:af:1f:0e:6f:cf:1e:9b:4a:e8:0b:16:a8:bc:39:9e: 65:ed:9b:c3:dd:3f:22:8d:f8:16:ff:13:3a:2d:4a:7f: 62:71:78:da:e0:b1:90:3e:d0:53:bf:1e:81:ba:03:53: f6:65:04:b1:7b:ef:92:3d:8f:b4:66:9b:23:8e:79:cb: 78:1b:ad:3c:fe:87:7d:3d:f1:59:68:0f:0f:63:da:b1: 2f:96:14:e0:72:82:2d:6d:8d:49:6d:76:18:4d:0d:2c: a3:a5:16:ed:30:fe:41:82:e4:8c:80:5c:2e:79:b9:00: ea:a8:28:6d:73:f5:6d:63:e2:35:7c:80:fe:48:58:d6: 7a:b2:c3:89:8a:f1:29:e4:47:ae:98:64:70:dc:8f:2f: f0:73:ca:d4:d2:d2:5c:fc:82:ee:9d:5e:fa:e9:41:e7: 36:c0:8c:7d:60:e4:45:8d:1f:e3:e6:bf:27:51:17:40: 7c:f0:06:cf:12:9f:89:4c:7d:e0:2c:b5:d8:d4:36:9a: 50:37:b3:6f:0b:9a:95:3a:73:a9:fa:2d:2b:97:1a:39: 7c:e2:db:d6:31:0e:4f:c4:a3:0a:aa:1b:a2:30:09:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:e4:a0:e6:83:14:df:ff:e9:9c:28:51:94:e5:32:ae: 63:32:9b:51:18:c3:0e:4a:9f:44:47:7e:44:eb:64:88: 7e:1f:d8:52:f6:19:af:29:d2:cb:bc:9d:0f:b9:63:55: a2:18:b6:e0:ae:a1:e4:69:e8:e4:ba:fd:89:2b:17:9c: 7d:75:cd:01:b8:7a:b1:b8:67:7b:aa:33:f6:bc:8e:c1: 3d:94:c7:08:a9:a9:9a:35:16:4f:cd:5f:de:26:6a:7e: d3:4c:f3:52:cb:46:18:52:93:fd:77:90:fe:ad:c1:39: 8a:4d:aa:66:77:1a:3d:2b:03:00:f2:d7:c5:f7:85:e3: 80:86:97:99:6e:2d:a0:4f:00:40:67:97:ca:3d:e6:bb: 59:68:65:74:a9:2f:80:ac:42:a9:95:98:b4:ac:f3:07: fd:5a:b3:1b:3c:28:23:ec:29:fc:30:e3:ef:cd:04:f1: 7e:a7:33:43:f4:82:f8:b9:06:00:36:d3:e8:0b:00:e5: aa:e1:ca:b1:af:00:36:dd:ee:3b:40:5f:54:b2:6f:d5: ee:3d:b6:90:6b:df:ee:2a:cc:aa:8a:77:82:82:fa:28: 5a:35:ac:07:61:c2:ac:f2:b6:9b:aa:2c:45:66:c7:db: b6:b2:d7:9c:bb:9e:d7:b0:87:88:1c:0f:f8:1e:63:f4 Fingerprint (SHA-256): 8D:CB:8C:38:C9:AE:42:EA:63:1C:DB:D7:F3:3B:E4:DC:88:4F:F1:60:4E:1B:D4:32:30:E1:C9:C6:87:DF:96:67 Fingerprint (SHA1): E5:FE:CD:A7:24:4E:24:2E:5C:CD:B4:1C:BF:BF:28:94:C6:4F:BC:18 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #4106: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4107: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4108: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4109: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4110: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4111: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4112: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #4113: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #4114: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #4115: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #4116: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #4117: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #4118: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #4119: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #4120: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #4121: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #4122: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #4123: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4124: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154222 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4125: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4126: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4127: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4128: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154223 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4129: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4130: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4131: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4132: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154224 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4133: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4134: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4135: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4136: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 425154225 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4137: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4138: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4139: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4140: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425154226 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4141: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4142: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4143: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4144: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 425154227 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4145: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4146: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #4147: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4148: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 425154228 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4149: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4150: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #4151: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4152: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 425154229 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4153: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4154: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #4155: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4156: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 425154230 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4157: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4158: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4159: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154222 (0x195756ae) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:08:36 2016 Not After : Sun Apr 25 16:08:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 66:88:7c:3b:1f:db:f8:55:44:09:8a:75:18:e7:fe:7d: 0f:9b:25:9d:f9:5f:1b:e0:31:24:ec:c3:87:38:9d:78: c3:51:25:88:cb:31:57:1d:6c:ee:84:10:8f:b0:8d:e9: 3e:0f:05:b8:f1:0b:37:8a:48:e3:2e:71:40:ea:70:c7: f4:91:6b:37:ca:04:dd:ef:c7:3f:02:cf:98:ac:6f:19: b3:78:48:c3:aa:21:d6:27:76:cc:39:da:88:bf:d9:2c: 11:c4:cb:a3:7c:2f:32:9f:74:1c:a4:f6:82:8e:aa:d3: bd:4e:21:1c:cf:f2:ee:ab:e5:2b:d3:65:61:e5:1f:93: e6:4a:ca:ce:0c:52:39:08:b6:ad:7e:10:1b:38:b3:31: 94:6e:79:fa:c2:67:e7:7d:d4:82:b2:21:3d:8e:0a:58: ee:0e:c5:19:ff:8e:c5:a1:f7:b6:4b:b4:40:35:47:42: 75:d2:52:0d:0d:34:23:17:f6:e6:f7:29:72:73:d7:ba: e1:bb:54:0a:57:25:af:19:76:97:6b:d6:cc:e8:ca:16: b9:e4:ca:ab:76:09:74:b4:fc:10:27:32:ec:cd:e9:8a: db:c4:33:81:ef:7c:54:90:c4:47:c1:87:11:b9:33:d1: 70:1e:7f:28:a2:d3:c4:11:d1:b9:3f:f9:ff:8e:b0:b3 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:cd:23:68:a8:0e:32:3b:f5:c0:a2:b9: cc:fd:f2:9f:b0:5f:12:c5:fa:c4:72:20:ff:47:30:8c: 36:02:1d:00:e4:b9:4e:7a:69:02:bc:d3:2d:6c:f0:ea: a8:45:6b:6b:9f:cf:01:56:3c:3d:fa:81:4b:31:21:00 Fingerprint (SHA-256): 9B:F7:D6:2C:DC:04:A4:CB:99:B7:B2:9F:FA:20:0F:CB:79:28:97:E5:86:07:39:AE:1E:76:4F:64:15:36:28:CF Fingerprint (SHA1): 4A:D2:A0:01:0B:F9:87:7B:21:2D:93:49:D0:CC:9B:06:26:C4:C9:B5 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4160: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154222 (0x195756ae) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:08:36 2016 Not After : Sun Apr 25 16:08:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 66:88:7c:3b:1f:db:f8:55:44:09:8a:75:18:e7:fe:7d: 0f:9b:25:9d:f9:5f:1b:e0:31:24:ec:c3:87:38:9d:78: c3:51:25:88:cb:31:57:1d:6c:ee:84:10:8f:b0:8d:e9: 3e:0f:05:b8:f1:0b:37:8a:48:e3:2e:71:40:ea:70:c7: f4:91:6b:37:ca:04:dd:ef:c7:3f:02:cf:98:ac:6f:19: b3:78:48:c3:aa:21:d6:27:76:cc:39:da:88:bf:d9:2c: 11:c4:cb:a3:7c:2f:32:9f:74:1c:a4:f6:82:8e:aa:d3: bd:4e:21:1c:cf:f2:ee:ab:e5:2b:d3:65:61:e5:1f:93: e6:4a:ca:ce:0c:52:39:08:b6:ad:7e:10:1b:38:b3:31: 94:6e:79:fa:c2:67:e7:7d:d4:82:b2:21:3d:8e:0a:58: ee:0e:c5:19:ff:8e:c5:a1:f7:b6:4b:b4:40:35:47:42: 75:d2:52:0d:0d:34:23:17:f6:e6:f7:29:72:73:d7:ba: e1:bb:54:0a:57:25:af:19:76:97:6b:d6:cc:e8:ca:16: b9:e4:ca:ab:76:09:74:b4:fc:10:27:32:ec:cd:e9:8a: db:c4:33:81:ef:7c:54:90:c4:47:c1:87:11:b9:33:d1: 70:1e:7f:28:a2:d3:c4:11:d1:b9:3f:f9:ff:8e:b0:b3 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:cd:23:68:a8:0e:32:3b:f5:c0:a2:b9: cc:fd:f2:9f:b0:5f:12:c5:fa:c4:72:20:ff:47:30:8c: 36:02:1d:00:e4:b9:4e:7a:69:02:bc:d3:2d:6c:f0:ea: a8:45:6b:6b:9f:cf:01:56:3c:3d:fa:81:4b:31:21:00 Fingerprint (SHA-256): 9B:F7:D6:2C:DC:04:A4:CB:99:B7:B2:9F:FA:20:0F:CB:79:28:97:E5:86:07:39:AE:1E:76:4F:64:15:36:28:CF Fingerprint (SHA1): 4A:D2:A0:01:0B:F9:87:7B:21:2D:93:49:D0:CC:9B:06:26:C4:C9:B5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4161: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154222 (0x195756ae) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:08:36 2016 Not After : Sun Apr 25 16:08:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 66:88:7c:3b:1f:db:f8:55:44:09:8a:75:18:e7:fe:7d: 0f:9b:25:9d:f9:5f:1b:e0:31:24:ec:c3:87:38:9d:78: c3:51:25:88:cb:31:57:1d:6c:ee:84:10:8f:b0:8d:e9: 3e:0f:05:b8:f1:0b:37:8a:48:e3:2e:71:40:ea:70:c7: f4:91:6b:37:ca:04:dd:ef:c7:3f:02:cf:98:ac:6f:19: b3:78:48:c3:aa:21:d6:27:76:cc:39:da:88:bf:d9:2c: 11:c4:cb:a3:7c:2f:32:9f:74:1c:a4:f6:82:8e:aa:d3: bd:4e:21:1c:cf:f2:ee:ab:e5:2b:d3:65:61:e5:1f:93: e6:4a:ca:ce:0c:52:39:08:b6:ad:7e:10:1b:38:b3:31: 94:6e:79:fa:c2:67:e7:7d:d4:82:b2:21:3d:8e:0a:58: ee:0e:c5:19:ff:8e:c5:a1:f7:b6:4b:b4:40:35:47:42: 75:d2:52:0d:0d:34:23:17:f6:e6:f7:29:72:73:d7:ba: e1:bb:54:0a:57:25:af:19:76:97:6b:d6:cc:e8:ca:16: b9:e4:ca:ab:76:09:74:b4:fc:10:27:32:ec:cd:e9:8a: db:c4:33:81:ef:7c:54:90:c4:47:c1:87:11:b9:33:d1: 70:1e:7f:28:a2:d3:c4:11:d1:b9:3f:f9:ff:8e:b0:b3 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:cd:23:68:a8:0e:32:3b:f5:c0:a2:b9: cc:fd:f2:9f:b0:5f:12:c5:fa:c4:72:20:ff:47:30:8c: 36:02:1d:00:e4:b9:4e:7a:69:02:bc:d3:2d:6c:f0:ea: a8:45:6b:6b:9f:cf:01:56:3c:3d:fa:81:4b:31:21:00 Fingerprint (SHA-256): 9B:F7:D6:2C:DC:04:A4:CB:99:B7:B2:9F:FA:20:0F:CB:79:28:97:E5:86:07:39:AE:1E:76:4F:64:15:36:28:CF Fingerprint (SHA1): 4A:D2:A0:01:0B:F9:87:7B:21:2D:93:49:D0:CC:9B:06:26:C4:C9:B5 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #4162: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154222 (0x195756ae) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:08:36 2016 Not After : Sun Apr 25 16:08:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 66:88:7c:3b:1f:db:f8:55:44:09:8a:75:18:e7:fe:7d: 0f:9b:25:9d:f9:5f:1b:e0:31:24:ec:c3:87:38:9d:78: c3:51:25:88:cb:31:57:1d:6c:ee:84:10:8f:b0:8d:e9: 3e:0f:05:b8:f1:0b:37:8a:48:e3:2e:71:40:ea:70:c7: f4:91:6b:37:ca:04:dd:ef:c7:3f:02:cf:98:ac:6f:19: b3:78:48:c3:aa:21:d6:27:76:cc:39:da:88:bf:d9:2c: 11:c4:cb:a3:7c:2f:32:9f:74:1c:a4:f6:82:8e:aa:d3: bd:4e:21:1c:cf:f2:ee:ab:e5:2b:d3:65:61:e5:1f:93: e6:4a:ca:ce:0c:52:39:08:b6:ad:7e:10:1b:38:b3:31: 94:6e:79:fa:c2:67:e7:7d:d4:82:b2:21:3d:8e:0a:58: ee:0e:c5:19:ff:8e:c5:a1:f7:b6:4b:b4:40:35:47:42: 75:d2:52:0d:0d:34:23:17:f6:e6:f7:29:72:73:d7:ba: e1:bb:54:0a:57:25:af:19:76:97:6b:d6:cc:e8:ca:16: b9:e4:ca:ab:76:09:74:b4:fc:10:27:32:ec:cd:e9:8a: db:c4:33:81:ef:7c:54:90:c4:47:c1:87:11:b9:33:d1: 70:1e:7f:28:a2:d3:c4:11:d1:b9:3f:f9:ff:8e:b0:b3 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:cd:23:68:a8:0e:32:3b:f5:c0:a2:b9: cc:fd:f2:9f:b0:5f:12:c5:fa:c4:72:20:ff:47:30:8c: 36:02:1d:00:e4:b9:4e:7a:69:02:bc:d3:2d:6c:f0:ea: a8:45:6b:6b:9f:cf:01:56:3c:3d:fa:81:4b:31:21:00 Fingerprint (SHA-256): 9B:F7:D6:2C:DC:04:A4:CB:99:B7:B2:9F:FA:20:0F:CB:79:28:97:E5:86:07:39:AE:1E:76:4F:64:15:36:28:CF Fingerprint (SHA1): 4A:D2:A0:01:0B:F9:87:7B:21:2D:93:49:D0:CC:9B:06:26:C4:C9:B5 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #4163: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4164: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4165: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4166: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #4167: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4168: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4169: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4170: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4171: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4172: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4173: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4174: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #4175: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4176: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4177: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4178: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #4179: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4180: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4181: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4182: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4183: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4184: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4185: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4186: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #4187: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4188: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4189: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4190: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425161025Z nextupdate=20170425161025Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 16:10:25 2016 Next Update: Tue Apr 25 16:10:25 2017 CRL Extensions: chains.sh: #4191: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425161025Z nextupdate=20170425161025Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:10:25 2016 Next Update: Tue Apr 25 16:10:25 2017 CRL Extensions: chains.sh: #4192: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425161026Z nextupdate=20170425161026Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 16:10:26 2016 Next Update: Tue Apr 25 16:10:26 2017 CRL Extensions: chains.sh: #4193: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425161026Z nextupdate=20170425161026Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 16:10:26 2016 Next Update: Tue Apr 25 16:10:26 2017 CRL Extensions: chains.sh: #4194: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425161027Z addcert 14 20160425161027Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 16:10:27 2016 Next Update: Tue Apr 25 16:10:26 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Apr 25 16:10:27 2016 CRL Extensions: chains.sh: #4195: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425161028Z addcert 15 20160425161028Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:10:28 2016 Next Update: Tue Apr 25 16:10:25 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Apr 25 16:10:28 2016 CRL Extensions: chains.sh: #4196: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4197: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4198: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #4199: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #4200: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #4201: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #4202: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #4203: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #4204: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #4205: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:09:33 2016 Not After : Sun Apr 25 16:09:33 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:df:41:60:5e:d7:9e:9e:aa:5c:df:10:dc:e7:45:61: 25:f0:88:37:8b:10:1d:d9:88:bf:bb:c1:fc:ae:29:f7: f0:ec:fc:d4:1d:2f:06:07:04:77:43:dd:43:4f:a8:7c: 53:4f:9f:51:b3:10:7c:e8:55:00:59:d7:48:3d:11:71: e4:94:4a:05:5d:5e:0a:38:ac:3f:2e:0b:13:55:e3:37: 42:f0:4b:2e:0b:d9:76:ed:65:93:17:62:b3:21:80:e9: 8f:50:c1:02:b4:c4:49:2e:e9:a6:0e:6b:29:02:7f:35: 44:6d:fa:ab:c1:89:ab:f9:07:3a:a3:aa:16:7b:04:de: ed:fb:f3:9b:23:08:be:12:0e:cb:ca:85:85:f6:33:92: ac:8d:ab:6d:e9:13:e8:c3:25:87:74:17:b4:86:3f:c4: d7:a9:d0:f1:be:cc:07:ab:58:27:2b:f3:9b:fb:21:09: a0:3c:d4:50:d6:45:ef:80:a5:a7:01:03:25:c7:28:3e: 0d:a9:bd:cc:51:e3:7f:de:44:dd:c5:71:21:79:29:b7: eb:9b:51:fc:6c:92:5f:b9:a3:3a:74:71:ea:f9:28:bc: 27:65:f6:e7:4c:35:ef:be:80:d1:62:37:3a:63:1a:f1: 73:91:29:de:5f:19:4b:bf:8c:90:e0:85:3d:59:10:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:11:4b:1f:a9:15:57:83:62:5a:32:d1:ad:83:95:91: e8:4e:b6:68:c6:1c:5d:cf:22:e5:26:e8:be:15:35:dd: b2:67:87:42:02:98:34:33:83:1c:35:58:94:d1:ff:28: 59:01:f4:31:70:1c:e3:77:90:19:74:4d:2e:0f:73:4e: 55:03:5a:d5:61:67:57:77:4a:bf:2d:02:5a:22:24:f3: 2a:59:47:4e:78:db:57:da:52:ec:f7:b2:6e:96:1a:45: 9d:79:1d:33:91:36:d0:31:03:c6:66:2a:ce:97:de:5e: d4:8f:d7:f8:26:af:b9:a1:92:3c:e2:02:81:38:a9:96: 37:12:cf:49:fc:6c:86:9e:86:97:6c:7e:37:f4:9c:1f: d2:09:eb:c5:ba:82:88:83:42:6d:fd:9a:a0:b8:21:81: 2a:26:6e:5b:bf:2e:56:91:e3:82:f4:9e:6c:72:ef:32: b2:96:eb:a3:3c:d9:4e:95:7e:2c:67:69:09:23:ca:06: 98:9d:5a:59:5b:e2:d3:cf:a0:a0:6d:46:db:40:97:2d: c0:5c:05:a5:f6:2b:02:ae:66:3d:5f:99:d3:39:a2:ae: 44:ae:ff:94:44:69:77:74:8e:57:27:1e:ef:70:f5:ad: 0f:f6:67:a8:f8:f7:f7:20:a8:c5:15:1d:a8:62:9a:3e Fingerprint (SHA-256): 79:A0:35:3A:19:CC:8C:71:BE:4E:01:8C:71:51:6C:DD:22:04:60:DB:48:C0:58:57:86:C8:B2:E6:77:7B:8E:5B Fingerprint (SHA1): B0:26:C6:1A:69:F9:2E:E9:FE:99:DD:05:89:2D:46:0F:6C:C0:75:C1 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4206: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4207: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:09:33 2016 Not After : Sun Apr 25 16:09:33 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:df:41:60:5e:d7:9e:9e:aa:5c:df:10:dc:e7:45:61: 25:f0:88:37:8b:10:1d:d9:88:bf:bb:c1:fc:ae:29:f7: f0:ec:fc:d4:1d:2f:06:07:04:77:43:dd:43:4f:a8:7c: 53:4f:9f:51:b3:10:7c:e8:55:00:59:d7:48:3d:11:71: e4:94:4a:05:5d:5e:0a:38:ac:3f:2e:0b:13:55:e3:37: 42:f0:4b:2e:0b:d9:76:ed:65:93:17:62:b3:21:80:e9: 8f:50:c1:02:b4:c4:49:2e:e9:a6:0e:6b:29:02:7f:35: 44:6d:fa:ab:c1:89:ab:f9:07:3a:a3:aa:16:7b:04:de: ed:fb:f3:9b:23:08:be:12:0e:cb:ca:85:85:f6:33:92: ac:8d:ab:6d:e9:13:e8:c3:25:87:74:17:b4:86:3f:c4: d7:a9:d0:f1:be:cc:07:ab:58:27:2b:f3:9b:fb:21:09: a0:3c:d4:50:d6:45:ef:80:a5:a7:01:03:25:c7:28:3e: 0d:a9:bd:cc:51:e3:7f:de:44:dd:c5:71:21:79:29:b7: eb:9b:51:fc:6c:92:5f:b9:a3:3a:74:71:ea:f9:28:bc: 27:65:f6:e7:4c:35:ef:be:80:d1:62:37:3a:63:1a:f1: 73:91:29:de:5f:19:4b:bf:8c:90:e0:85:3d:59:10:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:11:4b:1f:a9:15:57:83:62:5a:32:d1:ad:83:95:91: e8:4e:b6:68:c6:1c:5d:cf:22:e5:26:e8:be:15:35:dd: b2:67:87:42:02:98:34:33:83:1c:35:58:94:d1:ff:28: 59:01:f4:31:70:1c:e3:77:90:19:74:4d:2e:0f:73:4e: 55:03:5a:d5:61:67:57:77:4a:bf:2d:02:5a:22:24:f3: 2a:59:47:4e:78:db:57:da:52:ec:f7:b2:6e:96:1a:45: 9d:79:1d:33:91:36:d0:31:03:c6:66:2a:ce:97:de:5e: d4:8f:d7:f8:26:af:b9:a1:92:3c:e2:02:81:38:a9:96: 37:12:cf:49:fc:6c:86:9e:86:97:6c:7e:37:f4:9c:1f: d2:09:eb:c5:ba:82:88:83:42:6d:fd:9a:a0:b8:21:81: 2a:26:6e:5b:bf:2e:56:91:e3:82:f4:9e:6c:72:ef:32: b2:96:eb:a3:3c:d9:4e:95:7e:2c:67:69:09:23:ca:06: 98:9d:5a:59:5b:e2:d3:cf:a0:a0:6d:46:db:40:97:2d: c0:5c:05:a5:f6:2b:02:ae:66:3d:5f:99:d3:39:a2:ae: 44:ae:ff:94:44:69:77:74:8e:57:27:1e:ef:70:f5:ad: 0f:f6:67:a8:f8:f7:f7:20:a8:c5:15:1d:a8:62:9a:3e Fingerprint (SHA-256): 79:A0:35:3A:19:CC:8C:71:BE:4E:01:8C:71:51:6C:DD:22:04:60:DB:48:C0:58:57:86:C8:B2:E6:77:7B:8E:5B Fingerprint (SHA1): B0:26:C6:1A:69:F9:2E:E9:FE:99:DD:05:89:2D:46:0F:6C:C0:75:C1 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4208: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4209: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4210: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154231 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4211: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4212: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #4213: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4214: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 425154232 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4215: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4216: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4217: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154122.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4218: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425154107.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4219: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4220: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #4221: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154122.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4222: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 425154233 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4223: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4224: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4225: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154122.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4226: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425154108.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4227: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4228: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #4229: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4230: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 425154234 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4231: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4232: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4233: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154122.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4234: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425154109.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4235: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4236: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4237: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154122.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #4238: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425154110.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4239: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4240: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425161211Z nextupdate=20170425161211Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 16:12:11 2016 Next Update: Tue Apr 25 16:12:11 2017 CRL Extensions: chains.sh: #4241: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425161212Z nextupdate=20170425161212Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:12:12 2016 Next Update: Tue Apr 25 16:12:12 2017 CRL Extensions: chains.sh: #4242: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425161212Z nextupdate=20170425161212Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 16:12:12 2016 Next Update: Tue Apr 25 16:12:12 2017 CRL Extensions: chains.sh: #4243: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425161213Z nextupdate=20170425161213Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 16:12:13 2016 Next Update: Tue Apr 25 16:12:13 2017 CRL Extensions: chains.sh: #4244: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425161214Z addcert 20 20160425161214Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:12:14 2016 Next Update: Tue Apr 25 16:12:12 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 16:12:14 2016 CRL Extensions: chains.sh: #4245: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425161215Z addcert 40 20160425161215Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:12:15 2016 Next Update: Tue Apr 25 16:12:12 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 16:12:14 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Apr 25 16:12:15 2016 CRL Extensions: chains.sh: #4246: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4247: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4248: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #4249: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154231 (0x195756b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:10:43 2016 Not After : Sun Apr 25 16:10:43 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:fd:74:3a:44:6b:64:fe:a2:94:3b:b8:81:4f:5d:1d: 74:fd:6f:75:1f:56:fb:e3:70:e9:ad:d4:bc:a9:a9:9d: fa:c2:f3:85:26:99:82:92:10:a9:dd:e9:2b:b2:bf:55: 7e:9c:28:0e:80:37:3f:01:20:58:b8:4b:28:62:32:a3: 4d:7e:fe:82:c1:2d:2a:bb:30:8e:d6:0a:fc:2f:74:25: 9c:b1:64:f7:8c:78:cb:c0:f6:0f:5b:db:7b:51:6f:07: 94:34:a8:bd:c0:83:3f:8f:23:5b:b7:16:3a:74:34:97: 4b:07:26:49:a3:bf:cb:9c:00:1a:35:f2:a9:cb:bd:e1: 38:3d:4c:a1:13:60:12:d0:87:9f:6a:3d:66:e4:c2:f9: 17:9c:80:b8:3f:20:33:fd:2f:28:3d:8e:cf:8d:79:3a: b1:eb:ad:c6:b7:19:42:55:62:b7:a8:71:43:04:c0:10: 1f:54:3a:48:b1:02:59:58:89:30:1e:11:4f:51:0a:dd: 0a:a2:22:11:6e:0f:24:4a:5a:6d:52:ae:e0:b5:f6:2c: 24:41:5f:d8:6d:5a:f1:35:d5:81:7f:c8:24:b1:a1:b1: 69:77:e5:eb:04:67:5f:a8:0b:6b:51:a7:d2:89:57:12: 74:81:8c:5d:e6:db:a3:c2:24:ff:29:65:e7:7a:6e:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:7c:21:52:2f:5a:c4:45:e6:78:6d:88:9c:2b:aa:fe: 75:78:90:cd:bd:aa:52:f9:76:b1:36:1e:e6:09:4e:ce: ca:64:a5:49:2e:9b:bf:f3:b8:46:55:91:9b:fd:58:bc: 2b:2a:6d:26:66:46:3e:e9:3d:e3:2f:11:8e:0e:eb:94: d9:64:e5:7b:04:68:6c:e0:7b:9a:3e:fc:f2:b2:9d:91: 19:d1:84:05:54:6a:8f:7e:17:6f:49:4d:31:35:91:c0: 40:cb:39:68:f1:e4:9f:3e:69:4c:cf:50:1a:13:1b:43: 47:14:4c:93:99:16:19:6d:4e:68:f0:80:66:ee:f7:9d: f7:b0:43:b6:5d:7a:27:a0:d6:67:72:e3:2f:03:73:e2: ec:80:c3:3a:1b:00:6e:85:ca:a5:b9:55:46:d6:94:ce: 98:77:27:76:c3:4b:5d:a1:ac:03:ca:a2:80:c7:02:83: 91:71:b6:8a:0a:77:a9:f6:24:99:66:47:92:4d:94:ab: 52:27:f5:e1:f2:ec:21:dc:2a:c6:6e:16:ea:9f:d8:c7: 7a:8d:7f:9c:7b:ab:a6:ea:c7:e6:09:d5:54:ea:5f:4a: 39:e2:dc:f1:6c:ea:02:95:39:d6:5e:f6:76:d5:e2:63: c6:35:42:43:c0:0a:9a:b1:07:00:cc:1f:57:38:54:6d Fingerprint (SHA-256): 85:52:E1:4D:C4:33:14:03:28:04:D5:7D:04:B1:7D:CA:07:66:B2:59:94:FD:B4:A2:55:D7:54:6D:F3:09:51:15 Fingerprint (SHA1): 68:B7:8D:56:04:6A:1E:76:FE:EF:77:7E:EE:DE:53:73:EB:9C:E4:BE Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4250: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4251: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154231 (0x195756b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:10:43 2016 Not After : Sun Apr 25 16:10:43 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:fd:74:3a:44:6b:64:fe:a2:94:3b:b8:81:4f:5d:1d: 74:fd:6f:75:1f:56:fb:e3:70:e9:ad:d4:bc:a9:a9:9d: fa:c2:f3:85:26:99:82:92:10:a9:dd:e9:2b:b2:bf:55: 7e:9c:28:0e:80:37:3f:01:20:58:b8:4b:28:62:32:a3: 4d:7e:fe:82:c1:2d:2a:bb:30:8e:d6:0a:fc:2f:74:25: 9c:b1:64:f7:8c:78:cb:c0:f6:0f:5b:db:7b:51:6f:07: 94:34:a8:bd:c0:83:3f:8f:23:5b:b7:16:3a:74:34:97: 4b:07:26:49:a3:bf:cb:9c:00:1a:35:f2:a9:cb:bd:e1: 38:3d:4c:a1:13:60:12:d0:87:9f:6a:3d:66:e4:c2:f9: 17:9c:80:b8:3f:20:33:fd:2f:28:3d:8e:cf:8d:79:3a: b1:eb:ad:c6:b7:19:42:55:62:b7:a8:71:43:04:c0:10: 1f:54:3a:48:b1:02:59:58:89:30:1e:11:4f:51:0a:dd: 0a:a2:22:11:6e:0f:24:4a:5a:6d:52:ae:e0:b5:f6:2c: 24:41:5f:d8:6d:5a:f1:35:d5:81:7f:c8:24:b1:a1:b1: 69:77:e5:eb:04:67:5f:a8:0b:6b:51:a7:d2:89:57:12: 74:81:8c:5d:e6:db:a3:c2:24:ff:29:65:e7:7a:6e:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:7c:21:52:2f:5a:c4:45:e6:78:6d:88:9c:2b:aa:fe: 75:78:90:cd:bd:aa:52:f9:76:b1:36:1e:e6:09:4e:ce: ca:64:a5:49:2e:9b:bf:f3:b8:46:55:91:9b:fd:58:bc: 2b:2a:6d:26:66:46:3e:e9:3d:e3:2f:11:8e:0e:eb:94: d9:64:e5:7b:04:68:6c:e0:7b:9a:3e:fc:f2:b2:9d:91: 19:d1:84:05:54:6a:8f:7e:17:6f:49:4d:31:35:91:c0: 40:cb:39:68:f1:e4:9f:3e:69:4c:cf:50:1a:13:1b:43: 47:14:4c:93:99:16:19:6d:4e:68:f0:80:66:ee:f7:9d: f7:b0:43:b6:5d:7a:27:a0:d6:67:72:e3:2f:03:73:e2: ec:80:c3:3a:1b:00:6e:85:ca:a5:b9:55:46:d6:94:ce: 98:77:27:76:c3:4b:5d:a1:ac:03:ca:a2:80:c7:02:83: 91:71:b6:8a:0a:77:a9:f6:24:99:66:47:92:4d:94:ab: 52:27:f5:e1:f2:ec:21:dc:2a:c6:6e:16:ea:9f:d8:c7: 7a:8d:7f:9c:7b:ab:a6:ea:c7:e6:09:d5:54:ea:5f:4a: 39:e2:dc:f1:6c:ea:02:95:39:d6:5e:f6:76:d5:e2:63: c6:35:42:43:c0:0a:9a:b1:07:00:cc:1f:57:38:54:6d Fingerprint (SHA-256): 85:52:E1:4D:C4:33:14:03:28:04:D5:7D:04:B1:7D:CA:07:66:B2:59:94:FD:B4:A2:55:D7:54:6D:F3:09:51:15 Fingerprint (SHA1): 68:B7:8D:56:04:6A:1E:76:FE:EF:77:7E:EE:DE:53:73:EB:9C:E4:BE Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #4252: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #4253: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4254: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154235 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4255: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4256: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4257: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4258: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425154236 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4259: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4260: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4261: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4262: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154237 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4263: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4264: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4265: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4266: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 425154238 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4267: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4268: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #4269: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154239 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4270: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #4271: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #4272: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4273: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 425154240 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4274: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4275: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4276: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4277: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 425154241 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4278: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4279: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #4280: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #4281: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #4282: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154235 (0x195756bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:12:41 2016 Not After : Sun Apr 25 16:12:41 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:08:34:b7:1f:8d:5a:db:58:d7:19:d9:08:21:0b:92: 3a:57:4a:be:ee:32:49:a7:2c:0b:8e:f5:8c:0b:5b:64: b0:2b:78:50:e6:0f:8c:dd:67:e9:ff:bd:cb:55:64:df: c4:3f:92:a8:0d:18:fb:12:86:6b:fd:2f:96:db:74:fe: 64:ce:89:d5:2c:59:e9:64:80:e4:d7:7d:0c:d5:6f:85: 13:40:74:78:3a:1a:2c:df:64:1c:91:54:bb:3b:3e:e5: 4b:e4:8d:49:e7:f7:a9:e0:98:42:25:be:70:00:47:22: 06:78:16:d1:97:05:85:ae:ab:01:14:0e:f8:8b:21:cf: 34:ff:ba:70:b4:c9:40:dd:e8:45:a4:42:ee:68:59:3d: 49:85:0b:6e:9b:c9:4d:04:7c:3c:e2:76:19:f1:99:2b: 8a:a0:6a:27:60:1a:f8:de:ba:d7:fe:b2:21:cb:01:67: 1b:51:97:3c:08:1d:23:54:43:ba:eb:e2:ab:d4:f8:ca: d4:f7:54:f1:2e:27:7d:48:e8:47:ff:9d:7c:56:5c:4c: d9:a5:45:ce:50:0a:d8:ef:8a:a5:cf:5e:48:26:57:42: bd:73:c0:10:de:19:6b:5a:dc:16:78:83:6b:eb:ed:47: f2:f7:8d:9f:61:c2:6a:d7:c3:d9:b6:23:66:0b:6d:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:b0:7a:a1:c6:3f:33:6b:6d:8d:49:80:c2:de:5d:84: 41:7e:3a:87:5d:8f:b3:a1:ec:a6:ac:66:39:19:92:6a: 01:4d:2c:bb:7a:52:57:b8:06:6e:1c:6b:27:ee:60:e1: 6c:4c:9c:62:e6:aa:43:aa:f4:eb:31:bc:5b:af:4f:14: 8c:1f:0e:54:4b:8a:b1:a2:67:80:26:a7:04:9e:ce:35: 87:31:a5:29:18:53:fb:46:f8:d9:3e:9e:97:4f:1d:ae: 59:55:41:e7:57:96:32:53:d1:a2:4b:f1:8b:94:67:b5: 31:f4:78:5e:b0:1d:0c:f1:1d:07:dd:ca:e1:83:a7:8b: 38:dc:e6:94:48:4b:b5:6f:0d:37:59:cf:0f:04:7d:b8: 55:37:15:cc:92:aa:59:df:01:88:96:3f:99:17:14:f0: 85:fd:7b:f1:1d:36:48:f0:7f:bc:87:3c:b4:62:75:96: bd:36:74:ed:2f:e4:29:45:e3:66:1a:7b:95:fe:6e:36: d2:57:d1:49:9a:19:2b:82:06:54:d0:ed:2b:73:b8:95: ee:42:c0:8f:be:92:2a:4d:45:4b:28:cc:20:41:43:96: a7:78:69:fe:11:e6:a8:ba:84:9c:bc:eb:0b:bf:0d:3a: 43:77:27:41:39:46:97:da:08:ea:ad:57:9b:56:af:b8 Fingerprint (SHA-256): CD:7F:91:38:A7:97:65:C9:04:4D:4F:61:15:C9:EB:80:C0:C5:29:E9:8A:EA:49:53:4C:9C:83:78:C4:42:D5:11 Fingerprint (SHA1): CA:22:C8:A7:D5:46:9F:A4:51:14:A7:F7:EA:A0:F5:4B:85:BA:40:ED Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4283: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154237 (0x195756bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:13:25 2016 Not After : Sun Apr 25 16:13:25 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:0e:7d:26:7f:93:48:f4:53:6c:79:09:51:63:ac:c2: 30:f4:16:fa:e0:2b:db:c6:9e:af:6e:77:e8:aa:68:82: 11:86:7b:f0:8f:97:f4:fd:54:06:00:2d:55:78:7a:b3: 57:59:33:cd:91:b5:24:5a:77:51:6a:20:f6:38:4c:1f: d4:44:8f:c7:e5:ba:2c:f0:6b:c1:7e:f1:af:ea:83:68: 7e:9e:1f:81:3d:4c:96:13:f8:9e:7f:dd:28:e7:b8:1a: 05:5c:f2:92:49:f3:58:30:d4:22:b3:5e:18:80:40:71: 4f:71:bd:8f:99:32:53:1b:5f:b6:a3:78:e9:8f:9c:8a: 51:95:e2:cc:3f:ba:25:2f:ea:f6:37:bc:1d:59:34:fc: a9:58:82:c2:f2:76:cc:84:cc:00:c6:b2:5c:e4:96:60: 9e:80:9e:cf:1c:4d:2d:a5:5d:f0:f9:ff:b4:ad:03:b2: 93:78:5d:1a:ec:d5:00:b6:10:93:ef:ac:69:87:c5:5b: 6b:f9:e2:79:99:fd:a5:4f:10:77:e1:04:69:8b:da:68: d9:94:6c:ab:05:06:be:a9:6b:f9:56:c9:ef:b6:bd:8b: 2a:a0:19:fe:f4:17:8e:aa:a8:0f:bc:6a:64:e7:61:2c: 42:d6:fc:7e:d0:33:ce:34:30:ac:fb:10:f7:42:74:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:37:aa:86:8b:01:af:5d:fb:22:3e:94:4d:bb:9f:24: b6:47:8a:54:58:fc:59:35:40:7a:7a:7f:f1:cf:1e:8a: c0:f4:12:3a:e6:79:c7:2c:2e:19:58:84:ce:d0:71:e5: 14:8d:69:6e:d7:0b:0c:24:8a:6f:d8:ca:b2:d2:77:bc: d1:7a:e9:5d:32:0c:6c:19:e9:aa:c0:2d:d9:87:07:0b: ea:72:43:d3:01:62:d6:86:58:17:7e:eb:75:07:ad:fd: 03:2c:a3:45:c3:af:92:4f:da:18:13:bf:76:5e:58:96: 96:81:50:11:ea:f3:61:7f:a2:f8:a3:6d:8a:c1:8c:51: 18:0b:b4:81:0d:13:94:d0:be:5b:0a:3e:1a:c8:0a:7a: 50:39:f6:12:d4:2b:79:58:f2:ee:38:a0:3b:a7:33:6c: 45:09:3b:1c:e0:ad:90:d0:90:dd:0c:f7:77:f7:77:a8: 7d:fc:87:3d:2e:09:03:c5:9e:7a:74:b7:13:de:2b:e8: 81:d0:5a:fb:04:b9:96:8c:61:65:3b:75:46:4f:51:2f: 3d:c3:2d:7b:72:a8:d9:ee:51:c4:9f:ed:57:fb:02:38: a4:94:c3:86:58:c7:e5:63:9d:31:e3:49:f0:46:1e:a7: e2:22:5a:b3:7d:47:b4:6e:3d:4c:b0:bd:5e:e3:e0:35 Fingerprint (SHA-256): 4A:D7:41:50:D6:48:16:12:23:C1:A3:3B:78:72:DC:28:A1:3C:DA:4D:1F:42:BD:E6:9E:77:ED:8B:95:97:33:F9 Fingerprint (SHA1): 36:01:C4:9C:18:30:F3:46:0D:B0:AF:E8:4B:02:77:56:27:2A:DD:87 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #4284: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154235 (0x195756bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:12:41 2016 Not After : Sun Apr 25 16:12:41 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:08:34:b7:1f:8d:5a:db:58:d7:19:d9:08:21:0b:92: 3a:57:4a:be:ee:32:49:a7:2c:0b:8e:f5:8c:0b:5b:64: b0:2b:78:50:e6:0f:8c:dd:67:e9:ff:bd:cb:55:64:df: c4:3f:92:a8:0d:18:fb:12:86:6b:fd:2f:96:db:74:fe: 64:ce:89:d5:2c:59:e9:64:80:e4:d7:7d:0c:d5:6f:85: 13:40:74:78:3a:1a:2c:df:64:1c:91:54:bb:3b:3e:e5: 4b:e4:8d:49:e7:f7:a9:e0:98:42:25:be:70:00:47:22: 06:78:16:d1:97:05:85:ae:ab:01:14:0e:f8:8b:21:cf: 34:ff:ba:70:b4:c9:40:dd:e8:45:a4:42:ee:68:59:3d: 49:85:0b:6e:9b:c9:4d:04:7c:3c:e2:76:19:f1:99:2b: 8a:a0:6a:27:60:1a:f8:de:ba:d7:fe:b2:21:cb:01:67: 1b:51:97:3c:08:1d:23:54:43:ba:eb:e2:ab:d4:f8:ca: d4:f7:54:f1:2e:27:7d:48:e8:47:ff:9d:7c:56:5c:4c: d9:a5:45:ce:50:0a:d8:ef:8a:a5:cf:5e:48:26:57:42: bd:73:c0:10:de:19:6b:5a:dc:16:78:83:6b:eb:ed:47: f2:f7:8d:9f:61:c2:6a:d7:c3:d9:b6:23:66:0b:6d:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:b0:7a:a1:c6:3f:33:6b:6d:8d:49:80:c2:de:5d:84: 41:7e:3a:87:5d:8f:b3:a1:ec:a6:ac:66:39:19:92:6a: 01:4d:2c:bb:7a:52:57:b8:06:6e:1c:6b:27:ee:60:e1: 6c:4c:9c:62:e6:aa:43:aa:f4:eb:31:bc:5b:af:4f:14: 8c:1f:0e:54:4b:8a:b1:a2:67:80:26:a7:04:9e:ce:35: 87:31:a5:29:18:53:fb:46:f8:d9:3e:9e:97:4f:1d:ae: 59:55:41:e7:57:96:32:53:d1:a2:4b:f1:8b:94:67:b5: 31:f4:78:5e:b0:1d:0c:f1:1d:07:dd:ca:e1:83:a7:8b: 38:dc:e6:94:48:4b:b5:6f:0d:37:59:cf:0f:04:7d:b8: 55:37:15:cc:92:aa:59:df:01:88:96:3f:99:17:14:f0: 85:fd:7b:f1:1d:36:48:f0:7f:bc:87:3c:b4:62:75:96: bd:36:74:ed:2f:e4:29:45:e3:66:1a:7b:95:fe:6e:36: d2:57:d1:49:9a:19:2b:82:06:54:d0:ed:2b:73:b8:95: ee:42:c0:8f:be:92:2a:4d:45:4b:28:cc:20:41:43:96: a7:78:69:fe:11:e6:a8:ba:84:9c:bc:eb:0b:bf:0d:3a: 43:77:27:41:39:46:97:da:08:ea:ad:57:9b:56:af:b8 Fingerprint (SHA-256): CD:7F:91:38:A7:97:65:C9:04:4D:4F:61:15:C9:EB:80:C0:C5:29:E9:8A:EA:49:53:4C:9C:83:78:C4:42:D5:11 Fingerprint (SHA1): CA:22:C8:A7:D5:46:9F:A4:51:14:A7:F7:EA:A0:F5:4B:85:BA:40:ED Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4285: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #4286: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154235 (0x195756bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:12:41 2016 Not After : Sun Apr 25 16:12:41 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:08:34:b7:1f:8d:5a:db:58:d7:19:d9:08:21:0b:92: 3a:57:4a:be:ee:32:49:a7:2c:0b:8e:f5:8c:0b:5b:64: b0:2b:78:50:e6:0f:8c:dd:67:e9:ff:bd:cb:55:64:df: c4:3f:92:a8:0d:18:fb:12:86:6b:fd:2f:96:db:74:fe: 64:ce:89:d5:2c:59:e9:64:80:e4:d7:7d:0c:d5:6f:85: 13:40:74:78:3a:1a:2c:df:64:1c:91:54:bb:3b:3e:e5: 4b:e4:8d:49:e7:f7:a9:e0:98:42:25:be:70:00:47:22: 06:78:16:d1:97:05:85:ae:ab:01:14:0e:f8:8b:21:cf: 34:ff:ba:70:b4:c9:40:dd:e8:45:a4:42:ee:68:59:3d: 49:85:0b:6e:9b:c9:4d:04:7c:3c:e2:76:19:f1:99:2b: 8a:a0:6a:27:60:1a:f8:de:ba:d7:fe:b2:21:cb:01:67: 1b:51:97:3c:08:1d:23:54:43:ba:eb:e2:ab:d4:f8:ca: d4:f7:54:f1:2e:27:7d:48:e8:47:ff:9d:7c:56:5c:4c: d9:a5:45:ce:50:0a:d8:ef:8a:a5:cf:5e:48:26:57:42: bd:73:c0:10:de:19:6b:5a:dc:16:78:83:6b:eb:ed:47: f2:f7:8d:9f:61:c2:6a:d7:c3:d9:b6:23:66:0b:6d:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:b0:7a:a1:c6:3f:33:6b:6d:8d:49:80:c2:de:5d:84: 41:7e:3a:87:5d:8f:b3:a1:ec:a6:ac:66:39:19:92:6a: 01:4d:2c:bb:7a:52:57:b8:06:6e:1c:6b:27:ee:60:e1: 6c:4c:9c:62:e6:aa:43:aa:f4:eb:31:bc:5b:af:4f:14: 8c:1f:0e:54:4b:8a:b1:a2:67:80:26:a7:04:9e:ce:35: 87:31:a5:29:18:53:fb:46:f8:d9:3e:9e:97:4f:1d:ae: 59:55:41:e7:57:96:32:53:d1:a2:4b:f1:8b:94:67:b5: 31:f4:78:5e:b0:1d:0c:f1:1d:07:dd:ca:e1:83:a7:8b: 38:dc:e6:94:48:4b:b5:6f:0d:37:59:cf:0f:04:7d:b8: 55:37:15:cc:92:aa:59:df:01:88:96:3f:99:17:14:f0: 85:fd:7b:f1:1d:36:48:f0:7f:bc:87:3c:b4:62:75:96: bd:36:74:ed:2f:e4:29:45:e3:66:1a:7b:95:fe:6e:36: d2:57:d1:49:9a:19:2b:82:06:54:d0:ed:2b:73:b8:95: ee:42:c0:8f:be:92:2a:4d:45:4b:28:cc:20:41:43:96: a7:78:69:fe:11:e6:a8:ba:84:9c:bc:eb:0b:bf:0d:3a: 43:77:27:41:39:46:97:da:08:ea:ad:57:9b:56:af:b8 Fingerprint (SHA-256): CD:7F:91:38:A7:97:65:C9:04:4D:4F:61:15:C9:EB:80:C0:C5:29:E9:8A:EA:49:53:4C:9C:83:78:C4:42:D5:11 Fingerprint (SHA1): CA:22:C8:A7:D5:46:9F:A4:51:14:A7:F7:EA:A0:F5:4B:85:BA:40:ED Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4287: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154237 (0x195756bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:13:25 2016 Not After : Sun Apr 25 16:13:25 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:0e:7d:26:7f:93:48:f4:53:6c:79:09:51:63:ac:c2: 30:f4:16:fa:e0:2b:db:c6:9e:af:6e:77:e8:aa:68:82: 11:86:7b:f0:8f:97:f4:fd:54:06:00:2d:55:78:7a:b3: 57:59:33:cd:91:b5:24:5a:77:51:6a:20:f6:38:4c:1f: d4:44:8f:c7:e5:ba:2c:f0:6b:c1:7e:f1:af:ea:83:68: 7e:9e:1f:81:3d:4c:96:13:f8:9e:7f:dd:28:e7:b8:1a: 05:5c:f2:92:49:f3:58:30:d4:22:b3:5e:18:80:40:71: 4f:71:bd:8f:99:32:53:1b:5f:b6:a3:78:e9:8f:9c:8a: 51:95:e2:cc:3f:ba:25:2f:ea:f6:37:bc:1d:59:34:fc: a9:58:82:c2:f2:76:cc:84:cc:00:c6:b2:5c:e4:96:60: 9e:80:9e:cf:1c:4d:2d:a5:5d:f0:f9:ff:b4:ad:03:b2: 93:78:5d:1a:ec:d5:00:b6:10:93:ef:ac:69:87:c5:5b: 6b:f9:e2:79:99:fd:a5:4f:10:77:e1:04:69:8b:da:68: d9:94:6c:ab:05:06:be:a9:6b:f9:56:c9:ef:b6:bd:8b: 2a:a0:19:fe:f4:17:8e:aa:a8:0f:bc:6a:64:e7:61:2c: 42:d6:fc:7e:d0:33:ce:34:30:ac:fb:10:f7:42:74:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:37:aa:86:8b:01:af:5d:fb:22:3e:94:4d:bb:9f:24: b6:47:8a:54:58:fc:59:35:40:7a:7a:7f:f1:cf:1e:8a: c0:f4:12:3a:e6:79:c7:2c:2e:19:58:84:ce:d0:71:e5: 14:8d:69:6e:d7:0b:0c:24:8a:6f:d8:ca:b2:d2:77:bc: d1:7a:e9:5d:32:0c:6c:19:e9:aa:c0:2d:d9:87:07:0b: ea:72:43:d3:01:62:d6:86:58:17:7e:eb:75:07:ad:fd: 03:2c:a3:45:c3:af:92:4f:da:18:13:bf:76:5e:58:96: 96:81:50:11:ea:f3:61:7f:a2:f8:a3:6d:8a:c1:8c:51: 18:0b:b4:81:0d:13:94:d0:be:5b:0a:3e:1a:c8:0a:7a: 50:39:f6:12:d4:2b:79:58:f2:ee:38:a0:3b:a7:33:6c: 45:09:3b:1c:e0:ad:90:d0:90:dd:0c:f7:77:f7:77:a8: 7d:fc:87:3d:2e:09:03:c5:9e:7a:74:b7:13:de:2b:e8: 81:d0:5a:fb:04:b9:96:8c:61:65:3b:75:46:4f:51:2f: 3d:c3:2d:7b:72:a8:d9:ee:51:c4:9f:ed:57:fb:02:38: a4:94:c3:86:58:c7:e5:63:9d:31:e3:49:f0:46:1e:a7: e2:22:5a:b3:7d:47:b4:6e:3d:4c:b0:bd:5e:e3:e0:35 Fingerprint (SHA-256): 4A:D7:41:50:D6:48:16:12:23:C1:A3:3B:78:72:DC:28:A1:3C:DA:4D:1F:42:BD:E6:9E:77:ED:8B:95:97:33:F9 Fingerprint (SHA1): 36:01:C4:9C:18:30:F3:46:0D:B0:AF:E8:4B:02:77:56:27:2A:DD:87 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #4288: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #4289: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #4290: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #4291: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154235 (0x195756bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:12:41 2016 Not After : Sun Apr 25 16:12:41 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:08:34:b7:1f:8d:5a:db:58:d7:19:d9:08:21:0b:92: 3a:57:4a:be:ee:32:49:a7:2c:0b:8e:f5:8c:0b:5b:64: b0:2b:78:50:e6:0f:8c:dd:67:e9:ff:bd:cb:55:64:df: c4:3f:92:a8:0d:18:fb:12:86:6b:fd:2f:96:db:74:fe: 64:ce:89:d5:2c:59:e9:64:80:e4:d7:7d:0c:d5:6f:85: 13:40:74:78:3a:1a:2c:df:64:1c:91:54:bb:3b:3e:e5: 4b:e4:8d:49:e7:f7:a9:e0:98:42:25:be:70:00:47:22: 06:78:16:d1:97:05:85:ae:ab:01:14:0e:f8:8b:21:cf: 34:ff:ba:70:b4:c9:40:dd:e8:45:a4:42:ee:68:59:3d: 49:85:0b:6e:9b:c9:4d:04:7c:3c:e2:76:19:f1:99:2b: 8a:a0:6a:27:60:1a:f8:de:ba:d7:fe:b2:21:cb:01:67: 1b:51:97:3c:08:1d:23:54:43:ba:eb:e2:ab:d4:f8:ca: d4:f7:54:f1:2e:27:7d:48:e8:47:ff:9d:7c:56:5c:4c: d9:a5:45:ce:50:0a:d8:ef:8a:a5:cf:5e:48:26:57:42: bd:73:c0:10:de:19:6b:5a:dc:16:78:83:6b:eb:ed:47: f2:f7:8d:9f:61:c2:6a:d7:c3:d9:b6:23:66:0b:6d:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:b0:7a:a1:c6:3f:33:6b:6d:8d:49:80:c2:de:5d:84: 41:7e:3a:87:5d:8f:b3:a1:ec:a6:ac:66:39:19:92:6a: 01:4d:2c:bb:7a:52:57:b8:06:6e:1c:6b:27:ee:60:e1: 6c:4c:9c:62:e6:aa:43:aa:f4:eb:31:bc:5b:af:4f:14: 8c:1f:0e:54:4b:8a:b1:a2:67:80:26:a7:04:9e:ce:35: 87:31:a5:29:18:53:fb:46:f8:d9:3e:9e:97:4f:1d:ae: 59:55:41:e7:57:96:32:53:d1:a2:4b:f1:8b:94:67:b5: 31:f4:78:5e:b0:1d:0c:f1:1d:07:dd:ca:e1:83:a7:8b: 38:dc:e6:94:48:4b:b5:6f:0d:37:59:cf:0f:04:7d:b8: 55:37:15:cc:92:aa:59:df:01:88:96:3f:99:17:14:f0: 85:fd:7b:f1:1d:36:48:f0:7f:bc:87:3c:b4:62:75:96: bd:36:74:ed:2f:e4:29:45:e3:66:1a:7b:95:fe:6e:36: d2:57:d1:49:9a:19:2b:82:06:54:d0:ed:2b:73:b8:95: ee:42:c0:8f:be:92:2a:4d:45:4b:28:cc:20:41:43:96: a7:78:69:fe:11:e6:a8:ba:84:9c:bc:eb:0b:bf:0d:3a: 43:77:27:41:39:46:97:da:08:ea:ad:57:9b:56:af:b8 Fingerprint (SHA-256): CD:7F:91:38:A7:97:65:C9:04:4D:4F:61:15:C9:EB:80:C0:C5:29:E9:8A:EA:49:53:4C:9C:83:78:C4:42:D5:11 Fingerprint (SHA1): CA:22:C8:A7:D5:46:9F:A4:51:14:A7:F7:EA:A0:F5:4B:85:BA:40:ED Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4292: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154239 (0x195756bf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 16:14:14 2016 Not After : Sun Apr 25 16:14:14 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:3a:63:3c:61:46:a5:7e:20:6e:2e:11:17:24:45:3e: 5f:c4:ab:4c:f8:7d:ea:86:25:fd:97:ef:91:91:42:76: 90:c5:76:ad:ba:ed:07:eb:bc:a8:30:a5:1a:4f:34:e1: 7f:d5:60:3f:36:9a:c1:55:67:14:23:bb:c5:fa:bd:e7: 6a:0d:83:e8:35:df:fd:07:fb:f1:d1:88:f8:51:ad:7d: c8:a6:e5:7f:4f:65:5f:6d:b2:2e:aa:08:83:3d:b2:3c: 2a:6d:7e:ea:ca:ec:ed:31:af:1f:7f:ac:c1:58:be:aa: c5:54:49:4d:8d:dd:96:50:97:ea:b4:c4:e6:ca:98:b8: d3:f4:52:d7:3f:f3:02:88:8a:b4:b4:9b:f6:85:a2:f2: 87:d9:46:83:91:08:46:9c:9c:5e:aa:7c:8c:01:ea:ca: 47:8f:ec:bd:ae:96:4b:c5:4c:5b:14:0b:70:14:76:03: 3b:f3:65:8b:b2:4e:ea:7b:69:eb:8c:e4:97:4d:08:ac: 03:7f:5b:33:c1:57:f0:b2:d1:fa:8a:de:8a:30:97:f0: f0:8f:60:36:3c:47:e2:67:df:ee:4f:6f:7e:80:a1:1f: a7:83:10:b7:28:37:15:97:05:18:54:67:2f:ba:58:f0: f2:cb:85:51:e2:28:d9:8f:2b:ff:1e:7d:c4:93:c2:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:be:9e:f3:8f:a7:91:ad:3d:4a:5e:f1:71:68:7e:2f: 59:1a:6d:e6:74:8b:7d:56:26:3e:73:bc:01:91:d6:f4: 91:f9:a0:71:24:18:dd:db:45:75:15:60:96:b3:c7:d4: ba:fd:2c:20:8a:7f:63:88:d0:dd:e0:5f:b6:ec:f7:53: de:e1:a8:f4:65:18:9c:74:ad:69:a7:94:9c:cc:b7:f7: ec:8a:35:1b:4a:3c:ae:2f:37:2f:db:63:fb:53:f1:ae: 33:9e:03:28:7f:35:da:2b:d7:dc:1b:d4:e5:8a:41:97: cb:77:1e:32:50:17:77:46:03:e3:fd:94:e4:d6:8f:06: b5:e0:8a:5a:03:08:a1:5c:ae:ff:01:79:f2:aa:d3:6b: 9c:5b:96:b7:34:ca:20:4b:45:e0:59:d5:87:fa:6d:0c: bb:3c:c4:e9:98:85:1c:04:e4:b0:27:ba:44:4a:bb:9f: c3:b5:d0:7e:45:ed:a2:f3:e1:fd:1b:bd:0b:dc:c8:d0: 11:d0:3e:6f:1a:05:f0:bd:57:0b:f6:52:4e:2f:39:90: 54:bf:60:7d:e5:cc:d5:19:a1:51:09:13:89:fa:a1:31: c1:62:f4:b4:b1:b8:18:3c:c7:bf:f4:2c:6f:32:7e:45: 3e:33:10:7d:ac:34:57:48:99:ab:80:cf:42:82:2f:c9 Fingerprint (SHA-256): 01:E1:07:18:D4:01:7E:FE:5C:A2:0D:28:51:DB:C7:24:70:AB:70:D2:79:D1:EE:7E:28:26:01:DB:BA:91:02:62 Fingerprint (SHA1): 06:0E:F6:DA:C0:48:A6:4E:37:FF:60:29:49:DC:39:9E:69:EB:26:66 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #4293: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154235 (0x195756bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:12:41 2016 Not After : Sun Apr 25 16:12:41 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:08:34:b7:1f:8d:5a:db:58:d7:19:d9:08:21:0b:92: 3a:57:4a:be:ee:32:49:a7:2c:0b:8e:f5:8c:0b:5b:64: b0:2b:78:50:e6:0f:8c:dd:67:e9:ff:bd:cb:55:64:df: c4:3f:92:a8:0d:18:fb:12:86:6b:fd:2f:96:db:74:fe: 64:ce:89:d5:2c:59:e9:64:80:e4:d7:7d:0c:d5:6f:85: 13:40:74:78:3a:1a:2c:df:64:1c:91:54:bb:3b:3e:e5: 4b:e4:8d:49:e7:f7:a9:e0:98:42:25:be:70:00:47:22: 06:78:16:d1:97:05:85:ae:ab:01:14:0e:f8:8b:21:cf: 34:ff:ba:70:b4:c9:40:dd:e8:45:a4:42:ee:68:59:3d: 49:85:0b:6e:9b:c9:4d:04:7c:3c:e2:76:19:f1:99:2b: 8a:a0:6a:27:60:1a:f8:de:ba:d7:fe:b2:21:cb:01:67: 1b:51:97:3c:08:1d:23:54:43:ba:eb:e2:ab:d4:f8:ca: d4:f7:54:f1:2e:27:7d:48:e8:47:ff:9d:7c:56:5c:4c: d9:a5:45:ce:50:0a:d8:ef:8a:a5:cf:5e:48:26:57:42: bd:73:c0:10:de:19:6b:5a:dc:16:78:83:6b:eb:ed:47: f2:f7:8d:9f:61:c2:6a:d7:c3:d9:b6:23:66:0b:6d:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:b0:7a:a1:c6:3f:33:6b:6d:8d:49:80:c2:de:5d:84: 41:7e:3a:87:5d:8f:b3:a1:ec:a6:ac:66:39:19:92:6a: 01:4d:2c:bb:7a:52:57:b8:06:6e:1c:6b:27:ee:60:e1: 6c:4c:9c:62:e6:aa:43:aa:f4:eb:31:bc:5b:af:4f:14: 8c:1f:0e:54:4b:8a:b1:a2:67:80:26:a7:04:9e:ce:35: 87:31:a5:29:18:53:fb:46:f8:d9:3e:9e:97:4f:1d:ae: 59:55:41:e7:57:96:32:53:d1:a2:4b:f1:8b:94:67:b5: 31:f4:78:5e:b0:1d:0c:f1:1d:07:dd:ca:e1:83:a7:8b: 38:dc:e6:94:48:4b:b5:6f:0d:37:59:cf:0f:04:7d:b8: 55:37:15:cc:92:aa:59:df:01:88:96:3f:99:17:14:f0: 85:fd:7b:f1:1d:36:48:f0:7f:bc:87:3c:b4:62:75:96: bd:36:74:ed:2f:e4:29:45:e3:66:1a:7b:95:fe:6e:36: d2:57:d1:49:9a:19:2b:82:06:54:d0:ed:2b:73:b8:95: ee:42:c0:8f:be:92:2a:4d:45:4b:28:cc:20:41:43:96: a7:78:69:fe:11:e6:a8:ba:84:9c:bc:eb:0b:bf:0d:3a: 43:77:27:41:39:46:97:da:08:ea:ad:57:9b:56:af:b8 Fingerprint (SHA-256): CD:7F:91:38:A7:97:65:C9:04:4D:4F:61:15:C9:EB:80:C0:C5:29:E9:8A:EA:49:53:4C:9C:83:78:C4:42:D5:11 Fingerprint (SHA1): CA:22:C8:A7:D5:46:9F:A4:51:14:A7:F7:EA:A0:F5:4B:85:BA:40:ED Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4294: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #4295: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #4296: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #4297: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #4298: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #4299: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154240 (0x195756c0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 16:14:25 2016 Not After : Sun Apr 25 16:14:25 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:13:9b:02:71:8a:a1:bf:2a:f3:4d:89:aa:1e:79:92: 48:f2:4c:65:f1:99:39:20:a1:19:08:c7:62:36:90:9a: d6:fc:e2:b1:88:36:7e:a8:1f:46:20:54:61:56:33:f0: 33:fb:05:f2:1b:aa:de:87:64:36:12:8a:a6:f7:85:bd: d7:50:2b:7f:d5:83:18:18:59:c4:d5:33:b9:46:52:a6: 9b:c8:ec:b2:de:29:33:ba:c2:b2:38:6a:f3:89:e9:b8: a6:94:1d:3a:bb:77:21:5d:76:e3:87:15:9c:ea:2f:19: ec:6b:d8:f0:a7:08:75:32:07:c1:05:df:36:1d:fb:77: 5f:d1:b5:6c:c0:bc:73:3c:47:a7:d8:8a:82:df:62:85: 25:a0:c7:45:8b:4c:94:17:e0:f1:b9:a2:16:45:08:6c: 1c:cb:0d:86:e2:20:57:a5:63:37:ae:9a:f1:f3:1e:85: 4e:76:d6:a2:b1:b2:9d:bc:63:b5:62:f4:ac:24:7c:28: 3b:89:df:1a:a6:3a:77:9f:f4:c2:97:cc:9b:61:73:a8: 07:1f:cc:97:58:7c:09:5b:53:dc:80:1f:22:a7:21:58: c7:ba:60:8a:f5:7f:5a:c1:35:5f:ab:b9:67:c7:d2:74: 25:fb:39:71:25:2b:d7:97:aa:cb:7b:11:e4:d0:d1:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:d5:c8:b0:a7:61:8c:88:46:2b:31:e1:1a:40:f3:69: bf:58:19:fd:e4:f4:ed:54:8b:fb:85:16:d2:fc:87:e1: e3:85:cb:7b:da:11:6f:c5:cd:46:59:bf:e9:b4:58:ca: 93:e6:3b:96:d0:8e:a9:91:7d:58:c4:bd:7c:d5:01:b7: 28:c6:55:61:a8:fb:2b:9d:e7:49:3c:ce:fa:ec:60:47: 66:f6:48:f8:e8:1f:5c:9e:89:9e:8c:d8:25:97:d0:03: 29:ee:7a:14:26:b1:f0:26:1a:b5:0b:c3:cd:40:65:76: 10:ae:b1:7a:35:c3:42:b5:94:d4:d3:3e:96:fe:26:57: 53:33:10:b5:69:cd:1a:1a:c5:aa:2b:2b:db:ae:a8:27: 44:ff:e4:e5:11:ad:b9:32:d6:8b:fd:c6:9d:e2:a8:6e: 5a:fd:82:50:5a:a1:ec:82:c0:ac:56:3b:2e:70:c5:33: 7e:36:04:f7:43:af:e7:e0:79:e6:38:06:b8:ca:8b:3f: 13:e8:82:65:e8:6e:67:26:1f:72:39:22:bb:d2:9e:24: 69:d4:f3:94:57:f5:d4:80:cc:da:4c:9c:64:76:ab:e6: c7:d7:d0:36:70:d4:f3:19:1f:f3:71:28:66:ca:95:4f: 61:7b:91:93:72:ac:91:fe:9b:f4:09:90:08:49:1a:f0 Fingerprint (SHA-256): A2:E1:EA:CB:43:6E:88:99:DA:0E:35:2C:8B:2B:52:D8:E1:3E:4C:8C:D2:6A:44:5F:E9:D2:2D:D7:F8:C3:1D:9E Fingerprint (SHA1): 8E:03:1E:70:79:32:A3:5F:9E:ED:F1:45:49:EC:D5:05:88:F9:55:0B Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #4300: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #4301: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #4302: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #4303: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #4304: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4305: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4306: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #4307: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4308: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4309: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #4310: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #4311: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #4312: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4313: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4314: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #4315: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4316: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #4317: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4318: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #4319: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4320: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #4321: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #4322: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #4323: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 20176 at Mon Apr 25 16:15:13 UTC 2016 kill -USR1 20176 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 20176 killed at Mon Apr 25 16:15:13 UTC 2016 httpserv starting at Mon Apr 25 16:15:14 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 16:15:14 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 3805 >/dev/null 2>/dev/null httpserv with PID 3805 found at Mon Apr 25 16:15:14 UTC 2016 httpserv with PID 3805 started at Mon Apr 25 16:15:14 UTC 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4324: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154242 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4325: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4326: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4327: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154243 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4328: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4329: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4330: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4331: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425154244 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4332: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4333: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425154245 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4334: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4335: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4336: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4337: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4338: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 425154246 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4339: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4340: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4341: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #4342: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #4343: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154243 (0x195756c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:15:26 2016 Not After : Sun Apr 25 16:15:26 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:c3:25:1b:13:b0:ae:7f:db:c4:de:03:ac:da:7a:43: 4b:c7:58:ad:cb:72:c7:d2:93:51:42:45:a4:7c:8a:d2: 65:43:68:64:9c:c2:d4:3b:22:5d:3b:75:0f:b2:6f:86: 39:66:5f:10:ce:62:37:52:03:6f:15:38:de:0c:31:38: 25:66:e2:64:4a:d9:8b:87:c9:2b:7e:51:52:70:9e:54: d1:7a:7d:23:6b:67:36:2d:28:ff:e6:5d:02:91:ac:e0: 1a:17:72:95:00:e6:1b:32:27:9a:01:c0:35:0d:9d:54: e4:e7:32:d2:c2:e4:76:ed:e6:c6:9c:69:dd:7d:9b:d6: d5:61:0b:a9:6a:3d:b5:22:13:25:04:d5:09:34:a0:39: 9a:72:03:29:2b:8b:6c:71:57:e4:58:69:bc:8e:8b:1c: ca:52:7f:e3:70:92:3f:f2:45:0e:1b:02:43:c2:ac:d0: bc:ce:58:34:7c:62:a3:b2:f0:de:51:22:3c:f1:d1:8b: 02:43:d1:90:f2:75:ff:7e:25:4b:3d:e5:ca:ff:de:90: 1b:64:d2:eb:e2:e5:46:c8:65:7f:8e:f0:93:c5:26:96: 30:5f:c8:e3:e2:05:d4:ed:ff:50:a9:f6:d0:4b:a6:6f: 45:38:83:55:17:02:f4:d8:c8:64:ef:75:db:a6:6e:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:ec:44:49:7f:fc:5a:b1:06:27:c9:9d:04:6c:3c:e2: ee:2f:ea:a2:39:89:2f:59:75:db:20:f7:1e:34:e5:6e: df:6c:e9:c2:a5:c5:d6:8a:60:f8:1d:93:81:a0:3a:9a: 4d:af:1a:df:f3:7f:5a:0a:15:e3:25:1e:69:c6:48:97: 5d:58:04:17:38:df:86:90:96:f9:d0:d6:27:7b:d7:6a: 27:63:be:c8:a2:d8:e4:4e:2f:68:7a:f4:a2:6e:5f:bb: 5b:75:28:fd:9d:db:f4:43:22:ee:fd:e6:47:b3:37:ef: 2a:27:fe:08:ba:54:b7:28:1f:f0:10:9c:33:63:fc:e9: 83:7c:d8:43:95:1f:e5:25:9b:4a:20:5b:ef:ea:98:72: 65:f7:94:13:48:ff:20:53:ea:1a:e4:38:69:71:f3:0f: 92:a7:d8:e2:99:b5:e6:72:6e:ac:1a:7f:02:7c:c0:33: fd:10:39:d5:1a:65:f9:71:55:60:92:14:12:de:31:88: 11:04:fb:41:40:48:03:c9:7d:5a:8e:f1:8e:dc:8b:f3: 4c:b2:94:65:15:84:28:df:c6:3a:8b:6e:b3:a8:f9:69: e2:83:f1:8e:a2:03:d3:50:c9:f2:ea:79:de:b0:12:f5: 52:79:6f:f7:ac:90:24:ba:d3:a7:d6:33:fc:ef:40:b9 Fingerprint (SHA-256): 96:AA:4D:9F:3D:33:72:53:E0:D7:03:D4:7E:F9:DC:78:49:84:42:9E:4D:B4:3B:9A:79:D8:DB:2C:62:0C:B5:B9 Fingerprint (SHA1): B2:82:92:4E:E6:E1:CD:55:87:07:75:E3:D6:62:7B:D6:DE:B4:4A:E5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4344: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154242 (0x195756c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 16:15:19 2016 Not After : Sun Apr 25 16:15:19 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:d0:41:e8:3c:d1:0d:66:5b:01:7f:b8:ef:88:d1:dc: c0:91:e0:45:86:c7:d5:bd:6f:a4:9d:c8:45:b9:9e:ae: 4f:e9:00:1f:fe:a0:7a:bf:cb:fe:38:94:6d:b7:b9:33: 88:cf:0f:14:ab:ac:af:b7:28:1c:b9:2d:8b:12:3a:25: 3f:56:4b:10:5d:ad:43:54:ad:0a:3f:ec:de:b4:2e:07: 6e:03:b8:d3:9c:02:6c:58:bd:4d:ae:04:3d:23:f0:7d: 65:94:82:1b:bc:6b:2c:3a:75:f5:54:82:59:fa:9d:d0: 97:45:8d:f3:41:17:e2:63:40:ac:ea:9d:cf:2c:0c:fb: 32:6d:72:20:38:41:09:8e:0a:ca:ec:da:38:6f:7c:8d: 31:ba:f9:aa:c1:aa:a2:1e:64:13:22:ca:dd:b0:e0:32: e8:dc:31:02:79:a5:41:68:2a:bd:7c:5d:f2:fa:ab:eb: 46:67:f5:f7:3b:c9:92:26:c4:d8:52:76:83:60:5a:99: c7:38:72:25:14:20:07:81:ee:e2:1d:c5:0b:2f:3c:02: 3e:91:70:d6:1b:4e:cd:c4:bf:31:4e:18:a1:96:41:b8: 2b:46:be:13:79:a7:b2:bd:4e:96:9a:6a:96:16:56:47: 1d:28:cc:75:b1:3c:08:ad:51:3c:eb:22:3f:21:92:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:20:7d:c2:6c:1e:c1:96:10:f3:e0:d4:f3:36:38:83: bf:38:b5:e7:06:be:6a:75:64:59:6e:49:31:40:21:96: 77:8e:b5:7d:d2:19:e3:2d:1d:99:8c:a5:8a:c0:a9:c1: 5b:d5:fd:89:08:84:f3:db:eb:b5:fd:eb:a5:2f:45:0d: 68:76:62:fb:05:46:6f:75:df:50:de:06:4d:a0:74:42: d0:d8:82:53:fb:ab:63:02:fb:42:ea:5a:ec:9b:59:0b: a7:4a:79:3d:c1:92:f7:ca:f3:e9:8f:78:2f:c2:85:de: 93:2e:d4:4b:03:1e:b6:b8:e4:fb:89:c6:70:f4:0e:97: e1:f3:bd:73:77:34:6b:2c:7b:93:eb:5b:be:50:30:0b: 12:08:9a:c0:9c:c3:5c:c5:bf:67:b7:37:71:1c:5f:c8: 8f:43:0b:1f:02:88:32:62:f2:62:9b:44:86:d2:30:f6: 8d:7d:a2:df:0b:8e:32:14:4a:c5:62:a4:13:c6:6b:24: 45:58:72:57:81:f6:6a:ec:61:72:ed:cc:3f:c4:77:a5: 25:e6:cf:06:d3:26:a9:e8:f5:ed:9e:06:45:33:d6:11: 4e:f8:e1:44:a9:5c:f5:78:1f:71:e5:93:43:15:ed:72: d0:36:38:41:f4:75:a5:be:b2:ce:9d:50:fd:d1:94:1b Fingerprint (SHA-256): 2C:09:C1:13:AF:01:D6:CE:50:CD:DB:BE:51:FB:B5:95:5B:6E:09:13:7A:CE:EA:61:04:43:C2:A3:35:16:11:DC Fingerprint (SHA1): 37:BD:BB:F5:D0:12:CA:10:B6:1A:4C:A0:35:75:94:E3:06:EE:54:81 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4345: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4346: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #4347: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #4348: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154242 (0x195756c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 16:15:19 2016 Not After : Sun Apr 25 16:15:19 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:d0:41:e8:3c:d1:0d:66:5b:01:7f:b8:ef:88:d1:dc: c0:91:e0:45:86:c7:d5:bd:6f:a4:9d:c8:45:b9:9e:ae: 4f:e9:00:1f:fe:a0:7a:bf:cb:fe:38:94:6d:b7:b9:33: 88:cf:0f:14:ab:ac:af:b7:28:1c:b9:2d:8b:12:3a:25: 3f:56:4b:10:5d:ad:43:54:ad:0a:3f:ec:de:b4:2e:07: 6e:03:b8:d3:9c:02:6c:58:bd:4d:ae:04:3d:23:f0:7d: 65:94:82:1b:bc:6b:2c:3a:75:f5:54:82:59:fa:9d:d0: 97:45:8d:f3:41:17:e2:63:40:ac:ea:9d:cf:2c:0c:fb: 32:6d:72:20:38:41:09:8e:0a:ca:ec:da:38:6f:7c:8d: 31:ba:f9:aa:c1:aa:a2:1e:64:13:22:ca:dd:b0:e0:32: e8:dc:31:02:79:a5:41:68:2a:bd:7c:5d:f2:fa:ab:eb: 46:67:f5:f7:3b:c9:92:26:c4:d8:52:76:83:60:5a:99: c7:38:72:25:14:20:07:81:ee:e2:1d:c5:0b:2f:3c:02: 3e:91:70:d6:1b:4e:cd:c4:bf:31:4e:18:a1:96:41:b8: 2b:46:be:13:79:a7:b2:bd:4e:96:9a:6a:96:16:56:47: 1d:28:cc:75:b1:3c:08:ad:51:3c:eb:22:3f:21:92:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:20:7d:c2:6c:1e:c1:96:10:f3:e0:d4:f3:36:38:83: bf:38:b5:e7:06:be:6a:75:64:59:6e:49:31:40:21:96: 77:8e:b5:7d:d2:19:e3:2d:1d:99:8c:a5:8a:c0:a9:c1: 5b:d5:fd:89:08:84:f3:db:eb:b5:fd:eb:a5:2f:45:0d: 68:76:62:fb:05:46:6f:75:df:50:de:06:4d:a0:74:42: d0:d8:82:53:fb:ab:63:02:fb:42:ea:5a:ec:9b:59:0b: a7:4a:79:3d:c1:92:f7:ca:f3:e9:8f:78:2f:c2:85:de: 93:2e:d4:4b:03:1e:b6:b8:e4:fb:89:c6:70:f4:0e:97: e1:f3:bd:73:77:34:6b:2c:7b:93:eb:5b:be:50:30:0b: 12:08:9a:c0:9c:c3:5c:c5:bf:67:b7:37:71:1c:5f:c8: 8f:43:0b:1f:02:88:32:62:f2:62:9b:44:86:d2:30:f6: 8d:7d:a2:df:0b:8e:32:14:4a:c5:62:a4:13:c6:6b:24: 45:58:72:57:81:f6:6a:ec:61:72:ed:cc:3f:c4:77:a5: 25:e6:cf:06:d3:26:a9:e8:f5:ed:9e:06:45:33:d6:11: 4e:f8:e1:44:a9:5c:f5:78:1f:71:e5:93:43:15:ed:72: d0:36:38:41:f4:75:a5:be:b2:ce:9d:50:fd:d1:94:1b Fingerprint (SHA-256): 2C:09:C1:13:AF:01:D6:CE:50:CD:DB:BE:51:FB:B5:95:5B:6E:09:13:7A:CE:EA:61:04:43:C2:A3:35:16:11:DC Fingerprint (SHA1): 37:BD:BB:F5:D0:12:CA:10:B6:1A:4C:A0:35:75:94:E3:06:EE:54:81 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4349: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154243 (0x195756c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:15:26 2016 Not After : Sun Apr 25 16:15:26 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:c3:25:1b:13:b0:ae:7f:db:c4:de:03:ac:da:7a:43: 4b:c7:58:ad:cb:72:c7:d2:93:51:42:45:a4:7c:8a:d2: 65:43:68:64:9c:c2:d4:3b:22:5d:3b:75:0f:b2:6f:86: 39:66:5f:10:ce:62:37:52:03:6f:15:38:de:0c:31:38: 25:66:e2:64:4a:d9:8b:87:c9:2b:7e:51:52:70:9e:54: d1:7a:7d:23:6b:67:36:2d:28:ff:e6:5d:02:91:ac:e0: 1a:17:72:95:00:e6:1b:32:27:9a:01:c0:35:0d:9d:54: e4:e7:32:d2:c2:e4:76:ed:e6:c6:9c:69:dd:7d:9b:d6: d5:61:0b:a9:6a:3d:b5:22:13:25:04:d5:09:34:a0:39: 9a:72:03:29:2b:8b:6c:71:57:e4:58:69:bc:8e:8b:1c: ca:52:7f:e3:70:92:3f:f2:45:0e:1b:02:43:c2:ac:d0: bc:ce:58:34:7c:62:a3:b2:f0:de:51:22:3c:f1:d1:8b: 02:43:d1:90:f2:75:ff:7e:25:4b:3d:e5:ca:ff:de:90: 1b:64:d2:eb:e2:e5:46:c8:65:7f:8e:f0:93:c5:26:96: 30:5f:c8:e3:e2:05:d4:ed:ff:50:a9:f6:d0:4b:a6:6f: 45:38:83:55:17:02:f4:d8:c8:64:ef:75:db:a6:6e:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:ec:44:49:7f:fc:5a:b1:06:27:c9:9d:04:6c:3c:e2: ee:2f:ea:a2:39:89:2f:59:75:db:20:f7:1e:34:e5:6e: df:6c:e9:c2:a5:c5:d6:8a:60:f8:1d:93:81:a0:3a:9a: 4d:af:1a:df:f3:7f:5a:0a:15:e3:25:1e:69:c6:48:97: 5d:58:04:17:38:df:86:90:96:f9:d0:d6:27:7b:d7:6a: 27:63:be:c8:a2:d8:e4:4e:2f:68:7a:f4:a2:6e:5f:bb: 5b:75:28:fd:9d:db:f4:43:22:ee:fd:e6:47:b3:37:ef: 2a:27:fe:08:ba:54:b7:28:1f:f0:10:9c:33:63:fc:e9: 83:7c:d8:43:95:1f:e5:25:9b:4a:20:5b:ef:ea:98:72: 65:f7:94:13:48:ff:20:53:ea:1a:e4:38:69:71:f3:0f: 92:a7:d8:e2:99:b5:e6:72:6e:ac:1a:7f:02:7c:c0:33: fd:10:39:d5:1a:65:f9:71:55:60:92:14:12:de:31:88: 11:04:fb:41:40:48:03:c9:7d:5a:8e:f1:8e:dc:8b:f3: 4c:b2:94:65:15:84:28:df:c6:3a:8b:6e:b3:a8:f9:69: e2:83:f1:8e:a2:03:d3:50:c9:f2:ea:79:de:b0:12:f5: 52:79:6f:f7:ac:90:24:ba:d3:a7:d6:33:fc:ef:40:b9 Fingerprint (SHA-256): 96:AA:4D:9F:3D:33:72:53:E0:D7:03:D4:7E:F9:DC:78:49:84:42:9E:4D:B4:3B:9A:79:D8:DB:2C:62:0C:B5:B9 Fingerprint (SHA1): B2:82:92:4E:E6:E1:CD:55:87:07:75:E3:D6:62:7B:D6:DE:B4:4A:E5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4350: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #4351: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #4352: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4353: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4354: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4355: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154243 (0x195756c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:15:26 2016 Not After : Sun Apr 25 16:15:26 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:c3:25:1b:13:b0:ae:7f:db:c4:de:03:ac:da:7a:43: 4b:c7:58:ad:cb:72:c7:d2:93:51:42:45:a4:7c:8a:d2: 65:43:68:64:9c:c2:d4:3b:22:5d:3b:75:0f:b2:6f:86: 39:66:5f:10:ce:62:37:52:03:6f:15:38:de:0c:31:38: 25:66:e2:64:4a:d9:8b:87:c9:2b:7e:51:52:70:9e:54: d1:7a:7d:23:6b:67:36:2d:28:ff:e6:5d:02:91:ac:e0: 1a:17:72:95:00:e6:1b:32:27:9a:01:c0:35:0d:9d:54: e4:e7:32:d2:c2:e4:76:ed:e6:c6:9c:69:dd:7d:9b:d6: d5:61:0b:a9:6a:3d:b5:22:13:25:04:d5:09:34:a0:39: 9a:72:03:29:2b:8b:6c:71:57:e4:58:69:bc:8e:8b:1c: ca:52:7f:e3:70:92:3f:f2:45:0e:1b:02:43:c2:ac:d0: bc:ce:58:34:7c:62:a3:b2:f0:de:51:22:3c:f1:d1:8b: 02:43:d1:90:f2:75:ff:7e:25:4b:3d:e5:ca:ff:de:90: 1b:64:d2:eb:e2:e5:46:c8:65:7f:8e:f0:93:c5:26:96: 30:5f:c8:e3:e2:05:d4:ed:ff:50:a9:f6:d0:4b:a6:6f: 45:38:83:55:17:02:f4:d8:c8:64:ef:75:db:a6:6e:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:ec:44:49:7f:fc:5a:b1:06:27:c9:9d:04:6c:3c:e2: ee:2f:ea:a2:39:89:2f:59:75:db:20:f7:1e:34:e5:6e: df:6c:e9:c2:a5:c5:d6:8a:60:f8:1d:93:81:a0:3a:9a: 4d:af:1a:df:f3:7f:5a:0a:15:e3:25:1e:69:c6:48:97: 5d:58:04:17:38:df:86:90:96:f9:d0:d6:27:7b:d7:6a: 27:63:be:c8:a2:d8:e4:4e:2f:68:7a:f4:a2:6e:5f:bb: 5b:75:28:fd:9d:db:f4:43:22:ee:fd:e6:47:b3:37:ef: 2a:27:fe:08:ba:54:b7:28:1f:f0:10:9c:33:63:fc:e9: 83:7c:d8:43:95:1f:e5:25:9b:4a:20:5b:ef:ea:98:72: 65:f7:94:13:48:ff:20:53:ea:1a:e4:38:69:71:f3:0f: 92:a7:d8:e2:99:b5:e6:72:6e:ac:1a:7f:02:7c:c0:33: fd:10:39:d5:1a:65:f9:71:55:60:92:14:12:de:31:88: 11:04:fb:41:40:48:03:c9:7d:5a:8e:f1:8e:dc:8b:f3: 4c:b2:94:65:15:84:28:df:c6:3a:8b:6e:b3:a8:f9:69: e2:83:f1:8e:a2:03:d3:50:c9:f2:ea:79:de:b0:12:f5: 52:79:6f:f7:ac:90:24:ba:d3:a7:d6:33:fc:ef:40:b9 Fingerprint (SHA-256): 96:AA:4D:9F:3D:33:72:53:E0:D7:03:D4:7E:F9:DC:78:49:84:42:9E:4D:B4:3B:9A:79:D8:DB:2C:62:0C:B5:B9 Fingerprint (SHA1): B2:82:92:4E:E6:E1:CD:55:87:07:75:E3:D6:62:7B:D6:DE:B4:4A:E5 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4356: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154243 (0x195756c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:15:26 2016 Not After : Sun Apr 25 16:15:26 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:c3:25:1b:13:b0:ae:7f:db:c4:de:03:ac:da:7a:43: 4b:c7:58:ad:cb:72:c7:d2:93:51:42:45:a4:7c:8a:d2: 65:43:68:64:9c:c2:d4:3b:22:5d:3b:75:0f:b2:6f:86: 39:66:5f:10:ce:62:37:52:03:6f:15:38:de:0c:31:38: 25:66:e2:64:4a:d9:8b:87:c9:2b:7e:51:52:70:9e:54: d1:7a:7d:23:6b:67:36:2d:28:ff:e6:5d:02:91:ac:e0: 1a:17:72:95:00:e6:1b:32:27:9a:01:c0:35:0d:9d:54: e4:e7:32:d2:c2:e4:76:ed:e6:c6:9c:69:dd:7d:9b:d6: d5:61:0b:a9:6a:3d:b5:22:13:25:04:d5:09:34:a0:39: 9a:72:03:29:2b:8b:6c:71:57:e4:58:69:bc:8e:8b:1c: ca:52:7f:e3:70:92:3f:f2:45:0e:1b:02:43:c2:ac:d0: bc:ce:58:34:7c:62:a3:b2:f0:de:51:22:3c:f1:d1:8b: 02:43:d1:90:f2:75:ff:7e:25:4b:3d:e5:ca:ff:de:90: 1b:64:d2:eb:e2:e5:46:c8:65:7f:8e:f0:93:c5:26:96: 30:5f:c8:e3:e2:05:d4:ed:ff:50:a9:f6:d0:4b:a6:6f: 45:38:83:55:17:02:f4:d8:c8:64:ef:75:db:a6:6e:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:ec:44:49:7f:fc:5a:b1:06:27:c9:9d:04:6c:3c:e2: ee:2f:ea:a2:39:89:2f:59:75:db:20:f7:1e:34:e5:6e: df:6c:e9:c2:a5:c5:d6:8a:60:f8:1d:93:81:a0:3a:9a: 4d:af:1a:df:f3:7f:5a:0a:15:e3:25:1e:69:c6:48:97: 5d:58:04:17:38:df:86:90:96:f9:d0:d6:27:7b:d7:6a: 27:63:be:c8:a2:d8:e4:4e:2f:68:7a:f4:a2:6e:5f:bb: 5b:75:28:fd:9d:db:f4:43:22:ee:fd:e6:47:b3:37:ef: 2a:27:fe:08:ba:54:b7:28:1f:f0:10:9c:33:63:fc:e9: 83:7c:d8:43:95:1f:e5:25:9b:4a:20:5b:ef:ea:98:72: 65:f7:94:13:48:ff:20:53:ea:1a:e4:38:69:71:f3:0f: 92:a7:d8:e2:99:b5:e6:72:6e:ac:1a:7f:02:7c:c0:33: fd:10:39:d5:1a:65:f9:71:55:60:92:14:12:de:31:88: 11:04:fb:41:40:48:03:c9:7d:5a:8e:f1:8e:dc:8b:f3: 4c:b2:94:65:15:84:28:df:c6:3a:8b:6e:b3:a8:f9:69: e2:83:f1:8e:a2:03:d3:50:c9:f2:ea:79:de:b0:12:f5: 52:79:6f:f7:ac:90:24:ba:d3:a7:d6:33:fc:ef:40:b9 Fingerprint (SHA-256): 96:AA:4D:9F:3D:33:72:53:E0:D7:03:D4:7E:F9:DC:78:49:84:42:9E:4D:B4:3B:9A:79:D8:DB:2C:62:0C:B5:B9 Fingerprint (SHA1): B2:82:92:4E:E6:E1:CD:55:87:07:75:E3:D6:62:7B:D6:DE:B4:4A:E5 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4357: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #4358: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #4359: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4360: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #4361: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #4362: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154242 (0x195756c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 16:15:19 2016 Not After : Sun Apr 25 16:15:19 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:d0:41:e8:3c:d1:0d:66:5b:01:7f:b8:ef:88:d1:dc: c0:91:e0:45:86:c7:d5:bd:6f:a4:9d:c8:45:b9:9e:ae: 4f:e9:00:1f:fe:a0:7a:bf:cb:fe:38:94:6d:b7:b9:33: 88:cf:0f:14:ab:ac:af:b7:28:1c:b9:2d:8b:12:3a:25: 3f:56:4b:10:5d:ad:43:54:ad:0a:3f:ec:de:b4:2e:07: 6e:03:b8:d3:9c:02:6c:58:bd:4d:ae:04:3d:23:f0:7d: 65:94:82:1b:bc:6b:2c:3a:75:f5:54:82:59:fa:9d:d0: 97:45:8d:f3:41:17:e2:63:40:ac:ea:9d:cf:2c:0c:fb: 32:6d:72:20:38:41:09:8e:0a:ca:ec:da:38:6f:7c:8d: 31:ba:f9:aa:c1:aa:a2:1e:64:13:22:ca:dd:b0:e0:32: e8:dc:31:02:79:a5:41:68:2a:bd:7c:5d:f2:fa:ab:eb: 46:67:f5:f7:3b:c9:92:26:c4:d8:52:76:83:60:5a:99: c7:38:72:25:14:20:07:81:ee:e2:1d:c5:0b:2f:3c:02: 3e:91:70:d6:1b:4e:cd:c4:bf:31:4e:18:a1:96:41:b8: 2b:46:be:13:79:a7:b2:bd:4e:96:9a:6a:96:16:56:47: 1d:28:cc:75:b1:3c:08:ad:51:3c:eb:22:3f:21:92:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:20:7d:c2:6c:1e:c1:96:10:f3:e0:d4:f3:36:38:83: bf:38:b5:e7:06:be:6a:75:64:59:6e:49:31:40:21:96: 77:8e:b5:7d:d2:19:e3:2d:1d:99:8c:a5:8a:c0:a9:c1: 5b:d5:fd:89:08:84:f3:db:eb:b5:fd:eb:a5:2f:45:0d: 68:76:62:fb:05:46:6f:75:df:50:de:06:4d:a0:74:42: d0:d8:82:53:fb:ab:63:02:fb:42:ea:5a:ec:9b:59:0b: a7:4a:79:3d:c1:92:f7:ca:f3:e9:8f:78:2f:c2:85:de: 93:2e:d4:4b:03:1e:b6:b8:e4:fb:89:c6:70:f4:0e:97: e1:f3:bd:73:77:34:6b:2c:7b:93:eb:5b:be:50:30:0b: 12:08:9a:c0:9c:c3:5c:c5:bf:67:b7:37:71:1c:5f:c8: 8f:43:0b:1f:02:88:32:62:f2:62:9b:44:86:d2:30:f6: 8d:7d:a2:df:0b:8e:32:14:4a:c5:62:a4:13:c6:6b:24: 45:58:72:57:81:f6:6a:ec:61:72:ed:cc:3f:c4:77:a5: 25:e6:cf:06:d3:26:a9:e8:f5:ed:9e:06:45:33:d6:11: 4e:f8:e1:44:a9:5c:f5:78:1f:71:e5:93:43:15:ed:72: d0:36:38:41:f4:75:a5:be:b2:ce:9d:50:fd:d1:94:1b Fingerprint (SHA-256): 2C:09:C1:13:AF:01:D6:CE:50:CD:DB:BE:51:FB:B5:95:5B:6E:09:13:7A:CE:EA:61:04:43:C2:A3:35:16:11:DC Fingerprint (SHA1): 37:BD:BB:F5:D0:12:CA:10:B6:1A:4C:A0:35:75:94:E3:06:EE:54:81 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4363: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154242 (0x195756c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 16:15:19 2016 Not After : Sun Apr 25 16:15:19 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:d0:41:e8:3c:d1:0d:66:5b:01:7f:b8:ef:88:d1:dc: c0:91:e0:45:86:c7:d5:bd:6f:a4:9d:c8:45:b9:9e:ae: 4f:e9:00:1f:fe:a0:7a:bf:cb:fe:38:94:6d:b7:b9:33: 88:cf:0f:14:ab:ac:af:b7:28:1c:b9:2d:8b:12:3a:25: 3f:56:4b:10:5d:ad:43:54:ad:0a:3f:ec:de:b4:2e:07: 6e:03:b8:d3:9c:02:6c:58:bd:4d:ae:04:3d:23:f0:7d: 65:94:82:1b:bc:6b:2c:3a:75:f5:54:82:59:fa:9d:d0: 97:45:8d:f3:41:17:e2:63:40:ac:ea:9d:cf:2c:0c:fb: 32:6d:72:20:38:41:09:8e:0a:ca:ec:da:38:6f:7c:8d: 31:ba:f9:aa:c1:aa:a2:1e:64:13:22:ca:dd:b0:e0:32: e8:dc:31:02:79:a5:41:68:2a:bd:7c:5d:f2:fa:ab:eb: 46:67:f5:f7:3b:c9:92:26:c4:d8:52:76:83:60:5a:99: c7:38:72:25:14:20:07:81:ee:e2:1d:c5:0b:2f:3c:02: 3e:91:70:d6:1b:4e:cd:c4:bf:31:4e:18:a1:96:41:b8: 2b:46:be:13:79:a7:b2:bd:4e:96:9a:6a:96:16:56:47: 1d:28:cc:75:b1:3c:08:ad:51:3c:eb:22:3f:21:92:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:20:7d:c2:6c:1e:c1:96:10:f3:e0:d4:f3:36:38:83: bf:38:b5:e7:06:be:6a:75:64:59:6e:49:31:40:21:96: 77:8e:b5:7d:d2:19:e3:2d:1d:99:8c:a5:8a:c0:a9:c1: 5b:d5:fd:89:08:84:f3:db:eb:b5:fd:eb:a5:2f:45:0d: 68:76:62:fb:05:46:6f:75:df:50:de:06:4d:a0:74:42: d0:d8:82:53:fb:ab:63:02:fb:42:ea:5a:ec:9b:59:0b: a7:4a:79:3d:c1:92:f7:ca:f3:e9:8f:78:2f:c2:85:de: 93:2e:d4:4b:03:1e:b6:b8:e4:fb:89:c6:70:f4:0e:97: e1:f3:bd:73:77:34:6b:2c:7b:93:eb:5b:be:50:30:0b: 12:08:9a:c0:9c:c3:5c:c5:bf:67:b7:37:71:1c:5f:c8: 8f:43:0b:1f:02:88:32:62:f2:62:9b:44:86:d2:30:f6: 8d:7d:a2:df:0b:8e:32:14:4a:c5:62:a4:13:c6:6b:24: 45:58:72:57:81:f6:6a:ec:61:72:ed:cc:3f:c4:77:a5: 25:e6:cf:06:d3:26:a9:e8:f5:ed:9e:06:45:33:d6:11: 4e:f8:e1:44:a9:5c:f5:78:1f:71:e5:93:43:15:ed:72: d0:36:38:41:f4:75:a5:be:b2:ce:9d:50:fd:d1:94:1b Fingerprint (SHA-256): 2C:09:C1:13:AF:01:D6:CE:50:CD:DB:BE:51:FB:B5:95:5B:6E:09:13:7A:CE:EA:61:04:43:C2:A3:35:16:11:DC Fingerprint (SHA1): 37:BD:BB:F5:D0:12:CA:10:B6:1A:4C:A0:35:75:94:E3:06:EE:54:81 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4364: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #4365: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154247 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4366: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #4367: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #4368: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154248 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4369: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #4370: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #4371: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154249 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4372: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #4373: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #4374: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154250 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4375: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #4376: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #4377: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154251 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4378: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #4379: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #4380: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154252 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4381: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #4382: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #4383: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154253 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4384: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #4385: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #4386: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154254 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4387: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #4388: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #4389: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154255 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4390: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #4391: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #4392: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4393: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 425154256 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4394: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4395: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 425154257 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4396: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4397: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 425154258 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4398: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4399: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #4400: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #4401: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4402: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 425154259 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4403: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4404: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 425154260 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4405: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4406: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 425154261 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4407: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4408: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #4409: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #4410: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4411: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 425154262 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4412: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4413: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 425154263 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4414: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4415: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 425154264 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4416: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4417: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #4418: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #4419: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4420: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 425154265 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4421: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4422: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 425154266 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4423: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4424: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 425154267 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4425: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4426: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #4427: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4428: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4429: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 425154268 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4430: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4431: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4432: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4433: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154269 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4434: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4435: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154247 (0x195756c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Apr 25 16:16:12 2016 Not After : Sun Apr 25 16:16:12 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:2f:05:e3:3e:54:dd:fd:f1:85:90:b5:cf:49:5a:28: f5:a9:d5:38:a9:a3:ae:b5:7a:61:b3:1e:0d:13:d7:92: 5e:66:47:0b:f0:0b:08:d6:6f:e0:39:91:72:04:2c:1f: a1:d0:47:22:fe:f8:21:cc:7a:ca:87:96:76:b5:61:53: dc:24:8a:fc:8e:2d:be:c0:cb:90:7e:5e:df:f3:4b:9c: 20:a2:44:5d:15:92:43:3a:f8:a2:9e:62:ba:1f:ed:89: a2:d1:1f:66:50:c9:f1:e0:6d:47:9c:c8:50:ad:92:55: 1f:21:02:37:7b:b1:63:39:1f:6d:48:54:d6:b8:90:2f: 61:68:b7:9f:33:cc:8e:b3:4c:c9:9f:9d:0d:c8:c1:5f: 06:ac:40:19:bf:ea:f0:74:27:5d:96:3e:26:56:dc:c0: 35:8b:c6:9f:d2:ff:2f:4d:8c:fa:29:0a:ce:d0:a1:bd: 47:c0:bb:cb:fb:63:28:7d:a3:27:1f:c7:ab:42:f5:d0: 49:3c:03:6d:14:b5:23:83:36:bb:e8:4f:3f:ad:68:ef: 48:16:d9:7c:70:2c:f6:cb:49:6b:24:0f:73:10:f0:b7: 90:5c:0f:cf:52:5b:70:ed:8b:55:39:68:22:91:4f:80: be:cd:02:11:95:b5:fb:4c:3c:a6:46:cf:d4:10:34:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:bf:b2:17:91:11:6a:87:02:6a:e9:cc:4b:33:d9:e2: 29:79:e4:c2:a5:04:22:66:c1:a8:4c:7f:86:9e:a8:5d: ba:4b:a0:1a:9a:68:90:70:a2:a6:52:c2:11:72:b9:f8: 7e:13:e6:01:e6:f3:d4:2a:3e:6c:ba:27:5b:7e:c0:89: e2:09:6a:b3:ec:24:b8:25:da:ec:b2:2c:ff:84:4f:bf: cc:b2:fd:09:01:da:5d:49:c4:6c:0a:21:c6:4c:10:c8: fe:6a:2b:d2:91:9b:f2:2f:2a:c0:46:00:ea:19:48:0d: d8:92:1c:e9:13:97:28:18:a1:39:a6:95:74:b6:92:eb: 82:22:c0:a8:17:45:c9:59:4b:43:c9:18:54:de:e7:d9: 21:97:47:d9:8e:d9:47:1b:25:c5:bf:6d:fe:d4:c3:5c: 51:5d:84:54:cd:6e:b0:83:ad:57:4d:d0:41:09:8c:20: 25:d4:ba:c7:09:1b:73:ac:8a:59:13:ad:25:b0:3c:08: 7a:1d:75:c2:53:c7:04:4a:22:bd:20:ff:dd:45:ab:be: 03:85:e4:3b:e5:c6:51:50:3a:53:88:49:c0:84:e8:fb: b3:4f:90:90:58:3e:61:22:ec:0b:b3:ea:14:02:ae:75: a9:f7:36:da:6c:0b:e5:b7:74:0f:25:6e:9d:8c:78:62 Fingerprint (SHA-256): 2F:FF:B9:1A:A9:3F:04:51:67:2B:89:51:94:7C:9B:D7:29:DE:29:32:CE:2F:FF:ED:97:8C:12:A3:E4:62:94:78 Fingerprint (SHA1): E6:10:44:E7:32:0B:18:1E:69:1A:D4:60:D8:E5:A5:AA:E3:84:E3:9C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #4436: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154248 (0x195756c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Apr 25 16:16:19 2016 Not After : Sun Apr 25 16:16:19 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:28:c9:2a:55:3e:57:07:17:59:1e:e3:be:7b:4e:56: 1f:5d:ce:68:63:5d:8e:e1:8e:bd:5d:f5:f9:15:ac:4c: 36:51:6c:dd:46:11:26:fe:86:31:08:2b:df:d8:73:d5: 37:6b:96:48:f0:b2:3a:cc:a7:99:17:1e:b1:b9:ac:f8: d0:e7:e2:93:77:d3:0c:71:f6:62:55:dc:52:bb:01:7a: 7c:05:5d:5d:24:57:6e:29:01:ae:05:16:d8:b7:b7:3d: 34:ed:19:25:ea:d0:dd:90:79:b7:d4:8f:0a:bf:64:95: 3b:d5:b4:68:e4:01:d6:90:b0:f2:47:cc:21:20:db:69: 87:5c:ed:b5:75:84:f2:c8:72:6e:5c:f7:dd:a4:6e:4a: 12:9b:af:d7:5e:b7:1c:73:cd:31:d4:ba:4e:af:bd:55: 73:44:79:c2:24:cc:04:6d:b6:ac:bd:aa:52:bc:fa:27: 6f:a8:0a:21:33:0a:fc:ae:20:4b:6f:38:4b:c9:5c:b6: 66:9a:98:75:d4:94:9a:b8:35:35:28:de:0e:69:5b:cb: 04:c6:73:94:7c:bd:22:f3:be:a3:68:2f:89:aa:81:60: 86:9e:02:4b:4f:eb:43:af:ff:21:59:b2:36:31:d3:f6: 0d:9d:34:50:9e:b8:ba:ec:e7:c7:f6:f0:0a:9c:ff:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:5e:1c:c8:10:d2:55:07:38:2c:d7:a1:fe:3b:93:a0: 3f:44:eb:76:8a:ef:71:65:53:28:94:33:c5:98:ea:a6: c6:b0:22:07:4b:8d:f3:7a:69:e5:a1:c9:18:4c:f7:bd: 4e:94:7a:17:3c:c4:b1:c5:b3:24:4b:1c:48:75:85:18: b2:1d:ad:09:a8:bb:b6:8d:99:8b:70:7c:15:75:68:00: 41:c4:34:f3:2d:0c:d9:32:d6:99:89:04:46:53:86:af: 3c:64:3c:20:9a:f6:3b:73:66:40:48:86:c2:7a:29:84: c5:e0:c9:c0:78:cd:61:e7:a5:f0:48:7d:1d:32:9b:d6: 00:ab:32:3d:9f:3d:8f:11:71:46:c8:31:15:f8:50:f9: b4:a6:0e:c6:5e:ab:d5:f8:e1:69:4d:46:f2:a3:c2:35: 21:30:9b:56:1b:9c:3f:be:d1:71:da:60:22:40:61:89: e5:f7:7c:05:19:5c:e2:34:46:81:d4:c8:12:9f:a3:5c: 10:05:eb:11:a8:77:23:ab:c3:32:e8:9d:5f:ad:65:ae: 67:ce:11:7f:fa:3c:8e:e3:85:c0:5e:30:43:31:10:d3: 15:44:7e:de:5b:3b:26:0e:0e:38:bb:99:04:f1:bc:bf: 05:d3:b8:d2:3d:c7:62:c4:f7:fb:21:62:6b:33:ff:68 Fingerprint (SHA-256): 81:06:67:44:02:CD:D6:70:2C:79:E7:6A:87:B0:CF:A0:04:F9:B1:DD:A2:C0:99:D6:34:E8:A5:C9:15:E0:2E:71 Fingerprint (SHA1): 0A:DC:57:D5:74:A6:2A:46:85:E2:8A:33:75:C0:C4:53:20:D3:67:C8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #4437: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154249 (0x195756c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Apr 25 16:16:32 2016 Not After : Sun Apr 25 16:16:32 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:59:2e:37:a8:91:a2:c3:3b:63:8c:a1:48:60:10:cb: 6d:1a:ec:94:1c:e5:ee:a9:8e:2e:71:1b:a7:35:88:ed: 95:66:04:65:75:27:77:a1:45:27:fb:e0:22:51:e7:e3: 74:b7:e6:61:4a:58:55:b6:83:05:0f:7d:a1:b1:8a:18: b1:6b:5a:63:c6:ac:ba:75:a6:33:6b:f9:a4:49:22:bf: 71:55:d5:ea:fd:c4:e1:5e:8e:69:d2:2a:fe:45:b7:f3: 19:5b:95:da:f4:9a:f3:87:83:f0:14:9c:c4:31:dc:e0: 7f:cf:43:b8:d6:4c:8c:48:d3:ea:ae:35:8a:69:b8:97: 9e:d5:21:08:03:ba:ba:97:b8:09:15:48:ae:2a:05:b7: 68:bb:e3:e6:95:95:80:84:a8:9a:1f:03:f1:4e:53:36: e8:9c:37:52:84:44:95:26:0a:8c:87:de:1a:bf:53:69: 4e:a3:1c:7a:5e:be:83:06:2c:10:7c:84:e2:6d:47:93: a2:4d:1c:2d:f5:40:66:68:5f:ee:ee:06:38:60:d2:78: 74:3c:b5:70:fe:a1:d6:48:c4:bc:2e:0f:41:e2:db:9b: ee:4f:32:7a:ba:82:1f:f0:bf:45:03:82:7e:b6:70:ff: 50:ec:5a:8a:f8:f5:92:a7:ce:15:13:d8:82:7a:dd:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:db:66:0c:f8:6e:39:70:7f:24:13:73:29:69:0d:50: d8:9b:54:dc:7a:dd:fb:2a:ee:5e:d0:09:b0:24:c4:7f: 27:b6:38:50:69:cc:de:ee:58:88:72:ec:09:4f:64:21: 26:1e:18:5b:32:ec:09:a3:72:5c:1c:45:07:bf:b4:37: b8:de:36:51:fb:e3:c8:20:89:cb:a7:72:33:c8:c3:97: 23:ae:df:40:2a:5e:4f:18:fb:70:ec:48:42:80:53:ea: 4f:b5:a7:59:e3:f3:b2:05:2b:81:e2:27:e4:91:92:25: dc:fe:a7:97:da:23:3a:97:95:26:08:55:45:33:02:6c: 46:81:4f:66:31:f0:a6:88:67:87:49:be:b8:a5:47:3b: 18:84:f4:88:dd:57:29:64:36:e4:60:9b:d6:96:1e:c0: 81:c8:73:66:58:7d:b1:32:fa:94:da:e0:ac:a0:92:40: 30:cc:57:fe:88:27:e6:67:28:9c:e0:c8:bd:f1:8a:e7: 6d:3e:f7:be:ca:83:e8:c1:c8:05:74:38:2a:dd:7c:87: 6d:ab:2d:e3:89:88:c7:e1:51:0b:45:8a:38:45:56:c0: 7e:24:81:e8:7e:d4:25:56:c7:23:80:52:7b:c6:38:7e: 1a:f1:6a:ad:a8:08:14:53:b7:7d:d4:1b:5c:07:71:e3 Fingerprint (SHA-256): 9E:D2:08:C5:57:01:38:72:55:E4:01:64:0A:F5:05:55:AC:7C:7C:31:1B:47:1E:13:68:AA:D7:FD:48:B9:0D:CA Fingerprint (SHA1): 6C:31:DB:EB:BD:6B:4E:59:58:3F:00:DB:DA:78:61:4E:AD:EB:2B:48 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #4438: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154250 (0x195756ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Apr 25 16:16:36 2016 Not After : Sun Apr 25 16:16:36 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:2a:13:01:10:06:6a:d1:4e:29:fc:ff:87:09:fb:41: e0:b4:87:f8:3c:3e:a8:5c:7a:ae:8f:d7:da:04:23:50: eb:84:1e:67:b3:ef:60:4c:26:80:c4:d2:06:b6:45:69: 6f:83:36:4b:cc:c0:2d:c0:28:87:7e:af:1f:e4:9d:25: 4c:6d:4d:af:3a:d3:ef:f1:c6:82:85:b0:52:cd:6f:55: d7:b6:e3:ae:b5:94:16:5e:d9:24:30:79:00:ff:dc:61: be:56:1c:a4:b8:8a:3d:9c:73:21:f2:93:58:b2:dc:50: c6:bf:6f:09:56:9a:82:e8:36:b3:ce:36:b6:b7:de:e3: 1c:1f:74:69:ca:42:1f:0d:f7:fd:6e:4e:c4:7a:78:e2: 88:25:9d:1c:9c:df:9c:54:0b:e5:05:cf:6a:99:27:28: 78:09:04:8c:4b:e5:3c:1e:a8:65:82:2b:fc:eb:36:5d: 39:d7:80:df:4a:8e:93:48:17:69:95:f7:4d:55:a9:e4: 6d:21:9c:3d:7f:70:3a:54:eb:de:b0:7f:2e:6f:3f:e3: b1:2d:50:2f:6d:8b:0f:f8:ba:ac:99:c6:1f:30:7c:92: 84:24:e4:80:ba:34:7f:28:14:b3:0a:a7:3e:5f:d1:a1: 26:77:a2:35:54:78:7f:d0:ae:ac:0a:56:51:be:bb:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:55:85:8b:d9:99:12:3f:c8:fb:25:9d:bf:4e:3a:03: b0:1a:b2:63:0b:ee:43:fd:da:03:b4:c3:c2:c4:7f:d7: 19:3c:91:4d:83:88:f6:3a:b5:08:96:ed:c1:bb:f2:28: d8:3f:0d:de:0e:4f:85:fd:bc:7c:90:a6:cd:ec:34:6a: b0:7b:7b:c9:1c:56:ae:d4:39:03:f6:b4:78:ed:02:f8: dc:5b:7c:c4:5d:43:9e:28:00:b2:ad:18:1e:f4:fb:72: 47:f2:03:1d:ff:ea:9e:99:5f:b3:71:32:5e:bb:dc:d3: d1:0d:0f:1d:4f:82:8d:98:13:ae:4a:2f:b5:0b:04:2d: 8f:fb:6b:d7:a9:f7:66:ff:25:27:2e:38:2f:f5:2f:89: 00:a2:e6:16:c5:7d:67:c8:0e:b2:5f:3c:a5:96:6e:a7: 34:9b:22:44:1b:e5:ec:2a:23:74:f4:8b:d2:63:00:71: 7b:22:24:fb:7a:a1:b0:8e:70:36:0f:4f:35:d4:22:64: 61:3a:41:37:d7:df:3a:17:18:ab:b8:cf:04:59:60:18: 5f:e7:2b:e2:02:ed:18:fc:44:26:a6:94:d8:af:7d:5a: 49:77:1f:33:5f:b7:8d:59:96:15:21:27:f1:ef:e7:f1: 5a:53:76:ac:1e:09:08:c6:11:a5:88:d5:e1:c7:b7:95 Fingerprint (SHA-256): F8:91:28:17:00:D7:CB:AA:FA:55:46:C9:21:DF:7D:8F:A2:06:BC:59:D0:88:62:DB:70:45:15:FE:0A:CC:8B:6B Fingerprint (SHA1): EF:CB:6B:FD:23:5A:F0:FC:43:82:F7:73:81:EE:BF:BE:50:91:BD:EA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #4439: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154251 (0x195756cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Apr 25 16:16:43 2016 Not After : Sun Apr 25 16:16:43 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:d1:10:98:50:d0:8f:6f:11:ef:a5:93:73:bb:b4:d7: 28:34:8a:a4:f5:32:7f:75:7f:3f:2e:ce:22:df:7e:d3: 89:e1:fb:a0:8e:41:73:f8:0c:16:f9:c3:e4:af:32:9c: ab:8f:d9:e5:c3:70:ec:69:9c:0c:14:8b:e1:11:0c:ba: 23:35:14:59:3e:2e:24:d0:f2:51:d1:7a:45:f9:c5:93: 34:41:f4:71:13:ef:ff:f3:51:fa:a7:98:35:71:78:69: e2:fa:a8:1a:30:55:7e:26:69:3a:ba:c6:5b:90:99:ec: 65:00:9c:1c:ab:42:a1:95:cb:f7:73:73:83:f8:31:7d: d2:8a:9f:f6:9f:15:13:ab:b3:a3:f0:ae:88:d0:7b:70: 09:a2:9e:93:64:02:4a:27:f1:e8:4d:a6:09:ac:f3:a0: e0:26:c6:3c:1b:d6:4d:d6:ba:7f:c3:de:70:15:6c:72: d1:88:0a:c1:3c:0d:f0:57:6b:52:7f:f3:20:62:09:0b: 64:af:a9:86:77:1b:38:24:69:94:6e:f0:d2:48:d7:5b: bb:f1:be:3a:c7:d1:37:03:90:21:17:61:28:db:24:e9: c0:fa:7b:38:91:8f:33:02:28:38:55:92:90:64:da:24: cf:a7:0c:52:f7:91:54:97:43:19:76:34:91:cc:ff:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:ae:2b:32:3f:a8:1e:8f:c4:8d:8e:e2:60:5c:05:b3: a3:60:fa:95:30:be:f3:92:1f:e4:da:a3:7d:97:97:24: 2a:95:51:e0:73:0c:10:5c:e6:a9:ad:5f:48:38:cc:dd: 20:a8:69:78:0b:2c:09:7a:25:e3:df:67:17:2a:7c:57: 3b:da:d2:fa:91:d0:0a:ba:f5:20:19:3f:0e:b7:d2:fa: 0e:ab:f8:1e:5b:d4:21:b8:5a:48:52:da:2c:7b:1b:57: 50:2d:01:5f:ef:5f:e4:c0:60:b1:7c:de:ee:ca:b4:cb: 50:39:d8:6b:f8:10:5b:cd:9d:a4:8c:7a:dd:7f:4c:dd: fc:08:2d:c3:e6:a6:46:4a:02:91:5d:a5:ca:42:3f:2d: 52:c1:3c:da:b4:3e:9b:c0:ad:cb:58:78:74:ed:d8:14: a7:bd:cd:0e:d4:ae:c2:e5:bb:d1:40:86:53:d2:25:d7: 38:ee:3f:4a:9d:30:a2:aa:ee:ba:27:5a:3f:75:a9:39: f7:50:37:24:eb:3f:3c:60:bd:49:5b:f6:4d:6c:5c:32: 16:a6:7b:f8:94:50:1c:53:e3:5d:4d:69:ca:69:3d:c9: a7:3e:7c:82:80:01:ca:bd:ee:9f:af:91:3d:94:9e:44: d4:38:74:68:d8:32:24:b2:ea:75:66:95:20:96:d0:7b Fingerprint (SHA-256): AC:66:47:47:DB:3E:48:56:B4:56:CB:DB:B6:83:C4:74:73:35:62:8F:E1:2E:E3:B3:3C:36:0F:CE:68:BC:B4:1C Fingerprint (SHA1): 6E:FF:DB:08:C0:C3:A3:0A:98:7D:BB:A5:CB:CB:B9:7F:57:A9:C2:0C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #4440: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154252 (0x195756cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Apr 25 16:16:52 2016 Not After : Sun Apr 25 16:16:52 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:ce:1f:28:19:c3:b8:0a:76:7b:13:73:62:56:6b:fa: 11:5f:27:e4:a2:60:bd:2c:61:d5:4a:d9:04:55:4c:b0: a4:82:74:4e:f9:de:5a:14:f8:b3:6c:82:c4:86:48:7d: 94:d5:23:f2:74:8b:16:72:66:90:82:94:8b:1d:48:c7: 19:10:30:a0:b3:1a:23:e6:e3:c5:19:e6:e8:47:47:9d: 03:93:1e:3e:e9:95:d1:c0:56:ca:80:3b:43:11:96:32: 0c:d5:1d:c5:60:09:58:16:06:35:90:7f:24:26:9f:91: a3:1c:bc:70:ea:b9:3e:7e:e0:3b:37:18:69:c5:0f:0e: b9:86:6c:92:22:da:68:74:fd:43:f1:d1:ea:6e:cd:d3: 57:5e:98:6a:db:2f:5d:e3:fe:8a:f4:ff:ef:c8:70:f7: 42:ae:17:60:e3:3d:db:31:1f:67:63:ca:ce:01:85:7b: 08:98:5e:6d:22:74:de:59:33:da:44:67:26:6c:02:c3: 5d:5f:2c:6e:8f:20:27:ed:1a:7e:32:35:67:10:81:f5: 78:c6:81:39:d1:88:0e:e1:fa:b1:50:39:59:c0:9d:7a: 78:52:4d:cc:9e:10:bd:a6:c0:5f:b1:38:62:e2:90:15: 5c:43:0d:c7:38:29:d7:8f:be:6e:41:41:bd:f5:06:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:9d:2c:a3:e0:33:7e:6f:7f:77:d2:bf:06:f6:60:7c: e2:ea:17:8c:cb:fd:5a:82:cd:db:2b:c0:4e:b5:64:86: 2a:44:eb:c3:14:95:b6:c9:36:c3:bf:6a:a6:87:aa:d7: b1:7c:47:33:3f:dc:47:47:db:fc:98:5a:02:e8:c7:16: 0c:bd:6e:12:dc:2c:21:f9:c6:b9:c7:08:f6:ae:1d:09: 66:0e:cc:92:49:28:35:5f:1e:fa:33:ed:f2:92:75:b8: 4a:64:a5:e7:f1:15:4f:ca:35:96:7a:d2:22:c4:36:ed: 0c:7d:90:cd:85:94:a9:b1:83:ed:f1:1a:da:0e:5b:08: 0f:fb:db:7c:f0:4e:8d:be:c4:c1:73:8d:4c:08:06:86: 1b:a2:9f:f7:d8:88:d6:ec:06:05:d6:40:d8:b4:7f:28: 6b:8b:3a:e1:05:fc:a9:84:40:9f:b8:d7:b8:8a:0b:27: 8c:db:0b:30:90:36:a9:e9:90:d9:9c:e0:31:39:f8:7f: 06:a3:9d:08:13:33:f7:09:a8:01:6f:af:e4:29:0f:ec: 60:50:53:28:b2:6f:89:0d:e0:94:90:4b:8c:75:2b:3c: c4:db:9e:6a:1c:5f:04:7e:5f:a5:5d:9e:02:e6:70:42: 7b:8c:6c:3a:8e:17:c3:df:cf:ca:b6:03:8e:fb:ad:de Fingerprint (SHA-256): C9:1B:0C:15:45:40:4B:F5:76:52:6E:5A:D8:FD:2B:9A:BA:CC:0A:8A:1F:4E:DE:A9:29:65:86:E5:B6:05:24:5F Fingerprint (SHA1): 9B:40:62:59:E1:AF:E8:D3:9C:1C:08:3F:70:73:2A:B6:AB:53:81:64 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #4441: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154253 (0x195756cd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Apr 25 16:16:59 2016 Not After : Sun Apr 25 16:16:59 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:94:cf:dc:a7:7f:a4:5b:a8:b9:ad:7a:2c:ed:9f:c7: 6a:35:26:32:90:e9:1a:bf:b3:1b:16:13:e6:fe:7b:c2: 25:b3:70:2c:70:b0:b3:ba:62:18:54:af:e4:ec:1a:26: e2:94:48:d5:bc:52:72:5b:da:07:17:aa:8b:b7:a0:a3: fb:c1:b3:84:5d:5a:45:8a:bb:80:b1:c1:67:4f:ba:e9: d7:34:0d:92:a6:9d:6c:be:d4:7a:27:99:79:bb:cb:b2: 64:ac:76:c6:3a:1f:78:0a:02:95:c9:c0:7f:8b:8d:57: ef:73:72:b8:2d:fb:4e:46:6c:2b:9c:e7:f5:6a:5e:05: 65:07:16:ff:1c:e7:4d:c5:d1:58:72:b6:57:f7:2f:1a: 0c:12:73:ee:0a:e9:10:da:b4:78:94:fa:fb:7d:ca:a6: 07:ef:a8:23:25:2f:c3:5d:ae:05:35:86:56:c6:19:65: 78:df:52:91:05:de:76:3f:73:b3:f2:e9:6e:c2:92:53: 44:9f:19:eb:f4:49:99:28:b7:57:bd:a5:b0:8a:3d:20: 7b:86:83:32:61:c2:10:5c:e6:41:bb:bb:ea:b7:58:67: 1a:00:25:fc:f1:ce:76:03:5e:35:c1:04:06:51:cc:dd: c8:5f:54:5d:e0:7c:9f:ba:c8:14:36:f4:fe:bb:24:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:f2:a1:7a:35:d4:7a:9a:fe:a0:c5:07:00:33:64:51: 40:08:0e:4b:67:fe:32:5d:d3:13:7c:f1:cb:c4:b8:51: 1a:05:fd:aa:de:ba:3e:1d:b1:bb:52:a3:2d:4a:64:7a: 29:a6:99:ba:7a:bb:cc:f4:aa:0b:67:b5:70:42:1a:f2: 5b:d5:4c:51:45:0d:3b:91:08:ae:aa:52:07:9e:82:95: 3b:01:58:a4:57:e8:df:57:92:a6:4a:b2:7f:06:2a:2f: 0b:7c:a9:43:3e:46:85:36:8f:c8:62:4c:0c:db:1f:df: a1:91:de:23:ed:ba:60:3b:2b:8e:82:63:d6:f6:fd:da: 11:cd:40:b9:88:68:64:68:66:fe:6a:d6:68:32:a9:d1: 0b:70:d7:d4:f4:54:99:f4:22:91:df:6d:00:fd:de:39: 16:98:67:fc:55:cf:ac:ea:ea:43:3d:ff:04:ef:e9:ba: 51:3d:28:4d:47:7f:96:ad:0d:4c:55:0f:12:aa:2e:7c: 58:24:4e:d6:fd:ab:24:45:c8:4b:b9:37:4a:c3:9e:90: d5:33:3b:bf:e8:8d:59:b4:d3:51:ec:42:e1:73:c8:d4: 9e:62:88:f1:54:92:45:17:1f:2a:78:b7:b6:e1:07:61: 9d:76:e6:f1:a4:4b:5b:85:17:53:61:b5:97:2a:81:62 Fingerprint (SHA-256): 84:CA:C8:DE:9E:8F:83:44:38:D2:A1:EF:80:39:34:5C:F8:6F:68:9F:67:18:13:7C:CE:29:0A:65:E6:6A:08:17 Fingerprint (SHA1): 50:7C:3E:A6:1F:4E:4B:06:D1:F2:9A:71:80:5D:30:8A:18:10:09:F8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #4442: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154254 (0x195756ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Apr 25 16:17:16 2016 Not After : Sun Apr 25 16:17:16 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:be:39:c0:19:de:49:dc:01:55:74:ea:1d:27:e6:71: 3c:c2:35:7b:f9:74:7f:14:0d:bd:9b:80:12:68:78:aa: c5:c7:16:4e:f2:94:62:c8:95:bd:90:9f:47:47:f7:30: 2c:4b:8b:81:52:39:74:ac:b2:d9:cb:89:ff:c5:d6:ab: f9:24:c9:ac:5e:26:fa:2b:83:dd:1c:01:e7:67:10:53: af:55:d4:b9:94:45:30:42:c7:2d:2b:8e:33:bd:8b:ce: 36:4f:d5:d8:1d:27:26:ae:b3:00:35:54:d3:ec:cf:9c: ec:49:3e:6f:60:dd:31:b3:a4:c8:63:00:83:05:a2:a2: 6d:39:67:e8:3c:13:71:19:c6:2e:03:ce:2f:e8:59:b6: 6f:00:9d:df:33:a9:b6:c8:c0:80:f7:a3:d1:d7:bd:7e: 32:c9:d8:2f:5d:15:43:62:33:59:4a:36:40:ea:76:89: 8e:1d:8e:ba:5f:e9:e4:c7:3d:c7:b6:d3:6b:09:f8:9c: 42:31:3e:f5:7c:9e:94:93:94:89:3b:4d:25:46:8a:55: 7d:56:0d:48:62:e0:fb:bd:8a:f1:a4:56:13:e4:bd:03: 38:98:69:85:22:01:36:fa:43:4f:5a:42:65:69:0a:77: e6:07:31:4d:3c:ac:e2:d7:74:5e:b7:75:b3:33:6c:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:3a:1d:0a:ce:e7:3c:33:b3:d3:30:fa:2e:07:79:db: 17:20:8c:dd:dd:3d:94:2d:31:17:6d:09:60:0f:3e:1f: e5:57:d6:12:56:a7:80:bf:91:6d:3d:61:ea:82:2c:48: e2:19:29:16:3f:e2:74:13:f6:d9:13:3d:a4:b4:b4:37: 7c:f1:0f:5d:1f:f1:60:4c:31:1c:80:28:0f:c9:4e:12: 36:98:19:82:53:b5:12:a4:5e:fc:46:26:40:a3:92:26: 37:91:17:06:14:36:5c:6c:a5:44:c5:ed:f0:1d:9b:8c: dd:25:4f:21:d6:b5:1a:e9:ea:1c:e5:41:90:71:3b:40: 79:6c:69:ec:66:7a:45:9f:0d:3b:95:ff:fa:f7:c5:56: b4:df:ba:62:fb:9d:ff:34:a1:ea:32:dc:19:57:d8:25: 37:17:a6:00:5b:45:8b:1d:65:6e:d6:06:7e:ef:c7:a4: 46:2c:49:bf:c2:d9:68:fd:5e:c4:6c:97:e7:cc:7b:61: d3:e0:6e:13:e5:85:83:2e:ac:2e:79:d2:24:66:17:8b: 94:b5:fa:de:01:7b:4d:a8:c7:6d:78:4f:a5:be:ab:bf: 97:af:4d:d5:f9:e7:e7:48:18:8f:41:62:d6:9d:42:c0: 45:f3:87:db:2e:c0:aa:b0:40:cb:b1:cb:57:ae:d7:d5 Fingerprint (SHA-256): A7:7B:55:E3:31:6B:A1:31:5C:BE:87:1C:AD:DF:8E:69:45:2F:37:30:4B:A1:3A:44:BF:F9:4A:B1:B1:0E:71:0F Fingerprint (SHA1): 33:10:97:CC:2E:7F:23:8D:7F:AD:E1:7E:BA:2D:72:52:AF:6B:D4:8A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #4443: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154255 (0x195756cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Apr 25 16:17:25 2016 Not After : Sun Apr 25 16:17:25 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:8b:8a:bf:db:0d:e6:80:fb:e6:70:12:85:99:83:6f: ba:c6:29:af:d6:7a:97:67:bb:31:e1:a6:ed:9d:c8:bb: 21:88:7c:e9:30:6f:b8:3a:c0:c5:bf:3a:ab:ce:a4:a5: 7e:67:56:f7:5a:03:88:a6:6f:58:b5:79:c4:ad:34:08: 16:6b:73:af:04:a3:ee:b2:a4:e4:56:2a:c0:80:9f:20: be:1f:96:2c:1c:e2:d9:2b:a9:e3:7a:b1:a1:ab:66:5d: 32:c7:16:ec:83:23:f8:8c:19:84:a9:eb:c5:8a:e7:3c: 05:6f:bb:d3:f8:2f:3c:d1:10:09:d8:ea:6c:35:7f:e8: 07:36:bd:9b:19:52:de:66:02:10:7e:ba:40:6d:0f:d6: 81:db:5b:6a:14:16:3f:82:63:a0:9f:3f:23:a7:fc:24: 61:a4:2b:ff:17:40:ca:59:62:59:c5:6f:68:e0:c0:69: f7:8b:80:ec:f5:fb:a7:fc:51:d6:97:9d:a7:30:c1:b1: 95:f2:e3:93:ac:a3:cc:b6:7c:2a:86:a2:14:65:d5:e5: 28:bf:e0:a3:71:3e:21:33:27:06:c0:a8:33:73:b2:ec: 92:fa:9f:e2:22:c8:f6:e1:d5:8d:c5:05:fb:34:6b:65: 17:11:a9:0d:11:62:22:fa:c3:af:5a:be:fa:f1:11:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:3b:e5:26:50:80:be:48:a6:c3:4d:f4:06:58:21:f6: c5:ba:f3:3c:36:72:c5:bc:3c:ef:b1:4e:81:b3:49:74: a5:a5:50:f6:57:9c:f0:07:a1:7a:e9:b0:42:04:a7:58: dd:af:db:dc:f2:2d:dc:83:22:02:be:03:4d:fe:e4:98: 8b:c5:62:73:9c:2a:ae:b2:9c:4d:56:09:31:fc:34:a7: ca:47:dc:b8:c8:e2:49:09:06:b3:41:26:af:f9:1b:09: 5d:d9:88:12:da:f4:36:4e:fc:bf:3c:f7:e2:d1:b5:ac: 84:53:d2:35:ac:cf:96:16:d0:d4:a4:e2:9b:69:3b:50: 26:65:ec:ef:24:e6:12:2f:e1:2e:e9:1e:72:ae:9c:2e: 3f:d2:e5:f2:a6:67:0f:86:31:aa:0c:12:f7:dd:aa:14: 2e:56:3b:a8:75:05:fe:7b:e5:7a:90:57:96:c9:b9:9d: db:92:99:a9:0a:29:da:30:bd:72:b2:2d:e8:4e:85:22: e2:ff:21:57:01:2c:1d:58:a0:83:ed:da:93:65:19:81: b2:25:d7:76:a9:10:ea:5b:b3:a6:e2:62:e5:a9:20:c0: 2d:a2:46:18:d7:1d:77:29:b8:d2:e4:fc:2a:a6:66:58: a4:80:84:41:00:d5:d4:0d:44:3c:1e:81:8f:25:77:75 Fingerprint (SHA-256): 06:52:A4:4A:C0:34:CB:42:C1:50:BD:8B:1E:F7:FE:FE:AB:EC:F9:BB:49:87:C7:03:EC:2B:0C:39:65:FC:DC:34 Fingerprint (SHA1): 02:D1:7B:35:09:D2:6D:1A:C7:C9:E7:C2:7D:5D:C5:5E:0E:1F:18:F1 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #4444: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4445: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154270 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4446: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4447: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4448: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4449: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154271 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4450: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4451: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4452: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4453: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154272 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4454: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4455: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4456: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4457: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425154273 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4458: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4459: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4460: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154270 (0x195756de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:18:52 2016 Not After : Sun Apr 25 16:18:52 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:04:d1:3a:35:ad:7b:ed:9c:87:d0:79:87:52:61:62: 72:2e:f2:f4:af:9b:d7:a8:9f:fd:30:c2:3b:ab:6f:b9: 19:3f:b2:cd:26:fa:7a:b9:e2:37:bc:88:7b:5d:8a:07: 57:af:23:e5:40:8f:65:c7:81:5c:5c:46:08:3d:50:b0: fa:ba:fa:bc:bf:81:05:a3:e7:a4:0c:00:6a:da:79:50: c3:13:8d:96:ef:65:17:14:15:be:f5:fb:1a:30:b8:f8: 66:96:2e:b6:4e:b3:f3:3a:21:79:92:b8:79:22:70:f9: 7a:7d:aa:28:80:d2:63:8f:f7:e3:bf:ca:c4:cc:c2:4e: 7c:bc:5c:e2:e7:06:84:43:cb:e0:b6:f5:08:19:a1:0e: 6d:44:1d:c2:7b:16:c9:05:e5:33:a2:62:f4:02:4a:32: 9a:c5:2f:a7:5d:15:25:32:a7:d9:52:86:68:57:4c:4e: 5b:83:6f:1e:7f:91:68:8d:ad:77:5f:b7:ab:c1:3a:d8: 1b:5a:6a:a7:95:15:99:74:76:41:43:54:a4:72:f2:ee: 78:3c:5e:94:be:97:bc:a6:f2:b2:e7:45:63:20:eb:14: 4a:dd:b7:0d:63:c8:e5:8e:04:27:89:d2:35:52:dc:32: ab:64:da:5c:76:b0:e6:74:1d:06:0f:96:b6:31:b8:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:23:73:88:c3:01:83:47:8f:a6:ae:7c:df:57:3e:f1: be:6d:62:31:c5:7b:c9:de:5f:be:f8:51:f8:88:83:78: 46:9f:39:ab:86:a0:0d:bb:24:31:4f:5e:87:37:da:77: 55:99:24:d0:2c:44:13:23:58:4f:d3:59:58:d6:c8:6b: 75:22:1d:f4:6a:f2:41:5c:0d:fd:41:68:3f:79:9b:b0: da:15:72:24:14:e4:53:6f:12:1f:db:7e:8f:b9:3c:0d: 0f:1b:b1:1e:1d:db:eb:0a:d9:41:b4:10:56:f5:ec:31: 23:5f:3f:4e:18:ec:97:76:9b:04:b3:a4:00:f8:39:05: 5c:a6:98:da:69:b6:7d:51:cf:2b:19:1a:c7:16:66:99: 51:33:42:26:25:b0:a4:3c:8a:3e:54:1a:32:e7:56:90: d1:b8:a6:5b:c6:b2:11:0b:cb:a2:dd:4f:df:fa:8c:04: 03:32:4e:ef:a6:e6:0d:a4:f7:5a:f2:e9:07:9a:e3:44: 30:ad:80:bb:e3:ba:3d:82:51:fc:c3:92:d4:77:e9:3e: 0b:ec:f3:c2:b7:f2:b2:b2:3e:ae:90:96:da:ab:1e:ad: bc:f6:d0:d6:ba:e6:fd:23:85:94:77:8f:1d:1c:a8:9e: 70:68:4c:f6:a9:94:52:11:87:dd:14:cb:ff:6a:f3:5e Fingerprint (SHA-256): 06:27:12:A0:43:EF:D5:92:18:CC:36:AC:44:88:2E:C4:27:5D:91:4C:39:91:F7:EF:68:9B:79:3E:53:8E:48:CE Fingerprint (SHA1): D9:C4:3E:2E:7A:9D:9D:0E:DD:F6:36:C2:3C:1D:43:03:0E:16:5B:7D Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4461: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4462: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154271 (0x195756df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:18:58 2016 Not After : Sun Apr 25 16:18:58 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:20:84:38:8d:da:ba:1b:8e:af:8b:65:6f:fe:62:72: 37:46:b7:41:66:ac:fa:81:77:a3:d3:44:6f:89:0a:18: 9f:f5:94:41:0b:c1:13:fe:98:6e:e6:f7:8d:9f:8e:ce: 40:54:63:d1:e6:bb:a9:46:87:ef:27:9a:9f:13:e4:4f: 02:8b:bb:d1:7a:dd:e5:29:c7:f6:1e:ed:ec:5f:03:ef: 29:09:61:19:b8:ee:0d:bf:ac:d0:88:0d:17:c1:68:74: d4:3f:f4:20:5e:52:d2:dc:ed:62:db:47:45:1d:b1:d8: b6:cb:aa:67:ed:61:bb:6b:9d:17:a8:53:50:81:6a:4d: cd:19:f7:55:c0:cd:9d:0c:6b:e0:a1:f1:34:51:41:75: 13:1d:f0:96:9b:a3:19:7d:65:83:da:26:57:8d:30:51: cd:be:f1:93:18:bc:dc:6b:71:0b:38:d1:29:50:7f:e7: bc:81:78:66:78:a8:4a:c8:c9:76:10:86:f2:ee:0f:7a: e1:4a:bb:c9:f9:63:1d:f3:9d:d7:06:51:e3:f9:82:ce: 5b:84:10:11:ce:ce:05:b1:50:7c:8d:7f:85:9e:34:aa: 00:e9:ec:a8:68:1d:4e:03:69:a0:30:c0:fc:6c:06:ff: e5:f7:03:d9:4b:33:4d:a0:ee:58:d8:07:95:d6:7c:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1e:3b:73:04:bb:55:da:cb:58:4c:0a:df:67:93:ae: 82:e9:51:1a:8e:00:8d:a4:1b:41:aa:0d:eb:97:9a:5b: 28:e0:bc:63:c6:41:45:09:f5:41:4e:02:9f:df:94:09: 55:57:97:64:94:a5:5b:75:b6:2a:ff:b3:d3:30:4c:f1: 7a:92:cf:2c:f0:43:86:ae:84:f7:12:69:2f:43:9d:56: 58:39:00:0f:ab:ed:9e:2b:2a:bd:74:19:9a:57:5e:fe: 39:b1:a9:48:00:cc:1a:17:86:55:62:56:d8:44:4b:5e: 27:c4:9b:58:23:44:25:75:22:48:fa:af:72:3b:59:f2: 4c:20:d4:7f:ff:ed:8d:40:ed:df:69:84:3c:67:c1:34: 40:c2:8d:c5:7c:e0:3d:b4:0d:90:fe:92:16:50:9d:21: a5:1d:ba:df:2c:a9:8d:5d:54:74:0f:99:f9:e6:3e:7e: 0b:20:6e:c2:87:8b:09:91:73:97:6b:bf:69:de:ae:04: 20:98:14:c1:9f:9b:e6:a1:3c:c4:cf:74:23:a7:5b:c9: 50:a9:93:d4:40:3c:6b:ec:8e:e4:ab:94:97:0c:d4:57: b8:28:f9:25:e4:c9:4d:04:b2:4c:36:5e:39:30:4f:16: e2:cb:10:a1:da:89:8b:2e:8c:a9:a3:eb:2e:a3:5f:1b Fingerprint (SHA-256): 4C:93:2F:7B:2C:A4:14:29:CD:E8:63:3E:9F:66:A5:45:D4:DA:54:27:67:84:7F:87:3F:4F:44:B5:A1:EF:8A:2B Fingerprint (SHA1): FC:CD:EE:A0:37:A8:0B:7E:B1:21:53:84:6F:45:44:C0:04:2D:BA:EA Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4463: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4464: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154272 (0x195756e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:19:02 2016 Not After : Sun Apr 25 16:19:02 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:42:e2:18:f1:83:62:62:40:21:be:86:a6:51:e6:77: ff:d8:8c:82:1c:c1:79:1c:9a:61:56:b9:16:43:6c:e6: de:01:0c:ac:02:cd:09:2d:08:88:3b:23:4b:49:90:2b: b1:ae:fc:7c:72:b1:62:f3:04:f8:9c:c3:fa:bf:f0:aa: de:cf:f4:9d:ac:2f:d3:bd:67:fd:5f:bf:37:7c:d5:4a: 2d:51:8d:44:ff:0e:d7:1a:52:2c:ca:dc:97:68:ff:4c: 97:31:79:50:5c:e8:df:03:f7:8a:7e:ad:30:a4:d3:7b: 9e:e3:82:28:9f:6f:46:40:e4:36:40:86:cc:19:40:bb: 18:30:89:09:83:26:81:87:f0:7d:03:9a:33:f9:af:c9: 43:93:64:d9:de:cb:7e:b2:ed:5e:e9:2d:cb:c6:3b:f4: 20:41:77:64:f1:62:cd:23:f0:51:4e:3e:24:93:89:15: 5b:8e:6e:de:14:6f:35:32:d4:cc:77:49:5f:e5:d6:25: 5e:68:49:ec:40:81:96:00:f3:e1:b6:72:42:32:09:05: 1c:e7:d7:1e:c2:2a:b2:5a:29:8a:a9:d3:94:ae:a3:7a: 97:a6:34:d4:46:65:38:00:5e:fe:59:04:27:e0:0c:d9: c2:8f:04:48:82:ad:d6:49:13:7b:a3:93:d4:e8:4e:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:ae:1b:b4:28:d7:74:7a:c1:ea:67:57:3c:bf:8c:74: 1d:f0:82:1e:26:b2:a6:ff:15:06:ea:ed:27:8e:8b:c6: c3:54:12:a4:b2:a1:41:b8:12:d3:3d:f7:34:a3:b1:bb: 65:54:bd:25:e4:ef:33:26:d6:2e:2b:ca:ef:7a:54:01: 2a:42:bd:fe:74:e1:7a:15:5a:0e:f9:5f:5a:32:55:71: 86:44:32:c7:06:ba:31:d1:b2:5a:98:a3:31:b6:94:98: a9:d2:b8:4e:bb:e3:73:17:56:72:d6:bb:3e:da:9e:26: d9:1d:00:e7:87:74:a2:27:06:b1:36:6b:b9:89:46:ae: 7a:23:a9:a4:a0:1c:7d:2b:4b:fc:8d:69:c4:ca:2a:a8: cb:d6:fd:77:2a:ed:ba:dd:20:ce:26:51:6b:bc:22:03: 11:0c:70:c7:49:e6:d1:eb:51:da:eb:12:b8:73:13:63: 5a:73:f0:d8:56:a1:8b:ff:11:20:91:85:9f:09:37:6f: 22:ef:6c:b9:7c:3b:03:87:62:a6:cb:6b:db:92:d3:0a: ea:13:6f:4a:92:a1:5d:6b:7b:a6:e8:a4:8a:bd:75:9f: f6:10:9f:3d:e0:3f:bd:b2:c3:d7:45:8b:34:a0:2e:9e: fa:3b:04:0b:38:85:90:83:bd:01:c0:79:26:2b:91:3e Fingerprint (SHA-256): B9:62:16:E8:53:AF:D0:AB:3F:EF:A2:F5:39:F0:44:B2:70:F7:00:B7:13:51:5C:D0:0D:35:2A:55:FD:5F:B5:A9 Fingerprint (SHA1): 2D:A1:76:36:D0:F4:09:63:1D:AE:7D:E2:0B:A3:B5:51:EA:87:87:1D Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4465: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4466: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4467: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4468: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4469: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154270 (0x195756de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:18:52 2016 Not After : Sun Apr 25 16:18:52 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:04:d1:3a:35:ad:7b:ed:9c:87:d0:79:87:52:61:62: 72:2e:f2:f4:af:9b:d7:a8:9f:fd:30:c2:3b:ab:6f:b9: 19:3f:b2:cd:26:fa:7a:b9:e2:37:bc:88:7b:5d:8a:07: 57:af:23:e5:40:8f:65:c7:81:5c:5c:46:08:3d:50:b0: fa:ba:fa:bc:bf:81:05:a3:e7:a4:0c:00:6a:da:79:50: c3:13:8d:96:ef:65:17:14:15:be:f5:fb:1a:30:b8:f8: 66:96:2e:b6:4e:b3:f3:3a:21:79:92:b8:79:22:70:f9: 7a:7d:aa:28:80:d2:63:8f:f7:e3:bf:ca:c4:cc:c2:4e: 7c:bc:5c:e2:e7:06:84:43:cb:e0:b6:f5:08:19:a1:0e: 6d:44:1d:c2:7b:16:c9:05:e5:33:a2:62:f4:02:4a:32: 9a:c5:2f:a7:5d:15:25:32:a7:d9:52:86:68:57:4c:4e: 5b:83:6f:1e:7f:91:68:8d:ad:77:5f:b7:ab:c1:3a:d8: 1b:5a:6a:a7:95:15:99:74:76:41:43:54:a4:72:f2:ee: 78:3c:5e:94:be:97:bc:a6:f2:b2:e7:45:63:20:eb:14: 4a:dd:b7:0d:63:c8:e5:8e:04:27:89:d2:35:52:dc:32: ab:64:da:5c:76:b0:e6:74:1d:06:0f:96:b6:31:b8:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:23:73:88:c3:01:83:47:8f:a6:ae:7c:df:57:3e:f1: be:6d:62:31:c5:7b:c9:de:5f:be:f8:51:f8:88:83:78: 46:9f:39:ab:86:a0:0d:bb:24:31:4f:5e:87:37:da:77: 55:99:24:d0:2c:44:13:23:58:4f:d3:59:58:d6:c8:6b: 75:22:1d:f4:6a:f2:41:5c:0d:fd:41:68:3f:79:9b:b0: da:15:72:24:14:e4:53:6f:12:1f:db:7e:8f:b9:3c:0d: 0f:1b:b1:1e:1d:db:eb:0a:d9:41:b4:10:56:f5:ec:31: 23:5f:3f:4e:18:ec:97:76:9b:04:b3:a4:00:f8:39:05: 5c:a6:98:da:69:b6:7d:51:cf:2b:19:1a:c7:16:66:99: 51:33:42:26:25:b0:a4:3c:8a:3e:54:1a:32:e7:56:90: d1:b8:a6:5b:c6:b2:11:0b:cb:a2:dd:4f:df:fa:8c:04: 03:32:4e:ef:a6:e6:0d:a4:f7:5a:f2:e9:07:9a:e3:44: 30:ad:80:bb:e3:ba:3d:82:51:fc:c3:92:d4:77:e9:3e: 0b:ec:f3:c2:b7:f2:b2:b2:3e:ae:90:96:da:ab:1e:ad: bc:f6:d0:d6:ba:e6:fd:23:85:94:77:8f:1d:1c:a8:9e: 70:68:4c:f6:a9:94:52:11:87:dd:14:cb:ff:6a:f3:5e Fingerprint (SHA-256): 06:27:12:A0:43:EF:D5:92:18:CC:36:AC:44:88:2E:C4:27:5D:91:4C:39:91:F7:EF:68:9B:79:3E:53:8E:48:CE Fingerprint (SHA1): D9:C4:3E:2E:7A:9D:9D:0E:DD:F6:36:C2:3C:1D:43:03:0E:16:5B:7D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4470: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4471: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154271 (0x195756df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:18:58 2016 Not After : Sun Apr 25 16:18:58 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:20:84:38:8d:da:ba:1b:8e:af:8b:65:6f:fe:62:72: 37:46:b7:41:66:ac:fa:81:77:a3:d3:44:6f:89:0a:18: 9f:f5:94:41:0b:c1:13:fe:98:6e:e6:f7:8d:9f:8e:ce: 40:54:63:d1:e6:bb:a9:46:87:ef:27:9a:9f:13:e4:4f: 02:8b:bb:d1:7a:dd:e5:29:c7:f6:1e:ed:ec:5f:03:ef: 29:09:61:19:b8:ee:0d:bf:ac:d0:88:0d:17:c1:68:74: d4:3f:f4:20:5e:52:d2:dc:ed:62:db:47:45:1d:b1:d8: b6:cb:aa:67:ed:61:bb:6b:9d:17:a8:53:50:81:6a:4d: cd:19:f7:55:c0:cd:9d:0c:6b:e0:a1:f1:34:51:41:75: 13:1d:f0:96:9b:a3:19:7d:65:83:da:26:57:8d:30:51: cd:be:f1:93:18:bc:dc:6b:71:0b:38:d1:29:50:7f:e7: bc:81:78:66:78:a8:4a:c8:c9:76:10:86:f2:ee:0f:7a: e1:4a:bb:c9:f9:63:1d:f3:9d:d7:06:51:e3:f9:82:ce: 5b:84:10:11:ce:ce:05:b1:50:7c:8d:7f:85:9e:34:aa: 00:e9:ec:a8:68:1d:4e:03:69:a0:30:c0:fc:6c:06:ff: e5:f7:03:d9:4b:33:4d:a0:ee:58:d8:07:95:d6:7c:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:1e:3b:73:04:bb:55:da:cb:58:4c:0a:df:67:93:ae: 82:e9:51:1a:8e:00:8d:a4:1b:41:aa:0d:eb:97:9a:5b: 28:e0:bc:63:c6:41:45:09:f5:41:4e:02:9f:df:94:09: 55:57:97:64:94:a5:5b:75:b6:2a:ff:b3:d3:30:4c:f1: 7a:92:cf:2c:f0:43:86:ae:84:f7:12:69:2f:43:9d:56: 58:39:00:0f:ab:ed:9e:2b:2a:bd:74:19:9a:57:5e:fe: 39:b1:a9:48:00:cc:1a:17:86:55:62:56:d8:44:4b:5e: 27:c4:9b:58:23:44:25:75:22:48:fa:af:72:3b:59:f2: 4c:20:d4:7f:ff:ed:8d:40:ed:df:69:84:3c:67:c1:34: 40:c2:8d:c5:7c:e0:3d:b4:0d:90:fe:92:16:50:9d:21: a5:1d:ba:df:2c:a9:8d:5d:54:74:0f:99:f9:e6:3e:7e: 0b:20:6e:c2:87:8b:09:91:73:97:6b:bf:69:de:ae:04: 20:98:14:c1:9f:9b:e6:a1:3c:c4:cf:74:23:a7:5b:c9: 50:a9:93:d4:40:3c:6b:ec:8e:e4:ab:94:97:0c:d4:57: b8:28:f9:25:e4:c9:4d:04:b2:4c:36:5e:39:30:4f:16: e2:cb:10:a1:da:89:8b:2e:8c:a9:a3:eb:2e:a3:5f:1b Fingerprint (SHA-256): 4C:93:2F:7B:2C:A4:14:29:CD:E8:63:3E:9F:66:A5:45:D4:DA:54:27:67:84:7F:87:3F:4F:44:B5:A1:EF:8A:2B Fingerprint (SHA1): FC:CD:EE:A0:37:A8:0B:7E:B1:21:53:84:6F:45:44:C0:04:2D:BA:EA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4472: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4473: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154272 (0x195756e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:19:02 2016 Not After : Sun Apr 25 16:19:02 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:42:e2:18:f1:83:62:62:40:21:be:86:a6:51:e6:77: ff:d8:8c:82:1c:c1:79:1c:9a:61:56:b9:16:43:6c:e6: de:01:0c:ac:02:cd:09:2d:08:88:3b:23:4b:49:90:2b: b1:ae:fc:7c:72:b1:62:f3:04:f8:9c:c3:fa:bf:f0:aa: de:cf:f4:9d:ac:2f:d3:bd:67:fd:5f:bf:37:7c:d5:4a: 2d:51:8d:44:ff:0e:d7:1a:52:2c:ca:dc:97:68:ff:4c: 97:31:79:50:5c:e8:df:03:f7:8a:7e:ad:30:a4:d3:7b: 9e:e3:82:28:9f:6f:46:40:e4:36:40:86:cc:19:40:bb: 18:30:89:09:83:26:81:87:f0:7d:03:9a:33:f9:af:c9: 43:93:64:d9:de:cb:7e:b2:ed:5e:e9:2d:cb:c6:3b:f4: 20:41:77:64:f1:62:cd:23:f0:51:4e:3e:24:93:89:15: 5b:8e:6e:de:14:6f:35:32:d4:cc:77:49:5f:e5:d6:25: 5e:68:49:ec:40:81:96:00:f3:e1:b6:72:42:32:09:05: 1c:e7:d7:1e:c2:2a:b2:5a:29:8a:a9:d3:94:ae:a3:7a: 97:a6:34:d4:46:65:38:00:5e:fe:59:04:27:e0:0c:d9: c2:8f:04:48:82:ad:d6:49:13:7b:a3:93:d4:e8:4e:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:ae:1b:b4:28:d7:74:7a:c1:ea:67:57:3c:bf:8c:74: 1d:f0:82:1e:26:b2:a6:ff:15:06:ea:ed:27:8e:8b:c6: c3:54:12:a4:b2:a1:41:b8:12:d3:3d:f7:34:a3:b1:bb: 65:54:bd:25:e4:ef:33:26:d6:2e:2b:ca:ef:7a:54:01: 2a:42:bd:fe:74:e1:7a:15:5a:0e:f9:5f:5a:32:55:71: 86:44:32:c7:06:ba:31:d1:b2:5a:98:a3:31:b6:94:98: a9:d2:b8:4e:bb:e3:73:17:56:72:d6:bb:3e:da:9e:26: d9:1d:00:e7:87:74:a2:27:06:b1:36:6b:b9:89:46:ae: 7a:23:a9:a4:a0:1c:7d:2b:4b:fc:8d:69:c4:ca:2a:a8: cb:d6:fd:77:2a:ed:ba:dd:20:ce:26:51:6b:bc:22:03: 11:0c:70:c7:49:e6:d1:eb:51:da:eb:12:b8:73:13:63: 5a:73:f0:d8:56:a1:8b:ff:11:20:91:85:9f:09:37:6f: 22:ef:6c:b9:7c:3b:03:87:62:a6:cb:6b:db:92:d3:0a: ea:13:6f:4a:92:a1:5d:6b:7b:a6:e8:a4:8a:bd:75:9f: f6:10:9f:3d:e0:3f:bd:b2:c3:d7:45:8b:34:a0:2e:9e: fa:3b:04:0b:38:85:90:83:bd:01:c0:79:26:2b:91:3e Fingerprint (SHA-256): B9:62:16:E8:53:AF:D0:AB:3F:EF:A2:F5:39:F0:44:B2:70:F7:00:B7:13:51:5C:D0:0D:35:2A:55:FD:5F:B5:A9 Fingerprint (SHA1): 2D:A1:76:36:D0:F4:09:63:1D:AE:7D:E2:0B:A3:B5:51:EA:87:87:1D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4474: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4475: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4476: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154274 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4477: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4478: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4479: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4480: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154275 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4481: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4482: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4483: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4484: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154276 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4485: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4486: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #4487: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4488: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425154277 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4489: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4490: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #4491: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4492: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425154278 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4493: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4494: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4495: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154274 (0x195756e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:19:41 2016 Not After : Sun Apr 25 16:19:41 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:80:a8:ef:51:02:2d:40:a7:ca:60:73:b0:bc:71:a4: a7:fd:e3:9f:35:c2:32:47:d7:66:40:d5:76:e9:0d:1e: 38:59:43:30:04:67:4b:2b:32:c9:d1:fe:ca:67:52:e8: 4c:a0:5b:08:ac:41:18:3e:f2:6a:4d:66:35:c0:89:5d: 98:10:66:cf:9b:44:07:51:7b:f7:c9:1f:8e:88:5b:ca: 9c:dc:f4:72:a6:4a:d5:ed:07:2a:25:63:5b:4e:a1:fb: cb:25:90:93:37:10:22:b0:0e:f5:ff:0c:26:91:13:97: 23:c1:35:5a:93:2a:81:35:8e:8e:7d:1d:15:04:2e:e9: c3:a7:9f:c2:6e:74:c1:3e:98:56:8f:b0:7b:48:35:2b: 23:ab:14:00:4e:c3:df:2e:9a:e8:79:14:48:79:be:eb: f4:16:4a:7e:f0:55:02:3a:81:5e:78:84:59:83:b9:1a: 37:6e:e5:31:78:21:dd:8e:d0:1f:2d:2a:88:01:19:d8: e1:0e:1e:a2:28:43:d3:b9:fa:bd:8c:cf:db:4d:6a:0c: 1d:5f:a2:87:51:5f:7e:72:25:98:a6:e0:c1:d7:76:8e: d5:6d:01:65:43:8f:90:9e:8b:45:36:a5:10:0f:54:88: fb:7c:7c:a7:9d:c3:16:2f:ba:17:f7:8a:c6:1f:b5:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:04:3d:eb:77:93:ac:69:45:29:44:6b:4b:0c:da:84: fb:6b:f8:d1:d9:79:c2:8f:72:d9:79:41:73:14:3e:20: 5f:66:05:c7:bb:5d:66:02:ef:13:79:c0:0b:27:3c:15: 41:0d:3c:7b:f7:2e:68:1b:9b:9b:8d:5c:f0:e7:16:c3: 6a:b9:5a:b5:1c:d7:c5:4a:f3:32:d0:48:32:fd:2c:69: 6e:e2:dc:17:f7:07:27:33:7a:2e:31:5c:c6:e2:3b:fd: ed:71:5e:e9:d2:23:40:77:c3:9a:c6:30:a5:da:6b:93: 08:a4:ee:e0:1b:86:28:d4:d8:68:62:39:1c:50:3d:2c: 24:16:9c:00:99:f5:00:75:c2:16:be:04:8e:44:4f:72: 5e:dd:1a:a8:ea:fa:93:90:22:f1:2f:bf:5e:fa:34:95: 42:dc:0c:b1:80:65:b5:16:49:0b:61:38:3a:09:42:0e: 72:fc:c7:ee:fd:f4:f0:78:41:18:2f:77:f5:9d:ac:fc: 79:33:8d:0b:75:34:f5:4d:cf:b4:29:0a:f4:38:fd:79: 0e:b7:fa:e7:be:b7:dd:1f:df:de:09:bc:67:89:7d:00: 8f:7b:db:37:93:72:11:30:6f:f6:bc:90:ef:f1:77:68: 0f:0e:ec:aa:9e:85:8a:78:3d:17:93:c9:9f:26:99:98 Fingerprint (SHA-256): 4B:1E:37:80:1E:48:B1:4D:54:7D:F8:47:1D:0F:47:D0:2A:E3:FB:90:15:D6:1E:2A:A6:D5:AB:76:60:ED:DF:82 Fingerprint (SHA1): D4:FB:BD:25:80:B4:4E:08:46:FA:A6:B4:0F:52:C5:47:7A:70:A9:99 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4496: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4497: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154275 (0x195756e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:19:48 2016 Not After : Sun Apr 25 16:19:48 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:4e:5a:8d:bc:3e:93:ec:09:e1:58:09:c1:b2:1b:36: 0a:c0:55:9e:25:52:0c:7e:53:15:f0:55:09:6d:9f:0f: 6d:e3:06:e5:5f:74:28:45:10:8c:4f:25:7a:b3:46:d9: e3:85:79:44:ef:6f:fb:a0:3f:ea:6e:4a:a9:31:15:00: 5e:7b:85:0f:07:d0:74:5f:34:bb:da:1b:78:28:23:cc: 3f:39:f9:13:0b:32:65:04:de:d1:16:c9:a5:74:9b:17: 34:32:3e:f1:7e:d5:cf:1c:15:7d:69:d4:08:e5:af:12: 07:c7:64:be:19:79:89:97:6a:6a:a5:45:fd:8a:2f:e8: 6f:29:d0:df:44:ec:a8:19:52:47:13:bc:0e:c7:ec:74: 42:de:12:5c:fc:64:21:26:d9:05:a8:b6:8e:9d:4b:3e: a5:16:a1:b7:72:80:3d:7b:b3:7e:b8:2c:b2:e1:f0:ef: 4b:7d:7a:b6:a4:a3:ef:eb:df:94:72:c3:15:5c:5e:72: 92:d0:b4:d7:cb:26:99:2d:5c:81:e4:70:7d:fb:89:03: 43:40:10:05:26:3f:87:77:02:cb:1e:21:44:a4:f2:03: b2:f3:df:3c:43:e5:b9:3b:ec:68:64:33:3e:f9:38:10: 18:53:95:62:5f:f9:80:a0:65:35:5b:03:da:b5:f4:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:34:7f:c2:da:04:3f:50:e7:2c:3e:8c:b8:16:87:f2: 15:3a:a2:d6:fb:72:74:92:90:a6:3d:28:27:14:9d:37: c3:51:9d:8c:e4:25:07:2d:b3:30:7b:12:d1:ad:99:71: 17:5e:f9:48:67:1e:22:6a:91:97:36:e9:a6:05:7e:73: 4a:81:be:58:e3:3d:7b:50:69:e9:f1:a4:c4:5d:fb:7e: 15:fa:5e:bd:ff:39:f3:37:42:24:f5:3a:21:90:95:80: 48:1f:43:84:93:2c:07:47:5d:6c:e5:a8:da:13:b5:b0: c0:fc:37:e6:87:2b:22:93:58:82:9a:af:be:38:3b:fb: d8:6c:83:1e:ab:4a:61:3a:bb:d0:07:0b:33:26:98:b3: 0e:c7:ae:8a:1d:29:b4:67:f1:a3:b4:b2:ce:fc:63:cf: 86:b3:f0:3d:30:b5:74:66:21:fb:97:d7:0e:98:72:4b: dd:21:15:d3:4a:60:6a:d6:05:b1:ec:9c:f7:0c:e8:1f: 8e:e5:82:74:91:b7:5c:3c:3d:5c:61:6e:11:b3:db:22: b3:50:e3:b5:d2:6f:57:83:ce:6f:36:05:65:df:23:fe: bb:a9:e2:2b:5b:03:ca:ee:e3:66:2b:05:40:b1:50:3b: dd:20:68:8c:f1:ad:fc:be:b2:8d:61:67:86:77:5b:1b Fingerprint (SHA-256): 67:CF:9E:A2:3D:32:E9:72:7C:5E:EA:FE:70:11:ED:72:C4:FA:76:DF:17:FA:DC:D4:BD:76:A3:7E:F3:2E:08:FA Fingerprint (SHA1): 27:8C:81:FF:24:8B:53:BA:89:64:0D:39:38:EB:A6:37:F0:60:33:CF Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4498: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4499: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154276 (0x195756e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:19:53 2016 Not After : Sun Apr 25 16:19:53 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:9b:91:94:fa:ff:f3:7c:46:cf:aa:b9:a1:e7:9e:7d: a9:fe:c0:5e:27:08:be:b3:c3:cd:a8:95:7b:22:f5:49: 91:85:16:26:f2:ba:b9:b2:f5:cc:3f:19:c1:a9:d0:bd: 49:a6:cb:cd:30:e7:96:ea:d0:20:16:27:e8:33:08:ad: 82:36:08:7a:1b:e2:7e:50:9e:f3:cf:39:c6:01:af:5d: 98:ad:51:f1:6f:c0:5f:25:32:aa:3a:e1:6b:90:66:26: 6f:95:22:04:ee:06:1d:8f:99:1b:32:bf:d9:e3:f6:8e: 01:f4:33:29:fc:eb:6f:68:95:1c:b2:b2:67:77:62:a3: 66:dd:d8:33:22:28:7a:e8:04:83:72:84:8b:29:9d:02: fe:46:92:c3:2f:47:18:05:d3:00:9d:d6:ed:00:7d:96: ef:fb:3a:87:01:9f:1b:c0:b0:4c:3d:12:29:32:78:01: 2a:e0:43:5b:24:8a:f2:9f:0c:e2:1e:57:35:fb:0a:b2: da:f2:21:1f:af:2e:bd:f1:3b:3b:82:f3:3f:bc:82:a3: 5d:e7:ee:0e:da:8b:34:32:5e:63:b3:49:95:27:be:18: c5:22:f4:6f:5c:74:df:77:03:14:99:b3:03:b3:d7:ab: 34:e0:41:28:8c:95:14:78:72:d8:d6:c1:4c:25:ec:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:a3:02:5a:d6:9e:8e:d7:dc:d5:46:ca:20:72:4f:fe: e1:a1:9d:13:cf:16:d6:5e:90:19:8b:35:2b:7b:e4:c9: 47:3f:63:63:ed:0b:97:88:3b:6b:0a:35:0f:da:60:d3: 3b:7d:11:79:68:53:2e:d7:19:a3:d7:8f:bd:3c:39:fd: 21:2f:a2:82:84:16:89:40:0b:c2:f7:2c:39:03:af:c7: 72:37:6f:7e:4c:dc:74:9b:2a:b3:63:6d:79:8c:fc:03: f0:4c:2c:32:70:7e:7e:6a:db:f9:41:f7:47:3f:1d:36: a2:63:8e:f3:31:1b:84:c5:af:4c:3c:0a:1c:68:ed:f5: 67:2d:68:89:00:b6:47:65:ce:37:17:13:58:ca:21:83: d1:ec:7b:5e:02:87:bd:c5:7b:d8:f0:f0:a3:06:8f:b5: 20:04:5c:98:87:df:76:77:fd:2d:64:c9:1d:c7:3c:28: ad:83:65:37:43:7b:a8:06:0b:cb:20:ab:ee:50:3b:fa: 43:93:ed:62:50:a1:77:0a:0f:82:5d:4e:a5:e7:30:8f: fa:89:b9:a9:3e:7e:85:69:21:1c:ff:52:50:45:c9:39: 4a:04:f7:ae:c0:ba:73:3b:ce:5b:3a:da:e5:e9:ca:51: ec:89:a2:3d:de:eb:01:93:48:0c:65:b1:51:5c:c7:b9 Fingerprint (SHA-256): C7:F2:C0:04:5A:F9:EE:E6:49:FC:E2:7A:2B:70:CF:87:76:BC:93:AB:21:18:CF:19:E3:7B:F3:7E:F5:FE:B5:FC Fingerprint (SHA1): 55:20:6C:CD:24:1A:16:CA:E3:7F:65:F5:F4:D9:50:19:75:58:01:BE Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #4500: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4501: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4502: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4503: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4504: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154274 (0x195756e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:19:41 2016 Not After : Sun Apr 25 16:19:41 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:80:a8:ef:51:02:2d:40:a7:ca:60:73:b0:bc:71:a4: a7:fd:e3:9f:35:c2:32:47:d7:66:40:d5:76:e9:0d:1e: 38:59:43:30:04:67:4b:2b:32:c9:d1:fe:ca:67:52:e8: 4c:a0:5b:08:ac:41:18:3e:f2:6a:4d:66:35:c0:89:5d: 98:10:66:cf:9b:44:07:51:7b:f7:c9:1f:8e:88:5b:ca: 9c:dc:f4:72:a6:4a:d5:ed:07:2a:25:63:5b:4e:a1:fb: cb:25:90:93:37:10:22:b0:0e:f5:ff:0c:26:91:13:97: 23:c1:35:5a:93:2a:81:35:8e:8e:7d:1d:15:04:2e:e9: c3:a7:9f:c2:6e:74:c1:3e:98:56:8f:b0:7b:48:35:2b: 23:ab:14:00:4e:c3:df:2e:9a:e8:79:14:48:79:be:eb: f4:16:4a:7e:f0:55:02:3a:81:5e:78:84:59:83:b9:1a: 37:6e:e5:31:78:21:dd:8e:d0:1f:2d:2a:88:01:19:d8: e1:0e:1e:a2:28:43:d3:b9:fa:bd:8c:cf:db:4d:6a:0c: 1d:5f:a2:87:51:5f:7e:72:25:98:a6:e0:c1:d7:76:8e: d5:6d:01:65:43:8f:90:9e:8b:45:36:a5:10:0f:54:88: fb:7c:7c:a7:9d:c3:16:2f:ba:17:f7:8a:c6:1f:b5:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:04:3d:eb:77:93:ac:69:45:29:44:6b:4b:0c:da:84: fb:6b:f8:d1:d9:79:c2:8f:72:d9:79:41:73:14:3e:20: 5f:66:05:c7:bb:5d:66:02:ef:13:79:c0:0b:27:3c:15: 41:0d:3c:7b:f7:2e:68:1b:9b:9b:8d:5c:f0:e7:16:c3: 6a:b9:5a:b5:1c:d7:c5:4a:f3:32:d0:48:32:fd:2c:69: 6e:e2:dc:17:f7:07:27:33:7a:2e:31:5c:c6:e2:3b:fd: ed:71:5e:e9:d2:23:40:77:c3:9a:c6:30:a5:da:6b:93: 08:a4:ee:e0:1b:86:28:d4:d8:68:62:39:1c:50:3d:2c: 24:16:9c:00:99:f5:00:75:c2:16:be:04:8e:44:4f:72: 5e:dd:1a:a8:ea:fa:93:90:22:f1:2f:bf:5e:fa:34:95: 42:dc:0c:b1:80:65:b5:16:49:0b:61:38:3a:09:42:0e: 72:fc:c7:ee:fd:f4:f0:78:41:18:2f:77:f5:9d:ac:fc: 79:33:8d:0b:75:34:f5:4d:cf:b4:29:0a:f4:38:fd:79: 0e:b7:fa:e7:be:b7:dd:1f:df:de:09:bc:67:89:7d:00: 8f:7b:db:37:93:72:11:30:6f:f6:bc:90:ef:f1:77:68: 0f:0e:ec:aa:9e:85:8a:78:3d:17:93:c9:9f:26:99:98 Fingerprint (SHA-256): 4B:1E:37:80:1E:48:B1:4D:54:7D:F8:47:1D:0F:47:D0:2A:E3:FB:90:15:D6:1E:2A:A6:D5:AB:76:60:ED:DF:82 Fingerprint (SHA1): D4:FB:BD:25:80:B4:4E:08:46:FA:A6:B4:0F:52:C5:47:7A:70:A9:99 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4505: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4506: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154275 (0x195756e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:19:48 2016 Not After : Sun Apr 25 16:19:48 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:4e:5a:8d:bc:3e:93:ec:09:e1:58:09:c1:b2:1b:36: 0a:c0:55:9e:25:52:0c:7e:53:15:f0:55:09:6d:9f:0f: 6d:e3:06:e5:5f:74:28:45:10:8c:4f:25:7a:b3:46:d9: e3:85:79:44:ef:6f:fb:a0:3f:ea:6e:4a:a9:31:15:00: 5e:7b:85:0f:07:d0:74:5f:34:bb:da:1b:78:28:23:cc: 3f:39:f9:13:0b:32:65:04:de:d1:16:c9:a5:74:9b:17: 34:32:3e:f1:7e:d5:cf:1c:15:7d:69:d4:08:e5:af:12: 07:c7:64:be:19:79:89:97:6a:6a:a5:45:fd:8a:2f:e8: 6f:29:d0:df:44:ec:a8:19:52:47:13:bc:0e:c7:ec:74: 42:de:12:5c:fc:64:21:26:d9:05:a8:b6:8e:9d:4b:3e: a5:16:a1:b7:72:80:3d:7b:b3:7e:b8:2c:b2:e1:f0:ef: 4b:7d:7a:b6:a4:a3:ef:eb:df:94:72:c3:15:5c:5e:72: 92:d0:b4:d7:cb:26:99:2d:5c:81:e4:70:7d:fb:89:03: 43:40:10:05:26:3f:87:77:02:cb:1e:21:44:a4:f2:03: b2:f3:df:3c:43:e5:b9:3b:ec:68:64:33:3e:f9:38:10: 18:53:95:62:5f:f9:80:a0:65:35:5b:03:da:b5:f4:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:34:7f:c2:da:04:3f:50:e7:2c:3e:8c:b8:16:87:f2: 15:3a:a2:d6:fb:72:74:92:90:a6:3d:28:27:14:9d:37: c3:51:9d:8c:e4:25:07:2d:b3:30:7b:12:d1:ad:99:71: 17:5e:f9:48:67:1e:22:6a:91:97:36:e9:a6:05:7e:73: 4a:81:be:58:e3:3d:7b:50:69:e9:f1:a4:c4:5d:fb:7e: 15:fa:5e:bd:ff:39:f3:37:42:24:f5:3a:21:90:95:80: 48:1f:43:84:93:2c:07:47:5d:6c:e5:a8:da:13:b5:b0: c0:fc:37:e6:87:2b:22:93:58:82:9a:af:be:38:3b:fb: d8:6c:83:1e:ab:4a:61:3a:bb:d0:07:0b:33:26:98:b3: 0e:c7:ae:8a:1d:29:b4:67:f1:a3:b4:b2:ce:fc:63:cf: 86:b3:f0:3d:30:b5:74:66:21:fb:97:d7:0e:98:72:4b: dd:21:15:d3:4a:60:6a:d6:05:b1:ec:9c:f7:0c:e8:1f: 8e:e5:82:74:91:b7:5c:3c:3d:5c:61:6e:11:b3:db:22: b3:50:e3:b5:d2:6f:57:83:ce:6f:36:05:65:df:23:fe: bb:a9:e2:2b:5b:03:ca:ee:e3:66:2b:05:40:b1:50:3b: dd:20:68:8c:f1:ad:fc:be:b2:8d:61:67:86:77:5b:1b Fingerprint (SHA-256): 67:CF:9E:A2:3D:32:E9:72:7C:5E:EA:FE:70:11:ED:72:C4:FA:76:DF:17:FA:DC:D4:BD:76:A3:7E:F3:2E:08:FA Fingerprint (SHA1): 27:8C:81:FF:24:8B:53:BA:89:64:0D:39:38:EB:A6:37:F0:60:33:CF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4507: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4508: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154276 (0x195756e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:19:53 2016 Not After : Sun Apr 25 16:19:53 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:9b:91:94:fa:ff:f3:7c:46:cf:aa:b9:a1:e7:9e:7d: a9:fe:c0:5e:27:08:be:b3:c3:cd:a8:95:7b:22:f5:49: 91:85:16:26:f2:ba:b9:b2:f5:cc:3f:19:c1:a9:d0:bd: 49:a6:cb:cd:30:e7:96:ea:d0:20:16:27:e8:33:08:ad: 82:36:08:7a:1b:e2:7e:50:9e:f3:cf:39:c6:01:af:5d: 98:ad:51:f1:6f:c0:5f:25:32:aa:3a:e1:6b:90:66:26: 6f:95:22:04:ee:06:1d:8f:99:1b:32:bf:d9:e3:f6:8e: 01:f4:33:29:fc:eb:6f:68:95:1c:b2:b2:67:77:62:a3: 66:dd:d8:33:22:28:7a:e8:04:83:72:84:8b:29:9d:02: fe:46:92:c3:2f:47:18:05:d3:00:9d:d6:ed:00:7d:96: ef:fb:3a:87:01:9f:1b:c0:b0:4c:3d:12:29:32:78:01: 2a:e0:43:5b:24:8a:f2:9f:0c:e2:1e:57:35:fb:0a:b2: da:f2:21:1f:af:2e:bd:f1:3b:3b:82:f3:3f:bc:82:a3: 5d:e7:ee:0e:da:8b:34:32:5e:63:b3:49:95:27:be:18: c5:22:f4:6f:5c:74:df:77:03:14:99:b3:03:b3:d7:ab: 34:e0:41:28:8c:95:14:78:72:d8:d6:c1:4c:25:ec:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:a3:02:5a:d6:9e:8e:d7:dc:d5:46:ca:20:72:4f:fe: e1:a1:9d:13:cf:16:d6:5e:90:19:8b:35:2b:7b:e4:c9: 47:3f:63:63:ed:0b:97:88:3b:6b:0a:35:0f:da:60:d3: 3b:7d:11:79:68:53:2e:d7:19:a3:d7:8f:bd:3c:39:fd: 21:2f:a2:82:84:16:89:40:0b:c2:f7:2c:39:03:af:c7: 72:37:6f:7e:4c:dc:74:9b:2a:b3:63:6d:79:8c:fc:03: f0:4c:2c:32:70:7e:7e:6a:db:f9:41:f7:47:3f:1d:36: a2:63:8e:f3:31:1b:84:c5:af:4c:3c:0a:1c:68:ed:f5: 67:2d:68:89:00:b6:47:65:ce:37:17:13:58:ca:21:83: d1:ec:7b:5e:02:87:bd:c5:7b:d8:f0:f0:a3:06:8f:b5: 20:04:5c:98:87:df:76:77:fd:2d:64:c9:1d:c7:3c:28: ad:83:65:37:43:7b:a8:06:0b:cb:20:ab:ee:50:3b:fa: 43:93:ed:62:50:a1:77:0a:0f:82:5d:4e:a5:e7:30:8f: fa:89:b9:a9:3e:7e:85:69:21:1c:ff:52:50:45:c9:39: 4a:04:f7:ae:c0:ba:73:3b:ce:5b:3a:da:e5:e9:ca:51: ec:89:a2:3d:de:eb:01:93:48:0c:65:b1:51:5c:c7:b9 Fingerprint (SHA-256): C7:F2:C0:04:5A:F9:EE:E6:49:FC:E2:7A:2B:70:CF:87:76:BC:93:AB:21:18:CF:19:E3:7B:F3:7E:F5:FE:B5:FC Fingerprint (SHA1): 55:20:6C:CD:24:1A:16:CA:E3:7F:65:F5:F4:D9:50:19:75:58:01:BE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #4509: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4510: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154274 (0x195756e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:19:41 2016 Not After : Sun Apr 25 16:19:41 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:80:a8:ef:51:02:2d:40:a7:ca:60:73:b0:bc:71:a4: a7:fd:e3:9f:35:c2:32:47:d7:66:40:d5:76:e9:0d:1e: 38:59:43:30:04:67:4b:2b:32:c9:d1:fe:ca:67:52:e8: 4c:a0:5b:08:ac:41:18:3e:f2:6a:4d:66:35:c0:89:5d: 98:10:66:cf:9b:44:07:51:7b:f7:c9:1f:8e:88:5b:ca: 9c:dc:f4:72:a6:4a:d5:ed:07:2a:25:63:5b:4e:a1:fb: cb:25:90:93:37:10:22:b0:0e:f5:ff:0c:26:91:13:97: 23:c1:35:5a:93:2a:81:35:8e:8e:7d:1d:15:04:2e:e9: c3:a7:9f:c2:6e:74:c1:3e:98:56:8f:b0:7b:48:35:2b: 23:ab:14:00:4e:c3:df:2e:9a:e8:79:14:48:79:be:eb: f4:16:4a:7e:f0:55:02:3a:81:5e:78:84:59:83:b9:1a: 37:6e:e5:31:78:21:dd:8e:d0:1f:2d:2a:88:01:19:d8: e1:0e:1e:a2:28:43:d3:b9:fa:bd:8c:cf:db:4d:6a:0c: 1d:5f:a2:87:51:5f:7e:72:25:98:a6:e0:c1:d7:76:8e: d5:6d:01:65:43:8f:90:9e:8b:45:36:a5:10:0f:54:88: fb:7c:7c:a7:9d:c3:16:2f:ba:17:f7:8a:c6:1f:b5:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:04:3d:eb:77:93:ac:69:45:29:44:6b:4b:0c:da:84: fb:6b:f8:d1:d9:79:c2:8f:72:d9:79:41:73:14:3e:20: 5f:66:05:c7:bb:5d:66:02:ef:13:79:c0:0b:27:3c:15: 41:0d:3c:7b:f7:2e:68:1b:9b:9b:8d:5c:f0:e7:16:c3: 6a:b9:5a:b5:1c:d7:c5:4a:f3:32:d0:48:32:fd:2c:69: 6e:e2:dc:17:f7:07:27:33:7a:2e:31:5c:c6:e2:3b:fd: ed:71:5e:e9:d2:23:40:77:c3:9a:c6:30:a5:da:6b:93: 08:a4:ee:e0:1b:86:28:d4:d8:68:62:39:1c:50:3d:2c: 24:16:9c:00:99:f5:00:75:c2:16:be:04:8e:44:4f:72: 5e:dd:1a:a8:ea:fa:93:90:22:f1:2f:bf:5e:fa:34:95: 42:dc:0c:b1:80:65:b5:16:49:0b:61:38:3a:09:42:0e: 72:fc:c7:ee:fd:f4:f0:78:41:18:2f:77:f5:9d:ac:fc: 79:33:8d:0b:75:34:f5:4d:cf:b4:29:0a:f4:38:fd:79: 0e:b7:fa:e7:be:b7:dd:1f:df:de:09:bc:67:89:7d:00: 8f:7b:db:37:93:72:11:30:6f:f6:bc:90:ef:f1:77:68: 0f:0e:ec:aa:9e:85:8a:78:3d:17:93:c9:9f:26:99:98 Fingerprint (SHA-256): 4B:1E:37:80:1E:48:B1:4D:54:7D:F8:47:1D:0F:47:D0:2A:E3:FB:90:15:D6:1E:2A:A6:D5:AB:76:60:ED:DF:82 Fingerprint (SHA1): D4:FB:BD:25:80:B4:4E:08:46:FA:A6:B4:0F:52:C5:47:7A:70:A9:99 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4511: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154274 (0x195756e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:19:41 2016 Not After : Sun Apr 25 16:19:41 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:80:a8:ef:51:02:2d:40:a7:ca:60:73:b0:bc:71:a4: a7:fd:e3:9f:35:c2:32:47:d7:66:40:d5:76:e9:0d:1e: 38:59:43:30:04:67:4b:2b:32:c9:d1:fe:ca:67:52:e8: 4c:a0:5b:08:ac:41:18:3e:f2:6a:4d:66:35:c0:89:5d: 98:10:66:cf:9b:44:07:51:7b:f7:c9:1f:8e:88:5b:ca: 9c:dc:f4:72:a6:4a:d5:ed:07:2a:25:63:5b:4e:a1:fb: cb:25:90:93:37:10:22:b0:0e:f5:ff:0c:26:91:13:97: 23:c1:35:5a:93:2a:81:35:8e:8e:7d:1d:15:04:2e:e9: c3:a7:9f:c2:6e:74:c1:3e:98:56:8f:b0:7b:48:35:2b: 23:ab:14:00:4e:c3:df:2e:9a:e8:79:14:48:79:be:eb: f4:16:4a:7e:f0:55:02:3a:81:5e:78:84:59:83:b9:1a: 37:6e:e5:31:78:21:dd:8e:d0:1f:2d:2a:88:01:19:d8: e1:0e:1e:a2:28:43:d3:b9:fa:bd:8c:cf:db:4d:6a:0c: 1d:5f:a2:87:51:5f:7e:72:25:98:a6:e0:c1:d7:76:8e: d5:6d:01:65:43:8f:90:9e:8b:45:36:a5:10:0f:54:88: fb:7c:7c:a7:9d:c3:16:2f:ba:17:f7:8a:c6:1f:b5:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:04:3d:eb:77:93:ac:69:45:29:44:6b:4b:0c:da:84: fb:6b:f8:d1:d9:79:c2:8f:72:d9:79:41:73:14:3e:20: 5f:66:05:c7:bb:5d:66:02:ef:13:79:c0:0b:27:3c:15: 41:0d:3c:7b:f7:2e:68:1b:9b:9b:8d:5c:f0:e7:16:c3: 6a:b9:5a:b5:1c:d7:c5:4a:f3:32:d0:48:32:fd:2c:69: 6e:e2:dc:17:f7:07:27:33:7a:2e:31:5c:c6:e2:3b:fd: ed:71:5e:e9:d2:23:40:77:c3:9a:c6:30:a5:da:6b:93: 08:a4:ee:e0:1b:86:28:d4:d8:68:62:39:1c:50:3d:2c: 24:16:9c:00:99:f5:00:75:c2:16:be:04:8e:44:4f:72: 5e:dd:1a:a8:ea:fa:93:90:22:f1:2f:bf:5e:fa:34:95: 42:dc:0c:b1:80:65:b5:16:49:0b:61:38:3a:09:42:0e: 72:fc:c7:ee:fd:f4:f0:78:41:18:2f:77:f5:9d:ac:fc: 79:33:8d:0b:75:34:f5:4d:cf:b4:29:0a:f4:38:fd:79: 0e:b7:fa:e7:be:b7:dd:1f:df:de:09:bc:67:89:7d:00: 8f:7b:db:37:93:72:11:30:6f:f6:bc:90:ef:f1:77:68: 0f:0e:ec:aa:9e:85:8a:78:3d:17:93:c9:9f:26:99:98 Fingerprint (SHA-256): 4B:1E:37:80:1E:48:B1:4D:54:7D:F8:47:1D:0F:47:D0:2A:E3:FB:90:15:D6:1E:2A:A6:D5:AB:76:60:ED:DF:82 Fingerprint (SHA1): D4:FB:BD:25:80:B4:4E:08:46:FA:A6:B4:0F:52:C5:47:7A:70:A9:99 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4512: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154275 (0x195756e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:19:48 2016 Not After : Sun Apr 25 16:19:48 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:4e:5a:8d:bc:3e:93:ec:09:e1:58:09:c1:b2:1b:36: 0a:c0:55:9e:25:52:0c:7e:53:15:f0:55:09:6d:9f:0f: 6d:e3:06:e5:5f:74:28:45:10:8c:4f:25:7a:b3:46:d9: e3:85:79:44:ef:6f:fb:a0:3f:ea:6e:4a:a9:31:15:00: 5e:7b:85:0f:07:d0:74:5f:34:bb:da:1b:78:28:23:cc: 3f:39:f9:13:0b:32:65:04:de:d1:16:c9:a5:74:9b:17: 34:32:3e:f1:7e:d5:cf:1c:15:7d:69:d4:08:e5:af:12: 07:c7:64:be:19:79:89:97:6a:6a:a5:45:fd:8a:2f:e8: 6f:29:d0:df:44:ec:a8:19:52:47:13:bc:0e:c7:ec:74: 42:de:12:5c:fc:64:21:26:d9:05:a8:b6:8e:9d:4b:3e: a5:16:a1:b7:72:80:3d:7b:b3:7e:b8:2c:b2:e1:f0:ef: 4b:7d:7a:b6:a4:a3:ef:eb:df:94:72:c3:15:5c:5e:72: 92:d0:b4:d7:cb:26:99:2d:5c:81:e4:70:7d:fb:89:03: 43:40:10:05:26:3f:87:77:02:cb:1e:21:44:a4:f2:03: b2:f3:df:3c:43:e5:b9:3b:ec:68:64:33:3e:f9:38:10: 18:53:95:62:5f:f9:80:a0:65:35:5b:03:da:b5:f4:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:34:7f:c2:da:04:3f:50:e7:2c:3e:8c:b8:16:87:f2: 15:3a:a2:d6:fb:72:74:92:90:a6:3d:28:27:14:9d:37: c3:51:9d:8c:e4:25:07:2d:b3:30:7b:12:d1:ad:99:71: 17:5e:f9:48:67:1e:22:6a:91:97:36:e9:a6:05:7e:73: 4a:81:be:58:e3:3d:7b:50:69:e9:f1:a4:c4:5d:fb:7e: 15:fa:5e:bd:ff:39:f3:37:42:24:f5:3a:21:90:95:80: 48:1f:43:84:93:2c:07:47:5d:6c:e5:a8:da:13:b5:b0: c0:fc:37:e6:87:2b:22:93:58:82:9a:af:be:38:3b:fb: d8:6c:83:1e:ab:4a:61:3a:bb:d0:07:0b:33:26:98:b3: 0e:c7:ae:8a:1d:29:b4:67:f1:a3:b4:b2:ce:fc:63:cf: 86:b3:f0:3d:30:b5:74:66:21:fb:97:d7:0e:98:72:4b: dd:21:15:d3:4a:60:6a:d6:05:b1:ec:9c:f7:0c:e8:1f: 8e:e5:82:74:91:b7:5c:3c:3d:5c:61:6e:11:b3:db:22: b3:50:e3:b5:d2:6f:57:83:ce:6f:36:05:65:df:23:fe: bb:a9:e2:2b:5b:03:ca:ee:e3:66:2b:05:40:b1:50:3b: dd:20:68:8c:f1:ad:fc:be:b2:8d:61:67:86:77:5b:1b Fingerprint (SHA-256): 67:CF:9E:A2:3D:32:E9:72:7C:5E:EA:FE:70:11:ED:72:C4:FA:76:DF:17:FA:DC:D4:BD:76:A3:7E:F3:2E:08:FA Fingerprint (SHA1): 27:8C:81:FF:24:8B:53:BA:89:64:0D:39:38:EB:A6:37:F0:60:33:CF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4513: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154275 (0x195756e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:19:48 2016 Not After : Sun Apr 25 16:19:48 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:4e:5a:8d:bc:3e:93:ec:09:e1:58:09:c1:b2:1b:36: 0a:c0:55:9e:25:52:0c:7e:53:15:f0:55:09:6d:9f:0f: 6d:e3:06:e5:5f:74:28:45:10:8c:4f:25:7a:b3:46:d9: e3:85:79:44:ef:6f:fb:a0:3f:ea:6e:4a:a9:31:15:00: 5e:7b:85:0f:07:d0:74:5f:34:bb:da:1b:78:28:23:cc: 3f:39:f9:13:0b:32:65:04:de:d1:16:c9:a5:74:9b:17: 34:32:3e:f1:7e:d5:cf:1c:15:7d:69:d4:08:e5:af:12: 07:c7:64:be:19:79:89:97:6a:6a:a5:45:fd:8a:2f:e8: 6f:29:d0:df:44:ec:a8:19:52:47:13:bc:0e:c7:ec:74: 42:de:12:5c:fc:64:21:26:d9:05:a8:b6:8e:9d:4b:3e: a5:16:a1:b7:72:80:3d:7b:b3:7e:b8:2c:b2:e1:f0:ef: 4b:7d:7a:b6:a4:a3:ef:eb:df:94:72:c3:15:5c:5e:72: 92:d0:b4:d7:cb:26:99:2d:5c:81:e4:70:7d:fb:89:03: 43:40:10:05:26:3f:87:77:02:cb:1e:21:44:a4:f2:03: b2:f3:df:3c:43:e5:b9:3b:ec:68:64:33:3e:f9:38:10: 18:53:95:62:5f:f9:80:a0:65:35:5b:03:da:b5:f4:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:34:7f:c2:da:04:3f:50:e7:2c:3e:8c:b8:16:87:f2: 15:3a:a2:d6:fb:72:74:92:90:a6:3d:28:27:14:9d:37: c3:51:9d:8c:e4:25:07:2d:b3:30:7b:12:d1:ad:99:71: 17:5e:f9:48:67:1e:22:6a:91:97:36:e9:a6:05:7e:73: 4a:81:be:58:e3:3d:7b:50:69:e9:f1:a4:c4:5d:fb:7e: 15:fa:5e:bd:ff:39:f3:37:42:24:f5:3a:21:90:95:80: 48:1f:43:84:93:2c:07:47:5d:6c:e5:a8:da:13:b5:b0: c0:fc:37:e6:87:2b:22:93:58:82:9a:af:be:38:3b:fb: d8:6c:83:1e:ab:4a:61:3a:bb:d0:07:0b:33:26:98:b3: 0e:c7:ae:8a:1d:29:b4:67:f1:a3:b4:b2:ce:fc:63:cf: 86:b3:f0:3d:30:b5:74:66:21:fb:97:d7:0e:98:72:4b: dd:21:15:d3:4a:60:6a:d6:05:b1:ec:9c:f7:0c:e8:1f: 8e:e5:82:74:91:b7:5c:3c:3d:5c:61:6e:11:b3:db:22: b3:50:e3:b5:d2:6f:57:83:ce:6f:36:05:65:df:23:fe: bb:a9:e2:2b:5b:03:ca:ee:e3:66:2b:05:40:b1:50:3b: dd:20:68:8c:f1:ad:fc:be:b2:8d:61:67:86:77:5b:1b Fingerprint (SHA-256): 67:CF:9E:A2:3D:32:E9:72:7C:5E:EA:FE:70:11:ED:72:C4:FA:76:DF:17:FA:DC:D4:BD:76:A3:7E:F3:2E:08:FA Fingerprint (SHA1): 27:8C:81:FF:24:8B:53:BA:89:64:0D:39:38:EB:A6:37:F0:60:33:CF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4514: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154276 (0x195756e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:19:53 2016 Not After : Sun Apr 25 16:19:53 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:9b:91:94:fa:ff:f3:7c:46:cf:aa:b9:a1:e7:9e:7d: a9:fe:c0:5e:27:08:be:b3:c3:cd:a8:95:7b:22:f5:49: 91:85:16:26:f2:ba:b9:b2:f5:cc:3f:19:c1:a9:d0:bd: 49:a6:cb:cd:30:e7:96:ea:d0:20:16:27:e8:33:08:ad: 82:36:08:7a:1b:e2:7e:50:9e:f3:cf:39:c6:01:af:5d: 98:ad:51:f1:6f:c0:5f:25:32:aa:3a:e1:6b:90:66:26: 6f:95:22:04:ee:06:1d:8f:99:1b:32:bf:d9:e3:f6:8e: 01:f4:33:29:fc:eb:6f:68:95:1c:b2:b2:67:77:62:a3: 66:dd:d8:33:22:28:7a:e8:04:83:72:84:8b:29:9d:02: fe:46:92:c3:2f:47:18:05:d3:00:9d:d6:ed:00:7d:96: ef:fb:3a:87:01:9f:1b:c0:b0:4c:3d:12:29:32:78:01: 2a:e0:43:5b:24:8a:f2:9f:0c:e2:1e:57:35:fb:0a:b2: da:f2:21:1f:af:2e:bd:f1:3b:3b:82:f3:3f:bc:82:a3: 5d:e7:ee:0e:da:8b:34:32:5e:63:b3:49:95:27:be:18: c5:22:f4:6f:5c:74:df:77:03:14:99:b3:03:b3:d7:ab: 34:e0:41:28:8c:95:14:78:72:d8:d6:c1:4c:25:ec:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:a3:02:5a:d6:9e:8e:d7:dc:d5:46:ca:20:72:4f:fe: e1:a1:9d:13:cf:16:d6:5e:90:19:8b:35:2b:7b:e4:c9: 47:3f:63:63:ed:0b:97:88:3b:6b:0a:35:0f:da:60:d3: 3b:7d:11:79:68:53:2e:d7:19:a3:d7:8f:bd:3c:39:fd: 21:2f:a2:82:84:16:89:40:0b:c2:f7:2c:39:03:af:c7: 72:37:6f:7e:4c:dc:74:9b:2a:b3:63:6d:79:8c:fc:03: f0:4c:2c:32:70:7e:7e:6a:db:f9:41:f7:47:3f:1d:36: a2:63:8e:f3:31:1b:84:c5:af:4c:3c:0a:1c:68:ed:f5: 67:2d:68:89:00:b6:47:65:ce:37:17:13:58:ca:21:83: d1:ec:7b:5e:02:87:bd:c5:7b:d8:f0:f0:a3:06:8f:b5: 20:04:5c:98:87:df:76:77:fd:2d:64:c9:1d:c7:3c:28: ad:83:65:37:43:7b:a8:06:0b:cb:20:ab:ee:50:3b:fa: 43:93:ed:62:50:a1:77:0a:0f:82:5d:4e:a5:e7:30:8f: fa:89:b9:a9:3e:7e:85:69:21:1c:ff:52:50:45:c9:39: 4a:04:f7:ae:c0:ba:73:3b:ce:5b:3a:da:e5:e9:ca:51: ec:89:a2:3d:de:eb:01:93:48:0c:65:b1:51:5c:c7:b9 Fingerprint (SHA-256): C7:F2:C0:04:5A:F9:EE:E6:49:FC:E2:7A:2B:70:CF:87:76:BC:93:AB:21:18:CF:19:E3:7B:F3:7E:F5:FE:B5:FC Fingerprint (SHA1): 55:20:6C:CD:24:1A:16:CA:E3:7F:65:F5:F4:D9:50:19:75:58:01:BE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #4515: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154276 (0x195756e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:19:53 2016 Not After : Sun Apr 25 16:19:53 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:9b:91:94:fa:ff:f3:7c:46:cf:aa:b9:a1:e7:9e:7d: a9:fe:c0:5e:27:08:be:b3:c3:cd:a8:95:7b:22:f5:49: 91:85:16:26:f2:ba:b9:b2:f5:cc:3f:19:c1:a9:d0:bd: 49:a6:cb:cd:30:e7:96:ea:d0:20:16:27:e8:33:08:ad: 82:36:08:7a:1b:e2:7e:50:9e:f3:cf:39:c6:01:af:5d: 98:ad:51:f1:6f:c0:5f:25:32:aa:3a:e1:6b:90:66:26: 6f:95:22:04:ee:06:1d:8f:99:1b:32:bf:d9:e3:f6:8e: 01:f4:33:29:fc:eb:6f:68:95:1c:b2:b2:67:77:62:a3: 66:dd:d8:33:22:28:7a:e8:04:83:72:84:8b:29:9d:02: fe:46:92:c3:2f:47:18:05:d3:00:9d:d6:ed:00:7d:96: ef:fb:3a:87:01:9f:1b:c0:b0:4c:3d:12:29:32:78:01: 2a:e0:43:5b:24:8a:f2:9f:0c:e2:1e:57:35:fb:0a:b2: da:f2:21:1f:af:2e:bd:f1:3b:3b:82:f3:3f:bc:82:a3: 5d:e7:ee:0e:da:8b:34:32:5e:63:b3:49:95:27:be:18: c5:22:f4:6f:5c:74:df:77:03:14:99:b3:03:b3:d7:ab: 34:e0:41:28:8c:95:14:78:72:d8:d6:c1:4c:25:ec:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:a3:02:5a:d6:9e:8e:d7:dc:d5:46:ca:20:72:4f:fe: e1:a1:9d:13:cf:16:d6:5e:90:19:8b:35:2b:7b:e4:c9: 47:3f:63:63:ed:0b:97:88:3b:6b:0a:35:0f:da:60:d3: 3b:7d:11:79:68:53:2e:d7:19:a3:d7:8f:bd:3c:39:fd: 21:2f:a2:82:84:16:89:40:0b:c2:f7:2c:39:03:af:c7: 72:37:6f:7e:4c:dc:74:9b:2a:b3:63:6d:79:8c:fc:03: f0:4c:2c:32:70:7e:7e:6a:db:f9:41:f7:47:3f:1d:36: a2:63:8e:f3:31:1b:84:c5:af:4c:3c:0a:1c:68:ed:f5: 67:2d:68:89:00:b6:47:65:ce:37:17:13:58:ca:21:83: d1:ec:7b:5e:02:87:bd:c5:7b:d8:f0:f0:a3:06:8f:b5: 20:04:5c:98:87:df:76:77:fd:2d:64:c9:1d:c7:3c:28: ad:83:65:37:43:7b:a8:06:0b:cb:20:ab:ee:50:3b:fa: 43:93:ed:62:50:a1:77:0a:0f:82:5d:4e:a5:e7:30:8f: fa:89:b9:a9:3e:7e:85:69:21:1c:ff:52:50:45:c9:39: 4a:04:f7:ae:c0:ba:73:3b:ce:5b:3a:da:e5:e9:ca:51: ec:89:a2:3d:de:eb:01:93:48:0c:65:b1:51:5c:c7:b9 Fingerprint (SHA-256): C7:F2:C0:04:5A:F9:EE:E6:49:FC:E2:7A:2B:70:CF:87:76:BC:93:AB:21:18:CF:19:E3:7B:F3:7E:F5:FE:B5:FC Fingerprint (SHA1): 55:20:6C:CD:24:1A:16:CA:E3:7F:65:F5:F4:D9:50:19:75:58:01:BE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #4516: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4517: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154279 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4518: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4519: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4520: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4521: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425154280 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4522: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4523: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4524: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4525: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154281 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4526: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4527: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4528: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4529: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 425154282 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4530: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4531: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #4532: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4533: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425154283 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4534: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4535: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #4536: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4537: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425154284 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4538: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4539: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #4540: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4541: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 425154285 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4542: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4543: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4544: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #4545: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #4546: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4547: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #4548: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154279 (0x195756e7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:20:49 2016 Not After : Sun Apr 25 16:20:49 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:ed:c1:56:78:46:fe:19:cc:ff:20:62:0e:2f:2c:5e: 7d:56:74:f4:d7:69:b6:c1:4f:2c:25:61:47:a2:e1:52: a0:47:ca:2a:d6:41:45:64:86:ab:6a:39:c0:d6:90:0c: 3d:a1:f5:da:df:4a:83:77:5a:e1:8c:8a:12:bf:0e:ff: 32:85:d9:5c:95:83:f2:5a:6d:9e:32:ba:ba:fb:18:59: ec:9c:43:ba:ec:29:bb:16:97:ba:42:33:8e:15:22:78: c3:16:ff:5a:21:f5:71:87:02:eb:d8:67:c9:e9:f9:ff: dd:4a:24:6c:af:b4:d4:70:ce:aa:e9:ca:46:74:49:52: 8e:1e:78:a8:32:c4:6d:c9:83:11:33:f5:03:6b:6d:e6: 3f:c2:71:77:7f:8b:3b:44:2c:c7:59:89:a2:10:08:eb: eb:8d:50:72:cd:06:b5:ae:22:2f:40:1c:53:8b:1f:e3: 1a:11:dc:5f:1b:67:dc:f0:08:12:2e:f1:19:eb:f7:cc: c6:f9:83:9d:ca:90:0c:73:2d:91:3c:d0:1e:59:2e:03: f9:0f:d8:c2:a9:32:1b:1a:d8:bb:b9:da:01:3f:78:50: 01:2d:83:fe:41:d3:16:48:75:d1:db:53:69:94:d1:52: 7e:d6:19:d2:b8:64:97:4d:4e:7b:4f:f0:b5:d8:8a:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:2d:b6:e4:01:9f:0c:96:20:3d:98:82:5f:32:f7:6d: 4e:c5:f1:58:97:29:83:35:97:3f:2b:9b:fd:09:65:c0: 51:75:c7:ba:fd:d8:27:99:81:9b:5a:9b:ff:61:7d:f8: e8:96:54:21:d5:c8:7f:58:18:ab:a7:ec:63:7a:4b:c9: 23:63:bb:0b:c9:bf:b8:5b:8f:23:1a:04:bb:e3:f0:04: b5:40:ea:54:6e:ed:38:2a:81:39:b6:e8:72:0f:59:85: 71:72:32:12:2a:f4:33:76:55:b6:01:c3:46:ca:82:1c: fb:f2:ac:5e:4c:84:a4:22:59:1e:ee:62:93:99:d0:7c: d3:b8:ca:1f:c6:0d:ea:92:9b:65:53:31:cb:2b:b5:c4: c4:e5:d9:d2:1d:01:5f:70:ca:73:26:3a:a2:99:95:8a: 39:c5:2b:bb:42:6a:c1:a6:b2:55:15:5e:60:bc:07:4a: 88:e5:4d:b3:55:f0:07:ea:4b:2f:e3:16:e7:f6:7a:79: 7b:1b:c0:05:62:cc:a0:11:ca:04:1e:3c:ac:9b:69:c8: ea:3d:70:11:35:a6:cb:ea:99:59:10:62:90:72:94:c0: 20:bb:ac:96:0d:0e:67:81:92:42:8c:33:53:6b:86:8a: f6:96:43:9a:ea:c7:88:4b:ed:7f:8f:41:34:d5:5d:ea Fingerprint (SHA-256): 9E:2C:65:04:E7:F9:89:E9:76:FE:94:40:CF:F3:96:59:85:03:C2:88:20:F7:34:9C:04:3E:61:55:B1:00:82:87 Fingerprint (SHA1): 5F:AB:58:E9:A0:6A:C2:3D:30:E0:8F:B9:4D:12:58:A2:35:D1:41:6C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4549: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4550: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4551: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4552: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154279 (0x195756e7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:20:49 2016 Not After : Sun Apr 25 16:20:49 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:ed:c1:56:78:46:fe:19:cc:ff:20:62:0e:2f:2c:5e: 7d:56:74:f4:d7:69:b6:c1:4f:2c:25:61:47:a2:e1:52: a0:47:ca:2a:d6:41:45:64:86:ab:6a:39:c0:d6:90:0c: 3d:a1:f5:da:df:4a:83:77:5a:e1:8c:8a:12:bf:0e:ff: 32:85:d9:5c:95:83:f2:5a:6d:9e:32:ba:ba:fb:18:59: ec:9c:43:ba:ec:29:bb:16:97:ba:42:33:8e:15:22:78: c3:16:ff:5a:21:f5:71:87:02:eb:d8:67:c9:e9:f9:ff: dd:4a:24:6c:af:b4:d4:70:ce:aa:e9:ca:46:74:49:52: 8e:1e:78:a8:32:c4:6d:c9:83:11:33:f5:03:6b:6d:e6: 3f:c2:71:77:7f:8b:3b:44:2c:c7:59:89:a2:10:08:eb: eb:8d:50:72:cd:06:b5:ae:22:2f:40:1c:53:8b:1f:e3: 1a:11:dc:5f:1b:67:dc:f0:08:12:2e:f1:19:eb:f7:cc: c6:f9:83:9d:ca:90:0c:73:2d:91:3c:d0:1e:59:2e:03: f9:0f:d8:c2:a9:32:1b:1a:d8:bb:b9:da:01:3f:78:50: 01:2d:83:fe:41:d3:16:48:75:d1:db:53:69:94:d1:52: 7e:d6:19:d2:b8:64:97:4d:4e:7b:4f:f0:b5:d8:8a:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:2d:b6:e4:01:9f:0c:96:20:3d:98:82:5f:32:f7:6d: 4e:c5:f1:58:97:29:83:35:97:3f:2b:9b:fd:09:65:c0: 51:75:c7:ba:fd:d8:27:99:81:9b:5a:9b:ff:61:7d:f8: e8:96:54:21:d5:c8:7f:58:18:ab:a7:ec:63:7a:4b:c9: 23:63:bb:0b:c9:bf:b8:5b:8f:23:1a:04:bb:e3:f0:04: b5:40:ea:54:6e:ed:38:2a:81:39:b6:e8:72:0f:59:85: 71:72:32:12:2a:f4:33:76:55:b6:01:c3:46:ca:82:1c: fb:f2:ac:5e:4c:84:a4:22:59:1e:ee:62:93:99:d0:7c: d3:b8:ca:1f:c6:0d:ea:92:9b:65:53:31:cb:2b:b5:c4: c4:e5:d9:d2:1d:01:5f:70:ca:73:26:3a:a2:99:95:8a: 39:c5:2b:bb:42:6a:c1:a6:b2:55:15:5e:60:bc:07:4a: 88:e5:4d:b3:55:f0:07:ea:4b:2f:e3:16:e7:f6:7a:79: 7b:1b:c0:05:62:cc:a0:11:ca:04:1e:3c:ac:9b:69:c8: ea:3d:70:11:35:a6:cb:ea:99:59:10:62:90:72:94:c0: 20:bb:ac:96:0d:0e:67:81:92:42:8c:33:53:6b:86:8a: f6:96:43:9a:ea:c7:88:4b:ed:7f:8f:41:34:d5:5d:ea Fingerprint (SHA-256): 9E:2C:65:04:E7:F9:89:E9:76:FE:94:40:CF:F3:96:59:85:03:C2:88:20:F7:34:9C:04:3E:61:55:B1:00:82:87 Fingerprint (SHA1): 5F:AB:58:E9:A0:6A:C2:3D:30:E0:8F:B9:4D:12:58:A2:35:D1:41:6C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4553: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4554: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #4555: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154286 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4556: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #4557: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4558: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4559: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425154287 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4560: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4561: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #4562: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4563: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 425154288 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4564: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4565: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #4566: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4567: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 425154289 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4568: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4569: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4570: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4571: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 425154290 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4572: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4573: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #4574: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4575: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 425154291 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4576: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4577: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #4578: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4579: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 425154292 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4580: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4581: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4582: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4583: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 425154293 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4584: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4585: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #4586: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4587: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 425154294 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4588: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4589: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #4590: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4591: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 425154295 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4592: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4593: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #4594: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4595: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 425154296 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4596: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4597: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #4598: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4599: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 425154297 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4600: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4601: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #4602: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4603: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 425154298 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4604: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4605: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #4606: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4607: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 425154299 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4608: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4609: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #4610: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4611: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 425154300 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4612: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4613: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #4614: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4615: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 425154301 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4616: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4617: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #4618: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4619: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 425154302 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4620: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4621: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #4622: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4623: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 425154303 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #4624: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4625: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #4626: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4627: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 425154304 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4628: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4629: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #4630: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4631: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 425154305 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4632: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4633: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #4634: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4635: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 425154306 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4636: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4637: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #4638: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4639: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 425154307 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4640: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4641: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #4642: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4643: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 425154308 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4644: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4645: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #4646: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4647: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 425154309 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4648: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4649: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #4650: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4651: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 425154310 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4652: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4653: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #4654: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4655: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 425154311 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4656: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4657: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #4658: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4659: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 425154312 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4660: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4661: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #4662: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4663: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 425154313 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4664: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4665: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #4666: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4667: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 425154314 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4668: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4669: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #4670: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4671: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 425154315 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4672: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4673: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4674: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4675: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4676: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4677: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4678: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4679: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4680: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4681: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4682: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4683: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4684: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4685: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4686: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4687: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4688: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4689: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4690: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4691: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4692: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4693: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4694: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4695: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4696: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154286 (0x195756ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:22:03 2016 Not After : Sun Apr 25 16:22:03 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:ad:c7:11:b9:86:ff:b4:3e:f3:4e:44:27:4e:a6:e3: b9:aa:54:33:fc:aa:8b:24:ff:51:37:40:7a:a1:29:a1: 30:20:82:58:bf:47:b4:fa:0a:36:44:41:64:b6:5d:7a: bf:f8:f3:f2:7b:3f:f4:a1:c4:fa:96:96:d0:db:5d:f9: ac:0b:97:56:18:df:0b:66:27:4a:99:24:d6:4b:da:a3: ad:2b:1b:39:65:11:11:47:f2:93:73:4b:89:52:b1:53: 26:53:43:1d:34:6f:c3:52:75:9a:ed:14:0e:fc:f6:4c: 1b:10:27:21:2c:4b:ba:3e:b1:95:1b:89:f9:fe:8c:77: c5:ef:50:5e:16:e8:a4:73:06:2a:fd:4e:94:4b:61:3a: 63:77:86:f6:fe:ae:b6:16:21:f7:d3:aa:85:a3:ce:d3: d1:d2:90:9e:6f:73:d5:45:d7:fd:65:dc:82:b0:63:0a: 1a:5c:b5:95:88:40:9f:76:0a:e0:f6:04:74:a4:56:3c: 1b:93:19:d4:e8:2e:79:0d:e7:87:d9:29:f9:fb:0b:c0: 38:40:21:f4:60:9c:0b:f4:9d:6b:39:e6:02:66:02:78: f8:2a:22:52:8a:74:cf:0a:36:d7:47:48:57:66:28:d7: a0:03:73:5e:fb:4c:1e:9d:0e:df:ca:04:1d:57:c1:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:8e:2c:1e:32:42:cc:3f:6b:11:28:8a:63:57:96:34: 9a:1d:24:0f:94:8f:84:a5:c1:8d:16:34:04:51:69:8a: 9c:d9:04:95:78:29:86:0a:71:fa:37:bb:62:ae:2e:f0: 5d:61:67:09:c6:a3:d2:26:63:22:67:9a:cf:15:d6:f0: af:9e:af:fe:32:f4:f9:e1:27:09:7b:8a:0d:32:c4:19: 2c:95:ee:07:fc:6d:01:38:5f:9b:35:0d:4a:44:21:ec: 85:76:2f:9b:c1:98:2e:b5:5a:bc:ac:ba:28:ee:c9:e3: e2:1d:c1:89:df:57:30:31:6d:8c:55:3a:0d:f0:bd:83: 1d:4d:06:68:39:cd:94:34:dc:cb:45:65:ae:38:5a:23: 10:44:77:85:91:be:83:c2:69:6d:ab:2b:11:af:66:fa: 3b:7f:4d:3e:f7:ae:68:e0:f7:c3:89:31:e2:c1:9c:ac: 10:58:69:90:cb:94:b7:b8:c9:6f:30:ff:dc:b4:31:28: b3:cf:83:f7:2f:fc:74:c7:0e:70:29:62:26:b3:2a:57: 2f:14:5c:c4:5d:1a:35:3b:ad:68:fa:dc:6f:19:f4:1c: 6c:42:c1:35:b6:e3:f5:64:5e:2a:69:01:a3:a7:64:10: 03:07:7a:2e:a8:b6:a1:bc:9a:f1:4c:c1:89:97:d9:17 Fingerprint (SHA-256): A8:69:2C:F8:A7:A6:E9:59:2E:29:E4:CB:7A:B7:C3:EC:DE:D2:99:D1:DF:32:4B:41:6E:67:71:4E:6B:07:49:F3 Fingerprint (SHA1): A0:34:1D:E8:9B:8A:10:13:15:DA:93:9E:D2:9B:9A:E5:BD:0D:F1:88 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #4697: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4698: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4699: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154316 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4700: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4701: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #4702: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4703: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 425154317 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4704: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4705: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #4706: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4707: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 425154318 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4708: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4709: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #4710: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4711: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 425154319 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4712: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4713: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #4714: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4715: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 425154320 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4716: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4717: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #4718: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4719: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 425154321 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4720: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4721: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #4722: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4723: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 425154322 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4724: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4725: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4726: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154316 (0x1957570c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:27:46 2016 Not After : Sun Apr 25 16:27:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:9e:4a:dc:c7:17:1b:52:9b:45:b8:aa:9e:b4:d6:e9: 28:ed:e1:94:25:4a:15:b3:3f:37:83:f2:a1:31:5b:37: c4:51:ef:28:ae:fd:86:5b:68:69:09:03:f0:23:eb:d3: e4:6a:d2:2e:a6:a9:d8:de:30:35:37:26:0b:27:ec:70: 26:53:7c:ca:32:3f:c2:a7:8b:e0:f9:d8:2a:f8:54:4d: 32:38:5c:9b:2a:95:ae:9c:ad:a3:f2:8b:05:3d:e9:09: 35:f2:7e:e2:70:fd:79:f7:16:10:67:93:49:08:8f:ec: c5:9f:d6:f1:c1:bb:dd:cd:02:80:f2:74:10:c1:e0:15: 19:8f:ad:0b:9e:ab:a7:cd:b7:52:e4:89:f8:61:8b:5c: 14:d7:a8:5c:61:95:26:17:23:c6:b5:b9:c7:31:12:0c: 97:04:90:63:8b:e4:9d:a1:3f:d7:81:6c:10:28:de:30: 65:ca:85:1a:ec:41:5c:ac:30:b4:52:2e:8b:b6:4f:35: 5b:e5:b1:85:81:67:78:c4:11:f4:11:71:04:9f:5a:43: 8c:06:95:59:d7:f3:2a:c5:dc:21:f8:23:21:c9:ed:0a: ab:ed:8d:f7:cb:b0:9d:a2:ac:f4:e0:2e:5e:5e:97:19: 69:28:12:96:1c:f6:94:3c:7c:f8:de:c3:92:59:f4:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:2f:f5:64:d2:e0:24:c0:86:54:10:46:42:cd:45:db: d5:5b:bd:ac:c4:06:d1:40:e1:7b:b9:f0:c8:11:22:03: 65:44:08:34:f1:d5:bb:18:4f:08:ea:7e:f5:17:9d:d1: 86:61:a2:50:16:55:32:88:f1:49:d9:e6:74:73:f2:eb: a4:2e:e8:d8:e1:3e:e2:f8:65:d6:d3:22:b6:d0:58:88: 3c:ae:d1:b7:33:02:2d:a4:61:30:66:4c:42:82:41:4a: 69:33:0c:51:55:3d:16:8f:56:33:fc:51:61:06:8a:4e: 3e:27:d6:6f:dd:c6:3e:30:f9:84:4d:a3:83:25:63:e6: 07:09:b9:d0:d0:d6:fb:a2:cd:72:7b:a3:3d:9a:fd:2e: c5:9e:f4:b6:5e:a8:ee:37:02:7e:43:18:4d:8f:c0:64: c2:ee:7d:b6:fe:98:20:3d:02:1e:7b:fa:28:fb:9e:63: 76:98:52:b3:72:e1:1e:3a:20:2a:a9:86:56:f2:86:24: a0:6e:e9:28:fa:ac:d9:c0:44:eb:c2:d1:fc:17:f5:d7: dd:4b:0b:1b:ab:00:5f:74:35:6b:a9:9b:be:eb:ac:42: 3c:0e:e1:33:5e:85:20:a0:60:64:08:f7:76:ff:60:d8: c4:90:45:a3:ac:3f:e5:c4:c1:33:94:89:35:98:3b:4a Fingerprint (SHA-256): 1F:FD:83:D7:9D:7C:F2:DB:AE:52:32:F6:13:67:E1:30:94:57:D6:DF:2C:82:6D:37:E9:59:81:CA:97:E6:1F:38 Fingerprint (SHA1): AD:A4:A2:16:EF:A8:9C:FA:92:C7:B1:7B:EC:1E:23:1B:D5:86:4C:AD Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #4727: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4728: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4729: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4730: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154316 (0x1957570c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:27:46 2016 Not After : Sun Apr 25 16:27:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:9e:4a:dc:c7:17:1b:52:9b:45:b8:aa:9e:b4:d6:e9: 28:ed:e1:94:25:4a:15:b3:3f:37:83:f2:a1:31:5b:37: c4:51:ef:28:ae:fd:86:5b:68:69:09:03:f0:23:eb:d3: e4:6a:d2:2e:a6:a9:d8:de:30:35:37:26:0b:27:ec:70: 26:53:7c:ca:32:3f:c2:a7:8b:e0:f9:d8:2a:f8:54:4d: 32:38:5c:9b:2a:95:ae:9c:ad:a3:f2:8b:05:3d:e9:09: 35:f2:7e:e2:70:fd:79:f7:16:10:67:93:49:08:8f:ec: c5:9f:d6:f1:c1:bb:dd:cd:02:80:f2:74:10:c1:e0:15: 19:8f:ad:0b:9e:ab:a7:cd:b7:52:e4:89:f8:61:8b:5c: 14:d7:a8:5c:61:95:26:17:23:c6:b5:b9:c7:31:12:0c: 97:04:90:63:8b:e4:9d:a1:3f:d7:81:6c:10:28:de:30: 65:ca:85:1a:ec:41:5c:ac:30:b4:52:2e:8b:b6:4f:35: 5b:e5:b1:85:81:67:78:c4:11:f4:11:71:04:9f:5a:43: 8c:06:95:59:d7:f3:2a:c5:dc:21:f8:23:21:c9:ed:0a: ab:ed:8d:f7:cb:b0:9d:a2:ac:f4:e0:2e:5e:5e:97:19: 69:28:12:96:1c:f6:94:3c:7c:f8:de:c3:92:59:f4:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:2f:f5:64:d2:e0:24:c0:86:54:10:46:42:cd:45:db: d5:5b:bd:ac:c4:06:d1:40:e1:7b:b9:f0:c8:11:22:03: 65:44:08:34:f1:d5:bb:18:4f:08:ea:7e:f5:17:9d:d1: 86:61:a2:50:16:55:32:88:f1:49:d9:e6:74:73:f2:eb: a4:2e:e8:d8:e1:3e:e2:f8:65:d6:d3:22:b6:d0:58:88: 3c:ae:d1:b7:33:02:2d:a4:61:30:66:4c:42:82:41:4a: 69:33:0c:51:55:3d:16:8f:56:33:fc:51:61:06:8a:4e: 3e:27:d6:6f:dd:c6:3e:30:f9:84:4d:a3:83:25:63:e6: 07:09:b9:d0:d0:d6:fb:a2:cd:72:7b:a3:3d:9a:fd:2e: c5:9e:f4:b6:5e:a8:ee:37:02:7e:43:18:4d:8f:c0:64: c2:ee:7d:b6:fe:98:20:3d:02:1e:7b:fa:28:fb:9e:63: 76:98:52:b3:72:e1:1e:3a:20:2a:a9:86:56:f2:86:24: a0:6e:e9:28:fa:ac:d9:c0:44:eb:c2:d1:fc:17:f5:d7: dd:4b:0b:1b:ab:00:5f:74:35:6b:a9:9b:be:eb:ac:42: 3c:0e:e1:33:5e:85:20:a0:60:64:08:f7:76:ff:60:d8: c4:90:45:a3:ac:3f:e5:c4:c1:33:94:89:35:98:3b:4a Fingerprint (SHA-256): 1F:FD:83:D7:9D:7C:F2:DB:AE:52:32:F6:13:67:E1:30:94:57:D6:DF:2C:82:6D:37:E9:59:81:CA:97:E6:1F:38 Fingerprint (SHA1): AD:A4:A2:16:EF:A8:9C:FA:92:C7:B1:7B:EC:1E:23:1B:D5:86:4C:AD Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #4731: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4732: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4733: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4734: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154323 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4735: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4736: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4737: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4738: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154324 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4739: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4740: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4741: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4742: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154325 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4743: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4744: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4745: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4746: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425154326 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4747: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4748: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4749: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4750: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4751: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4752: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154323 (0x19575713) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:28:58 2016 Not After : Sun Apr 25 16:28:58 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:04:75:07:9e:9a:c1:2a:26:7f:38:50:ae:23:e5:c1: fe:f2:32:58:99:f8:22:4d:ac:9e:a3:1a:67:26:35:85: ca:61:8e:4a:0c:5d:ca:c5:ea:bc:0f:4c:e0:17:7d:7d: 90:29:d6:67:1b:5b:5b:a2:3b:9c:4b:42:83:e9:c9:25: f8:6b:aa:33:71:6c:17:7e:4d:45:83:d5:2f:bc:da:39: 8c:e1:de:d4:db:a8:96:f4:cb:e1:b4:b9:ac:03:2f:4b: 28:ec:c2:d4:6a:4a:97:ca:05:b8:be:20:b5:49:4c:56: 35:bc:63:9a:8f:5d:29:c7:d6:46:08:3c:16:ac:2d:79: f3:08:a7:dd:b9:39:fd:13:e2:74:d4:29:a3:20:5d:48: 81:f3:cd:1d:2e:7e:2c:4d:6f:b3:ce:3b:f4:a4:b6:51: e7:49:a1:73:92:64:7a:d6:2d:60:13:99:1f:28:b0:21: 61:18:3c:83:e6:b4:e7:06:80:dd:7e:b4:7d:60:3f:c1: 87:a9:81:86:5a:47:15:e9:57:9d:4c:c1:9d:21:0c:f6: 22:87:08:83:f9:2f:8a:1e:08:50:a5:33:77:4c:74:cf: 10:ad:26:e6:02:af:05:65:29:df:2b:c0:65:0d:09:a1: df:4b:5a:b2:1a:d5:bf:55:09:de:fd:8d:a5:0f:cf:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:19:d5:05:c4:0d:8e:be:b5:15:21:9b:20:88:2a:90: fa:19:31:45:94:62:1c:75:b9:51:de:43:d3:c8:d9:82: c7:80:89:5b:31:4c:96:ee:05:b4:1b:ac:0e:c6:f2:f7: 51:50:9b:86:3c:a7:7a:4f:43:16:fb:c6:bf:b9:6d:ee: ca:e0:db:d6:d2:72:d0:e8:96:24:67:88:8d:e5:fd:38: 4b:55:e8:f2:d2:3c:6e:a6:af:93:5e:f2:95:0a:d6:b0: e4:e4:3d:e3:c6:4c:a2:fb:ae:ef:1b:0e:be:c2:ba:50: 31:3b:01:70:80:e6:be:b9:de:d8:89:6b:a7:ce:64:8e: 4e:da:b5:48:7b:a7:0d:8f:ab:03:2f:4e:43:51:40:02: 0e:b3:ec:30:87:a1:57:d7:e6:03:21:71:ce:93:89:84: d2:8d:45:84:5f:85:e3:9c:84:01:21:73:d9:c1:6e:0a: 93:1a:01:53:ad:90:a1:1d:f4:92:41:f3:17:1e:a2:ba: f9:44:ae:fb:ab:12:94:23:a6:b0:b6:a1:f8:ad:b5:f4: 5d:ca:50:e9:b9:1e:80:15:e2:d9:4e:06:72:e3:c9:97: 0b:34:dc:3c:73:92:11:8d:c6:63:2d:47:05:dd:91:fc: 0c:6d:8f:c8:df:b8:82:17:2b:06:d5:9f:b0:5a:7f:0a Fingerprint (SHA-256): C9:F2:7C:6E:A8:F4:58:3E:B4:04:3A:74:A1:D2:EB:FE:F4:C3:D8:2B:97:2B:60:A0:82:E4:D6:AE:9B:CC:7C:86 Fingerprint (SHA1): AF:07:43:43:2C:ED:C2:F9:00:72:75:9B:D9:1E:61:EC:08:56:35:51 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4753: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4754: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4755: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154324 (0x19575714) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:29:04 2016 Not After : Sun Apr 25 16:29:04 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:a9:e4:27:d2:33:a2:63:71:de:65:d8:a0:67:52:60: a8:b4:44:93:71:d8:e9:49:d9:12:4d:75:d1:87:bf:58: 39:4c:17:1a:98:58:a4:f6:73:4f:90:3d:26:19:5a:7c: 1f:44:4f:6b:e3:1e:f9:62:ab:9b:00:bf:0f:c5:26:7a: fa:3f:26:0f:72:60:bd:83:9c:72:2f:20:80:9b:3a:c3: 4f:98:a0:55:0d:7a:8f:d0:02:9f:dd:19:16:07:9f:a1: 39:19:b9:9b:94:93:02:0a:0f:d6:55:e6:b4:fb:43:7f: 14:06:ab:59:a7:b4:56:14:bb:40:d5:17:1c:8b:e0:86: 1b:17:9c:ff:a9:b9:96:04:58:49:2b:c4:98:9c:2e:78: 9b:77:22:40:29:21:10:2f:be:49:ad:52:18:42:3e:7f: cd:13:f4:f9:bf:b5:5d:99:c0:bd:72:43:9f:1d:24:da: 70:eb:fd:b9:5f:31:46:4f:58:2e:0b:3f:b9:3a:4b:87: a2:cc:32:bb:22:ff:24:33:53:25:6a:0d:2f:30:50:30: 2d:f0:d3:48:d8:a1:c8:36:2e:4b:38:68:6b:1a:62:d5: 1d:43:29:0e:f9:81:a8:b2:33:be:48:85:ec:87:b1:7f: c6:74:4a:71:74:e8:6c:a3:26:5f:db:d7:ac:8d:51:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:f9:ce:68:3c:95:0f:c0:84:18:79:4a:5b:db:b6:1d: 6b:4b:b2:f4:e6:e5:6e:b8:1a:d6:bb:50:7d:32:cb:6a: 0c:ca:6c:c8:36:5e:10:3b:af:fb:ae:a7:fc:07:d6:51: 5b:97:0d:5c:2d:25:7a:33:4a:7f:11:01:9b:b3:9d:eb: 1a:47:b9:3d:ee:56:7a:38:16:8e:f8:75:9c:53:cf:a6: 1f:f1:e6:d4:07:a7:b2:38:8f:1e:d2:45:34:6b:64:04: fb:51:1a:81:eb:96:9f:0e:2d:06:1b:10:3b:03:49:20: b0:fa:54:c5:d9:ad:39:f1:83:a7:d8:b7:32:06:0a:fc: fc:75:60:4b:63:22:65:56:a8:72:25:3e:9d:c6:ed:73: 89:cd:71:41:8a:eb:c3:c7:ac:b6:b2:31:4a:e2:f8:43: ad:68:a4:be:3e:26:5d:28:0f:87:03:ca:e0:36:a4:88: 92:a6:30:47:30:b0:b2:ac:2e:cd:a1:0d:10:b2:80:8e: f5:51:ef:74:22:2b:83:61:85:c8:4c:9c:5b:12:dc:a2: 58:09:61:5f:8c:7c:a6:8c:26:6e:c8:d2:70:b5:03:92: e1:ac:d1:9b:20:b3:fe:f9:35:d1:40:d8:ed:4e:e0:90: ae:76:20:de:e8:d1:fa:7e:3c:51:70:74:de:14:7f:24 Fingerprint (SHA-256): E0:89:5D:65:AB:60:82:95:D5:B3:D0:AB:33:90:45:87:0F:3A:3D:CF:41:2A:F4:9C:FA:05:24:FD:81:D1:F8:9D Fingerprint (SHA1): 46:CA:BD:B8:44:32:91:8D:C0:D2:FD:3C:17:3D:D9:52:53:FC:F3:7D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4756: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4757: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154325 (0x19575715) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:29:30 2016 Not After : Sun Apr 25 16:29:30 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:63:63:62:bd:6f:d8:1f:16:f4:fe:81:60:6e:24:60: 7b:54:12:c5:4f:fc:20:b5:36:20:c6:5c:83:5e:00:e4: 93:d4:1a:8f:a9:72:5b:5b:fe:bc:20:19:59:77:c1:5a: f8:f5:d7:50:f4:03:86:f6:f8:b4:f0:9a:a8:01:14:8f: a6:32:54:b7:ae:3a:11:aa:25:22:55:e2:8e:e4:58:8f: 21:1d:b1:cf:cf:54:96:cd:9d:35:7f:90:45:4a:95:ab: 34:06:02:01:a6:af:46:51:5f:17:72:d2:5a:2e:84:98: e7:d2:5d:27:88:4d:d4:e2:98:d2:b5:0a:9b:fb:26:88: 9e:5f:b2:5c:78:58:a1:bd:8a:98:7a:53:2b:44:c4:6c: 84:43:60:09:3e:a2:34:77:e3:fa:a1:5c:94:f6:08:8e: a3:36:5c:c8:7d:42:fe:78:30:98:e7:97:18:01:f5:67: aa:fb:a7:49:b5:5d:66:f1:32:9a:c7:99:51:55:fa:b2: 1b:dd:9f:96:94:8e:1a:a1:c8:9a:71:5f:13:7a:83:79: 9c:0c:49:fb:bc:5d:94:49:f2:f9:97:4c:7e:26:80:2b: 20:b9:ca:6c:0f:1c:a1:9f:69:8a:30:48:73:11:15:8b: 99:da:6e:1f:ee:fd:17:b9:0f:78:fe:06:6b:26:59:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:18:66:94:38:7e:8d:9a:c4:4c:29:cc:f2:70:01:3b: 95:c5:05:c0:e7:92:29:dc:7a:0d:39:0e:c5:f8:d6:2a: af:1a:ab:4f:f9:b2:45:22:6d:b0:97:52:39:5b:5c:f6: 00:78:f6:7f:5b:d4:74:ad:13:fb:6b:5b:55:29:74:e4: 49:60:69:e2:5f:dc:1a:4e:c4:f3:a0:1b:a9:e1:76:77: 46:ed:51:c9:5f:63:5d:81:8f:de:90:c8:36:c3:ff:74: c1:87:7d:92:39:57:c1:b8:6e:18:24:79:62:16:55:1a: f2:e9:48:7c:ef:9b:69:c1:1f:81:ca:eb:c1:a1:65:37: d0:e7:69:7a:55:14:14:65:fd:ca:bb:a1:87:73:67:f6: 58:08:4d:5c:8a:6a:5e:f5:e1:5a:8f:50:f5:ec:3d:b4: 02:29:0e:8c:df:23:af:46:f1:f5:ae:80:e5:63:24:2d: 11:fa:b6:07:3d:0c:4b:df:69:9c:8f:c3:24:49:d0:16: 61:2a:70:cb:51:e1:4d:21:2e:bc:6c:55:d0:df:bc:5c: b3:dc:0c:0b:a7:67:9c:e9:70:dd:0e:eb:97:02:ec:6d: a7:84:b4:7b:10:93:8e:22:0a:5b:ed:36:d3:4b:da:1e: c4:3d:8c:e9:c5:b2:8c:cb:a6:57:ad:77:4f:42:3c:24 Fingerprint (SHA-256): A4:54:9A:D1:76:38:78:F4:62:3F:CC:51:39:3D:31:3F:6D:FD:C1:45:08:D9:9B:39:B6:05:A5:49:6F:71:92:27 Fingerprint (SHA1): 99:22:1E:51:DA:89:11:88:48:2F:B7:B6:D6:8B:48:29:0D:6C:D4:6E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #4758: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4759: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154327 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4760: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4761: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4762: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4763: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154328 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4764: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4765: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4766: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4767: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154329 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4768: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4769: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4770: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4771: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 425154330 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4772: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4773: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4774: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4775: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 425154331 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4776: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4777: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4778: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #4779: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #4780: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #4781: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #4782: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154327 (0x19575717) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:30:00 2016 Not After : Sun Apr 25 16:30:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:c4:a9:2a:45:96:d5:70:29:05:87:dc:0d:04:4b:22: 9f:23:64:e4:b9:fa:f8:4c:12:db:79:a9:2e:9e:fe:23: 0d:ef:e5:4b:84:7f:51:68:9c:8d:9c:06:e4:48:84:af: 16:9c:da:08:67:4a:cc:89:b2:b3:97:b5:8b:55:8b:0a: 0d:18:fb:65:d5:33:87:c3:f3:05:b4:4c:37:ba:07:b7: bc:c2:43:fb:7d:1b:30:b3:08:45:d3:36:e3:3d:04:1e: b7:b0:8b:9b:91:6f:07:45:05:9a:2b:fb:26:75:0e:93: 85:a3:1a:6c:ae:cb:4b:df:19:c7:8c:b4:b2:dc:09:25: 54:ee:53:5b:8f:66:50:0d:6c:b5:e0:1c:d4:e1:64:a4: fa:98:cc:1d:2b:bb:b0:55:a8:80:15:eb:3e:b6:ad:00: 09:2d:a9:54:9f:10:97:9e:de:a0:a6:24:81:f8:17:dd: 56:33:3e:ef:e2:b2:58:32:57:7d:9d:e1:0f:cc:ba:da: 2b:61:0c:be:00:67:f5:92:cb:c0:e8:22:03:e9:a0:25: 48:6d:b7:08:5c:0f:0d:29:17:c2:72:b3:d6:42:23:97: ae:1d:3e:0e:1f:88:8a:ed:a6:a9:1c:81:9e:ec:2e:b6: 84:e2:d7:6a:cb:29:cd:96:91:5f:35:81:b2:97:92:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:9e:14:75:15:f5:74:1b:ad:f3:ba:52:60:28:fe:e5: 8c:a1:ab:13:1f:5a:dd:f1:04:37:23:56:fb:34:9f:2a: 1c:08:c7:0b:34:40:6c:ea:50:07:a6:49:c8:13:5e:f3: c0:35:5e:69:17:db:96:da:61:87:98:8b:c8:6f:64:0d: ee:89:db:9f:86:1a:1b:b2:7e:55:b6:c8:9e:01:0a:3d: 95:fa:bf:a9:f4:96:26:71:d8:bd:91:ce:e4:ac:fc:4f: 36:e4:f7:1b:4c:4b:63:7a:fd:fd:30:5b:7a:bb:e9:ee: 7d:73:28:b7:a4:fa:f0:fd:02:1e:fc:33:32:a5:1e:16: 7b:3b:bd:3a:a1:16:69:42:6c:2f:d0:e4:3f:8b:ed:d1: fe:64:af:05:6a:bd:b5:ee:5d:55:3e:b4:be:c2:2f:74: bf:87:fe:72:07:8f:ee:18:15:e8:30:c1:93:23:b1:a6: 35:77:63:e9:e5:e1:1e:cf:1b:a3:a9:2f:ab:d2:e1:ee: be:5b:7e:98:c3:8f:17:d9:10:df:70:c2:08:3e:17:90: 3a:fb:12:97:e6:65:16:aa:64:8c:b7:36:cb:6b:c7:b7: 0c:17:83:c3:d2:f3:08:43:32:6a:b3:2b:6c:e3:9f:19: f6:d5:e9:5f:84:da:fa:66:0f:fa:90:67:12:9a:6c:86 Fingerprint (SHA-256): EC:61:CF:05:A2:8E:60:C6:7D:BE:E9:EF:0A:E4:60:72:A5:1D:5E:B7:E5:73:06:7C:10:06:48:51:C2:C3:3A:64 Fingerprint (SHA1): B2:80:60:4C:11:E9:FF:D5:D6:45:96:67:98:98:D0:20:A5:44:50:7C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4783: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4784: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154328 (0x19575718) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:30:07 2016 Not After : Sun Apr 25 16:30:07 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:b7:41:bc:6c:54:b9:ca:8b:e5:df:59:fe:6e:ee:48: 45:37:ee:77:2c:19:89:cc:ba:b9:1e:ea:9a:cc:f6:ce: 22:c7:75:1a:93:bc:bb:5a:fc:4d:40:d1:f5:b5:55:40: 25:4c:92:cb:e7:c9:b7:c0:f9:e2:a4:55:b2:bf:a2:cc: e6:84:8f:e6:86:37:f0:3e:9c:d3:b5:b0:53:2f:09:35: a3:db:16:d4:65:eb:82:8e:8a:42:7c:14:b1:37:b7:c7: b9:f8:a7:bb:fd:10:f9:0e:29:e3:b3:cd:ec:47:33:08: f9:8a:e7:2f:a6:de:69:94:ad:d5:57:a2:c2:a7:ab:16: 58:a2:3e:8f:13:38:52:59:2a:f7:29:93:08:a2:9f:3d: 20:12:1d:62:af:38:22:2f:c9:8e:7f:64:e6:b2:e1:97: fb:02:ab:da:c2:d8:a2:49:98:d2:ac:93:b7:b4:96:15: 03:48:76:da:99:ec:5e:b5:63:c5:d3:c9:f5:1f:da:3b: 37:38:57:b9:b0:a2:68:86:5e:ac:5c:0c:f1:d3:8c:bf: f3:d6:10:31:6a:d3:61:e5:82:ee:a9:72:db:a0:16:52: 82:06:41:3c:da:6f:99:ee:c5:ee:bd:16:52:fb:0a:3f: a5:e1:70:fc:60:26:a7:7b:84:62:b8:c9:39:65:25:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:53:de:16:a3:41:e9:46:ad:d4:2a:b3:45:89:78:f4: 2b:5b:2f:40:50:c4:03:94:43:03:d9:a0:39:46:9a:32: 12:30:77:5b:11:84:3d:6d:cf:38:67:2f:cd:ce:d6:b9: 31:5d:c9:bf:0c:12:fc:f3:fe:d3:56:86:cf:05:d0:1b: e4:4b:59:22:d6:8b:25:28:5e:e9:46:d3:29:f4:aa:ec: 45:6f:83:cb:ca:9d:85:d2:c9:82:f2:2f:bf:c3:20:d5: 84:2d:82:59:8c:4d:f4:5a:8d:3e:ea:7d:db:e8:f9:59: 33:3e:8b:ad:53:1a:e9:70:13:bf:6f:9f:65:75:fa:9c: d1:54:d4:41:ea:33:1b:bc:d4:c7:88:5b:75:be:b4:5d: 50:e6:7f:67:84:c1:d8:95:ae:6e:9d:a1:c9:94:17:ed: f5:1a:ef:0a:04:23:fa:b7:c7:88:d2:ad:b4:b3:23:ff: 65:33:49:67:b5:ff:e5:43:40:db:95:81:d0:0e:df:0e: 05:c6:d2:6b:f6:2c:5d:fb:7a:4d:d1:0d:e0:40:51:52: da:19:1b:23:50:1d:ba:1b:66:a1:19:40:5f:0b:aa:5b: 22:c5:63:da:e2:23:44:45:38:86:e4:3f:89:c3:3f:eb: 61:6a:87:e1:2e:08:7d:e0:1b:dd:0f:83:48:08:95:36 Fingerprint (SHA-256): 36:95:B3:8B:AA:D9:C0:4F:51:09:69:B5:13:3A:99:82:92:7A:7A:31:31:78:5A:D8:27:F5:CA:09:52:6B:D0:57 Fingerprint (SHA1): 66:F2:0F:BB:F3:63:A4:62:7B:79:A1:BD:8C:5D:E0:AF:BE:51:A9:67 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4785: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4786: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4787: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154329 (0x19575719) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:30:15 2016 Not After : Sun Apr 25 16:30:15 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:31:ef:cc:39:68:1f:8e:52:ad:54:38:6b:6c:7e:f0: 2b:8f:07:88:94:8e:7a:4f:e8:5b:35:64:6b:68:a6:73: cd:de:f0:61:13:ac:71:71:ba:11:45:22:ff:12:ed:79: e0:f3:0c:51:6a:98:46:11:3f:d8:bf:5f:e9:d2:c3:65: e0:f6:ce:25:d6:07:11:5a:81:b0:92:37:20:aa:d3:d0: 6c:1f:4a:75:1c:13:89:40:77:31:5d:b5:70:31:e0:6f: 5d:ca:cc:46:5d:5b:e4:ac:6b:f1:d9:bb:27:36:12:28: 02:7e:77:0f:68:78:e8:21:d4:eb:56:8b:20:5e:59:d0: c3:0f:2d:f7:0d:0b:72:8a:ea:cc:5b:e8:ec:dc:da:55: 60:95:d7:7b:76:38:20:79:c5:8c:e0:2a:d2:19:c3:7f: 63:f6:0a:42:69:5a:ce:8f:3e:de:8c:e2:9a:af:be:14: d5:b5:3b:5c:65:72:58:fd:22:85:48:15:de:95:d4:27: 4d:08:03:04:10:48:fd:54:4e:5b:c0:fb:47:7a:a5:a6: 71:48:c5:6a:36:01:8d:38:30:b6:4d:73:7a:91:f2:cf: 1b:74:b9:e2:5d:af:fb:6e:7b:53:8c:f1:d0:fd:fd:65: 39:15:bf:ed:ca:63:87:6e:2a:df:cf:e4:92:9b:58:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:dc:c3:c3:bd:c0:72:52:d3:72:1b:33:ea:81:15:26: 80:4a:02:ba:52:e8:77:13:61:75:23:17:f2:f9:65:2b: f5:da:37:36:7b:eb:3f:9f:2c:c9:b1:f7:6c:39:63:e0: 7e:0c:56:95:86:9d:c6:a9:2d:b8:86:df:47:80:40:f7: d0:7b:17:c4:76:80:86:40:1c:c0:c2:09:6d:84:9c:7f: 2d:72:28:00:74:15:fe:03:eb:a9:91:9d:85:4c:93:6e: 2b:80:da:1d:b8:b2:22:9e:35:40:e9:1a:05:4f:4f:8b: 87:b1:0a:97:d5:34:19:d8:b7:60:72:b6:83:c4:55:68: cc:a1:5c:fd:46:08:d7:d8:be:d0:a1:af:ba:0d:2b:7e: f1:1a:8a:5a:6e:31:6a:1d:ad:94:37:82:45:44:ab:28: 51:b1:b8:99:c1:80:0f:bb:16:0f:4a:27:19:40:9c:24: 31:e1:ff:cc:50:8e:f4:08:42:e5:cf:62:c6:37:73:c8: 2a:0c:7c:e8:e9:78:b0:d5:43:7e:ea:87:ab:b3:2f:b5: b8:32:24:64:31:64:69:69:9e:e0:70:ee:40:e5:c8:13: 7f:c8:d7:60:06:58:09:28:cb:74:f3:84:2e:c4:93:5c: af:18:da:1b:52:4f:6c:4b:17:f9:53:24:5d:d6:cb:ba Fingerprint (SHA-256): 87:4E:5D:31:F4:F9:6D:2B:14:ED:74:C2:C3:34:35:74:ED:59:9C:47:3B:D9:C4:82:9D:98:7C:B8:8E:44:C6:FB Fingerprint (SHA1): F7:40:79:7E:E9:7C:09:E2:61:FC:03:E7:70:B5:FF:1A:49:33:FC:83 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #4788: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4789: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154332 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4790: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4791: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4792: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4793: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154333 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4794: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4795: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4796: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4797: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154334 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA1Root-425154111.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4798: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4799: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #4800: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4801: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425154335 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4802: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4803: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #4804: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154332 (0x1957571c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:30:46 2016 Not After : Sun Apr 25 16:30:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:18:6c:f4:86:c5:75:06:39:47:81:54:e2:bd:02:dd: 9b:cc:40:6e:31:53:2e:f7:f4:2f:ec:76:eb:5f:8a:d1: d4:2b:c0:9b:f4:66:d0:44:e4:c7:e0:1a:e7:1e:3a:a2: 38:0f:e2:53:dc:14:e7:b9:61:05:37:08:ad:81:22:92: 3d:59:05:4c:9a:2a:10:50:98:7e:e5:e7:e3:2a:a8:93: a1:c3:b5:95:59:da:8b:df:e9:4b:b8:0b:09:4e:8e:f8: 43:de:e3:a4:b4:58:cf:6e:d5:64:a4:a7:d1:63:27:78: a1:6c:59:de:f2:ec:9c:3e:87:64:70:b4:02:de:6d:56: 4d:8d:a9:8a:18:36:17:da:98:e7:f3:b9:05:de:38:76: 79:69:de:a1:eb:9f:a3:f7:86:8e:b7:54:f8:2d:97:2d: 69:30:62:16:b4:01:d6:b8:51:df:fd:65:d0:b2:a7:65: cf:5c:f7:5f:96:59:96:f6:1d:14:bd:53:ae:62:6d:69: e1:43:52:6b:80:7e:4c:7f:d3:a7:c0:60:1e:ad:eb:9b: 52:d4:ed:9d:00:56:3a:00:ff:6d:80:23:c4:53:bd:26: 98:29:f5:f5:7e:95:72:8b:c2:03:18:6b:be:f9:8d:14: 46:55:15:1b:ba:9b:45:0a:79:a5:49:9a:ca:c2:08:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:30:2c:86:77:49:86:04:a5:ce:43:d1:35:24:35:65: 1f:31:08:9d:02:1d:51:76:ea:20:c4:bd:f5:3f:96:3f: 45:fc:06:36:22:46:37:67:eb:2d:94:a3:0b:84:00:71: 6b:0f:57:6c:2d:8e:a9:fe:3e:fc:c0:2c:f9:01:3e:0d: a6:ca:10:0d:82:1e:ed:02:af:fa:8f:73:8c:9e:b0:00: 8b:e1:cb:3c:20:51:55:9a:27:8d:db:ff:e1:9f:ee:f9: 5f:0b:43:0f:60:eb:00:d5:6a:9e:17:92:db:74:28:2d: d9:6c:a6:6a:1b:ce:b4:51:b6:95:eb:f8:9a:83:f7:16: ca:8e:b7:60:9d:27:17:05:3f:db:0a:cb:88:ae:af:39: 43:b0:71:3e:84:e6:e9:b8:c0:bc:91:d4:cc:8d:11:e2: 1e:ad:e2:3c:45:89:10:8e:f0:b8:4b:7e:e3:ad:1f:d2: b0:f7:eb:27:43:f6:be:d7:71:26:02:b0:53:0d:83:34: 20:92:1b:91:c6:8b:38:4f:27:36:fa:a8:67:d7:df:39: 36:0d:fe:e3:00:b0:24:08:cd:48:9b:21:8d:63:fc:3b: 60:26:4c:5d:bd:40:b5:98:f9:2e:42:0b:ce:ee:a3:87: f3:0a:87:e5:45:d4:aa:e6:b9:26:38:f0:2a:67:f3:c0 Fingerprint (SHA-256): CA:9B:37:9B:38:0B:D1:9B:92:76:61:40:AC:9D:75:C7:62:06:18:8B:28:23:3F:57:ED:29:98:2C:B1:53:73:F7 Fingerprint (SHA1): B9:44:68:EC:CD:6F:27:38:0F:27:04:0C:DE:04:32:65:7C:6F:07:94 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4805: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4806: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154336 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4807: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4808: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4809: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154337 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4810: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4811: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4812: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4813: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425154338 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4814: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4815: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425154339 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4816: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4817: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4818: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4819: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4820: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425154340 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425154112.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4821: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4822: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4823: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4824: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154341 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4825: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4826: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4827: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4828: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154337 (0x19575721) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:31:31 2016 Not After : Sun Apr 25 16:31:31 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:4c:ee:bd:9c:3d:37:5c:61:2e:67:7e:9b:f3:32:2f: 82:5a:cb:d4:95:99:52:10:bc:36:d7:f8:93:c3:3b:5c: 18:ca:d1:02:a1:55:ff:51:de:7d:46:71:4f:78:7c:92: 4d:36:77:11:75:78:76:e3:2e:68:ca:45:0a:63:8c:cb: 59:1c:80:2f:1d:50:d2:87:f0:11:c9:99:42:c1:6e:de: c9:a4:a5:66:a2:bd:81:87:36:05:3e:73:b4:43:45:e8: 4a:aa:6e:8d:71:f8:1b:26:ab:03:7d:0a:43:11:6d:db: 60:a5:20:b4:56:f7:7d:d5:ab:36:95:aa:04:cb:f7:8a: 86:82:f3:b5:d0:06:cf:ee:dc:97:04:32:38:cd:f4:c6: 33:8f:54:b2:c3:31:a8:df:0b:a8:af:02:74:5b:a8:d6: 44:8e:9c:24:c8:85:ae:6f:05:5e:40:54:4a:5c:cd:aa: 50:b1:f0:bc:8b:85:4e:2a:96:32:84:cf:5c:fc:0b:cd: 0a:2e:44:58:c6:7b:72:4b:33:8f:11:27:73:28:d2:f2: 4d:98:62:22:f6:f5:98:13:d4:fb:7b:6c:05:d7:3f:04: 0b:f6:8b:da:8a:7c:17:94:35:05:f8:2a:f6:e7:f8:e7: d9:db:1b:cf:4b:24:32:9c:de:6c:61:dd:57:1c:42:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:75:e2:2b:b1:40:d6:8a:c1:67:9a:ba:4b:8c:94:0f: dc:6c:f2:f5:d9:21:d6:0b:ef:3a:59:e4:0c:08:89:ae: cc:7b:6f:d2:26:1b:16:0b:2e:3f:fc:c1:fb:e7:0d:8e: 9c:c1:b8:3d:e9:1c:62:30:5a:3a:41:85:03:ae:52:34: ad:bf:18:cd:c6:05:f1:02:73:ab:92:8c:af:ec:23:87: d0:10:53:d0:e5:c9:98:dd:75:cc:bb:38:27:70:19:66: a6:4a:62:29:ad:e7:37:b9:2f:14:5d:43:ab:a6:e0:a8: 9d:b2:c7:db:0a:bf:84:08:f5:76:36:7d:c9:47:2b:46: e9:1b:80:db:c9:d6:a6:cc:f3:ae:68:e8:45:30:17:fd: 75:d9:33:07:48:93:7e:e8:35:04:c5:be:a9:e6:ef:53: 07:98:af:69:d4:1e:c5:f3:f0:68:f1:52:9a:c9:e7:7f: e1:94:ef:f2:96:4b:8b:f5:df:b8:ed:d3:34:6b:d9:8c: 08:b7:58:1f:5c:a7:8d:d6:00:cc:48:13:75:7c:02:a9: 4f:5a:71:f7:3e:30:83:48:39:60:7e:f2:2c:77:25:9e: 38:e9:32:31:e5:98:7d:3f:de:a6:85:97:ed:19:44:f7: 80:98:8d:3b:2a:e9:34:e6:2b:12:fe:2e:2e:b6:e3:12 Fingerprint (SHA-256): E4:29:C4:87:A5:2C:D6:36:53:A6:D3:D3:F7:03:14:56:92:2E:BD:DC:A2:8D:3C:44:1C:96:9A:22:78:88:AA:B6 Fingerprint (SHA1): 2E:E9:D5:3F:AE:1D:EE:2E:19:46:45:AA:4A:CA:39:D1:BF:DB:36:11 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4829: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154337 (0x19575721) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:31:31 2016 Not After : Sun Apr 25 16:31:31 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:4c:ee:bd:9c:3d:37:5c:61:2e:67:7e:9b:f3:32:2f: 82:5a:cb:d4:95:99:52:10:bc:36:d7:f8:93:c3:3b:5c: 18:ca:d1:02:a1:55:ff:51:de:7d:46:71:4f:78:7c:92: 4d:36:77:11:75:78:76:e3:2e:68:ca:45:0a:63:8c:cb: 59:1c:80:2f:1d:50:d2:87:f0:11:c9:99:42:c1:6e:de: c9:a4:a5:66:a2:bd:81:87:36:05:3e:73:b4:43:45:e8: 4a:aa:6e:8d:71:f8:1b:26:ab:03:7d:0a:43:11:6d:db: 60:a5:20:b4:56:f7:7d:d5:ab:36:95:aa:04:cb:f7:8a: 86:82:f3:b5:d0:06:cf:ee:dc:97:04:32:38:cd:f4:c6: 33:8f:54:b2:c3:31:a8:df:0b:a8:af:02:74:5b:a8:d6: 44:8e:9c:24:c8:85:ae:6f:05:5e:40:54:4a:5c:cd:aa: 50:b1:f0:bc:8b:85:4e:2a:96:32:84:cf:5c:fc:0b:cd: 0a:2e:44:58:c6:7b:72:4b:33:8f:11:27:73:28:d2:f2: 4d:98:62:22:f6:f5:98:13:d4:fb:7b:6c:05:d7:3f:04: 0b:f6:8b:da:8a:7c:17:94:35:05:f8:2a:f6:e7:f8:e7: d9:db:1b:cf:4b:24:32:9c:de:6c:61:dd:57:1c:42:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:75:e2:2b:b1:40:d6:8a:c1:67:9a:ba:4b:8c:94:0f: dc:6c:f2:f5:d9:21:d6:0b:ef:3a:59:e4:0c:08:89:ae: cc:7b:6f:d2:26:1b:16:0b:2e:3f:fc:c1:fb:e7:0d:8e: 9c:c1:b8:3d:e9:1c:62:30:5a:3a:41:85:03:ae:52:34: ad:bf:18:cd:c6:05:f1:02:73:ab:92:8c:af:ec:23:87: d0:10:53:d0:e5:c9:98:dd:75:cc:bb:38:27:70:19:66: a6:4a:62:29:ad:e7:37:b9:2f:14:5d:43:ab:a6:e0:a8: 9d:b2:c7:db:0a:bf:84:08:f5:76:36:7d:c9:47:2b:46: e9:1b:80:db:c9:d6:a6:cc:f3:ae:68:e8:45:30:17:fd: 75:d9:33:07:48:93:7e:e8:35:04:c5:be:a9:e6:ef:53: 07:98:af:69:d4:1e:c5:f3:f0:68:f1:52:9a:c9:e7:7f: e1:94:ef:f2:96:4b:8b:f5:df:b8:ed:d3:34:6b:d9:8c: 08:b7:58:1f:5c:a7:8d:d6:00:cc:48:13:75:7c:02:a9: 4f:5a:71:f7:3e:30:83:48:39:60:7e:f2:2c:77:25:9e: 38:e9:32:31:e5:98:7d:3f:de:a6:85:97:ed:19:44:f7: 80:98:8d:3b:2a:e9:34:e6:2b:12:fe:2e:2e:b6:e3:12 Fingerprint (SHA-256): E4:29:C4:87:A5:2C:D6:36:53:A6:D3:D3:F7:03:14:56:92:2E:BD:DC:A2:8D:3C:44:1C:96:9A:22:78:88:AA:B6 Fingerprint (SHA1): 2E:E9:D5:3F:AE:1D:EE:2E:19:46:45:AA:4A:CA:39:D1:BF:DB:36:11 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4830: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4831: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154342 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4832: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4833: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4834: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154343 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4835: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4836: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4837: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4838: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425154344 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4839: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4840: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425154345 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4841: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4842: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #4843: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4844: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4845: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425154346 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425154113.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4846: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4847: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4848: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4849: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154347 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4850: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4851: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4852: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4853: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425154348 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-BridgeNavy-425154114.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #4854: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4855: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4856: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4857: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425154349 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4858: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4859: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #4860: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #4861: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154343 (0x19575727) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:32:13 2016 Not After : Sun Apr 25 16:32:13 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:86:1d:be:ae:0b:9e:f5:d0:e1:44:92:ec:0b:89:95: 50:00:a6:63:e4:1b:6f:bd:39:88:e8:a6:45:0d:2b:8b: 12:1e:7e:1d:e5:da:a3:8d:a3:bd:91:b6:7c:b3:9b:6c: 14:d6:23:0b:17:92:d7:e1:e5:dd:5b:85:eb:ba:5b:71: 8d:15:d5:30:4c:1e:eb:68:2e:52:11:55:5b:bc:ce:26: 91:02:20:0c:17:94:01:9d:e6:1c:56:7f:f4:44:d5:47: 91:29:71:b5:69:b0:46:e4:6e:0f:7e:a1:d0:bb:0b:cc: 78:fb:1a:46:41:1d:71:7d:4b:61:5d:05:23:d0:98:45: 66:15:25:ba:e7:df:6e:a1:9d:4d:54:11:e1:cc:19:f8: c9:1c:80:ac:c1:a2:1f:46:9e:9c:d1:21:c1:66:63:11: f1:09:fb:0f:2b:59:04:8d:45:b6:bd:15:3d:af:4f:07: 92:b5:a0:2f:66:55:0f:de:9f:18:da:88:2b:e6:8e:8f: 08:f3:26:4d:ba:07:af:a0:71:4a:09:7b:a4:12:1a:ed: 71:0b:df:4c:15:cd:fc:26:6b:79:25:4b:fc:53:17:c4: 98:b3:84:3e:d8:79:22:cb:35:7e:16:b8:15:97:37:41: 95:ba:35:a5:a4:80:c9:27:61:36:a0:52:19:9d:2b:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:4d:c3:78:17:8c:2f:15:36:e5:20:fe:49:c9:96:0b: ef:2d:17:a9:8b:65:34:e2:0d:7f:44:65:cf:44:5c:7c: a5:b2:88:ed:95:f5:a2:5e:47:6a:9f:d5:0d:2d:1d:c7: cc:7a:5b:51:45:0d:5d:ef:ba:8f:03:c5:05:cc:96:ed: 5c:e5:d1:01:d4:74:f6:4e:de:8b:33:a1:93:bc:53:c9: ca:17:c3:fb:94:a2:81:9b:20:74:33:02:fb:3f:c1:f1: e2:14:9a:84:15:ce:6e:5c:5c:3b:d7:01:ae:e3:17:b5: b7:54:65:49:e2:8e:8a:67:4f:e8:04:ea:90:17:e8:b3: 31:2a:f1:2b:a8:89:80:e5:93:ae:b2:38:fb:b0:59:95: bb:2f:87:2d:37:d1:2d:60:12:0b:d7:f8:d2:95:eb:2b: 1e:66:0a:05:e7:2c:3d:61:ed:8e:ff:33:22:33:46:e5: 9b:03:c1:a0:6f:d8:20:eb:ae:83:0e:cd:ac:24:36:bb: 7f:ec:e8:2f:63:0e:05:97:08:df:9f:0f:d3:30:ed:3b: 54:e0:e0:f1:51:16:3a:97:9c:44:76:a6:5a:9d:27:47: 90:ce:e2:7a:05:14:a6:82:21:36:eb:20:6c:ad:3e:40: 89:30:13:07:bc:20:1f:eb:e1:a7:72:2f:4e:04:49:93 Fingerprint (SHA-256): DD:98:1F:6F:E6:7A:F6:16:10:7C:06:C3:09:FD:57:DD:51:66:2B:78:FB:1A:9F:30:EF:04:20:26:44:52:97:93 Fingerprint (SHA1): F0:10:7B:B3:F5:9E:58:B3:75:17:DC:E7:40:1A:DC:2D:EF:E4:A6:64 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4862: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154343 (0x19575727) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:32:13 2016 Not After : Sun Apr 25 16:32:13 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:86:1d:be:ae:0b:9e:f5:d0:e1:44:92:ec:0b:89:95: 50:00:a6:63:e4:1b:6f:bd:39:88:e8:a6:45:0d:2b:8b: 12:1e:7e:1d:e5:da:a3:8d:a3:bd:91:b6:7c:b3:9b:6c: 14:d6:23:0b:17:92:d7:e1:e5:dd:5b:85:eb:ba:5b:71: 8d:15:d5:30:4c:1e:eb:68:2e:52:11:55:5b:bc:ce:26: 91:02:20:0c:17:94:01:9d:e6:1c:56:7f:f4:44:d5:47: 91:29:71:b5:69:b0:46:e4:6e:0f:7e:a1:d0:bb:0b:cc: 78:fb:1a:46:41:1d:71:7d:4b:61:5d:05:23:d0:98:45: 66:15:25:ba:e7:df:6e:a1:9d:4d:54:11:e1:cc:19:f8: c9:1c:80:ac:c1:a2:1f:46:9e:9c:d1:21:c1:66:63:11: f1:09:fb:0f:2b:59:04:8d:45:b6:bd:15:3d:af:4f:07: 92:b5:a0:2f:66:55:0f:de:9f:18:da:88:2b:e6:8e:8f: 08:f3:26:4d:ba:07:af:a0:71:4a:09:7b:a4:12:1a:ed: 71:0b:df:4c:15:cd:fc:26:6b:79:25:4b:fc:53:17:c4: 98:b3:84:3e:d8:79:22:cb:35:7e:16:b8:15:97:37:41: 95:ba:35:a5:a4:80:c9:27:61:36:a0:52:19:9d:2b:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:4d:c3:78:17:8c:2f:15:36:e5:20:fe:49:c9:96:0b: ef:2d:17:a9:8b:65:34:e2:0d:7f:44:65:cf:44:5c:7c: a5:b2:88:ed:95:f5:a2:5e:47:6a:9f:d5:0d:2d:1d:c7: cc:7a:5b:51:45:0d:5d:ef:ba:8f:03:c5:05:cc:96:ed: 5c:e5:d1:01:d4:74:f6:4e:de:8b:33:a1:93:bc:53:c9: ca:17:c3:fb:94:a2:81:9b:20:74:33:02:fb:3f:c1:f1: e2:14:9a:84:15:ce:6e:5c:5c:3b:d7:01:ae:e3:17:b5: b7:54:65:49:e2:8e:8a:67:4f:e8:04:ea:90:17:e8:b3: 31:2a:f1:2b:a8:89:80:e5:93:ae:b2:38:fb:b0:59:95: bb:2f:87:2d:37:d1:2d:60:12:0b:d7:f8:d2:95:eb:2b: 1e:66:0a:05:e7:2c:3d:61:ed:8e:ff:33:22:33:46:e5: 9b:03:c1:a0:6f:d8:20:eb:ae:83:0e:cd:ac:24:36:bb: 7f:ec:e8:2f:63:0e:05:97:08:df:9f:0f:d3:30:ed:3b: 54:e0:e0:f1:51:16:3a:97:9c:44:76:a6:5a:9d:27:47: 90:ce:e2:7a:05:14:a6:82:21:36:eb:20:6c:ad:3e:40: 89:30:13:07:bc:20:1f:eb:e1:a7:72:2f:4e:04:49:93 Fingerprint (SHA-256): DD:98:1F:6F:E6:7A:F6:16:10:7C:06:C3:09:FD:57:DD:51:66:2B:78:FB:1A:9F:30:EF:04:20:26:44:52:97:93 Fingerprint (SHA1): F0:10:7B:B3:F5:9E:58:B3:75:17:DC:E7:40:1A:DC:2D:EF:E4:A6:64 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4863: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #4864: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154342 (0x19575726) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 16:32:00 2016 Not After : Sun Apr 25 16:32:00 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:28:86:cb:db:07:e6:14:03:48:fd:29:62:f6:92:28: b3:b4:94:5f:f8:f3:ea:b0:46:3b:fd:af:c2:4e:09:89: 9e:0a:51:b1:f7:f2:32:1f:05:95:27:72:5e:e4:49:b6: 24:84:f1:50:25:9d:d0:96:32:24:76:96:fe:55:c3:5b: 4e:e2:0a:35:29:cd:8e:ae:d3:fe:38:3c:25:d9:17:bc: 81:74:08:cd:6d:cf:bb:d4:eb:4c:e3:25:38:e6:c1:bb: 35:8c:75:1e:c6:86:bb:52:4f:be:d2:63:6b:f8:86:3b: 30:03:39:a9:6b:5d:92:2a:50:f5:cc:a5:43:51:09:9d: 52:08:ac:c6:c8:31:7f:08:e4:3f:44:e9:c5:55:9f:0d: 55:19:2c:fb:13:84:01:76:79:13:18:c5:3d:a6:2c:6f: 15:d4:32:f3:1b:37:c6:6e:d1:ce:ee:8b:45:87:fb:c6: 09:4a:f6:6d:1e:97:01:d2:b3:17:b6:98:ec:45:ea:42: d5:95:2c:ec:d2:cf:94:b2:46:bb:f1:17:64:fa:8a:4b: fd:ec:eb:36:a0:ae:81:86:f6:1f:1c:ca:7b:26:47:cc: bf:ca:cc:b4:66:b0:49:62:38:e7:89:1f:a6:3b:f3:21: 9a:09:5f:22:e5:7e:07:4e:a4:4a:63:91:40:9e:97:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:eb:26:24:2b:2c:f4:b5:75:e8:76:a4:83:db:2e:90: 0c:b8:66:00:71:63:56:b8:82:6f:90:27:44:d8:49:0f: 11:44:cf:1f:6a:d0:85:39:3b:ff:26:db:9f:9c:aa:e5: 8a:94:64:27:08:c3:27:79:60:6b:8f:f8:96:85:c8:a7: 4d:09:1b:39:19:cb:58:23:39:b7:5e:fe:4f:d7:52:5f: 7c:be:30:b5:16:d3:46:4e:de:8a:4a:74:44:3b:fd:4b: e0:bf:c8:4e:94:27:54:19:64:c1:a0:16:d4:7c:a1:9a: 1b:40:8d:a4:03:68:57:84:c7:5e:7e:9d:b8:67:21:df: c6:e4:aa:f1:f8:8d:aa:97:a0:22:31:02:91:f3:8b:0d: f5:03:56:82:f1:62:43:a5:4c:91:c0:e7:ac:3d:c0:46: 3d:f0:b1:94:38:ef:f7:aa:02:c3:ef:ac:1a:13:79:6f: 8f:90:e4:d3:2b:29:28:19:cd:29:06:75:b0:63:49:67: 69:30:47:cc:9a:6c:ce:50:ec:7a:bd:f3:54:11:1c:a5: 5e:1d:f5:0a:04:d4:14:72:81:0a:72:9e:ca:3e:aa:59: 52:af:12:6c:f3:ff:17:3a:d7:53:07:fe:21:0e:95:e5: da:2d:69:28:92:ae:fe:b6:9c:fd:a9:38:fd:3e:53:9c Fingerprint (SHA-256): 64:83:D4:B4:C4:38:E3:69:12:DC:06:E8:6D:AD:4B:E5:9B:3E:81:8D:54:A3:59:DE:43:B1:4E:F7:5D:E7:B2:82 Fingerprint (SHA1): C2:CC:D5:A4:C6:A8:A0:DC:D5:8C:CC:9B:7D:87:E9:8D:8E:A1:4A:42 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4865: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154343 (0x19575727) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:32:13 2016 Not After : Sun Apr 25 16:32:13 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:86:1d:be:ae:0b:9e:f5:d0:e1:44:92:ec:0b:89:95: 50:00:a6:63:e4:1b:6f:bd:39:88:e8:a6:45:0d:2b:8b: 12:1e:7e:1d:e5:da:a3:8d:a3:bd:91:b6:7c:b3:9b:6c: 14:d6:23:0b:17:92:d7:e1:e5:dd:5b:85:eb:ba:5b:71: 8d:15:d5:30:4c:1e:eb:68:2e:52:11:55:5b:bc:ce:26: 91:02:20:0c:17:94:01:9d:e6:1c:56:7f:f4:44:d5:47: 91:29:71:b5:69:b0:46:e4:6e:0f:7e:a1:d0:bb:0b:cc: 78:fb:1a:46:41:1d:71:7d:4b:61:5d:05:23:d0:98:45: 66:15:25:ba:e7:df:6e:a1:9d:4d:54:11:e1:cc:19:f8: c9:1c:80:ac:c1:a2:1f:46:9e:9c:d1:21:c1:66:63:11: f1:09:fb:0f:2b:59:04:8d:45:b6:bd:15:3d:af:4f:07: 92:b5:a0:2f:66:55:0f:de:9f:18:da:88:2b:e6:8e:8f: 08:f3:26:4d:ba:07:af:a0:71:4a:09:7b:a4:12:1a:ed: 71:0b:df:4c:15:cd:fc:26:6b:79:25:4b:fc:53:17:c4: 98:b3:84:3e:d8:79:22:cb:35:7e:16:b8:15:97:37:41: 95:ba:35:a5:a4:80:c9:27:61:36:a0:52:19:9d:2b:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:4d:c3:78:17:8c:2f:15:36:e5:20:fe:49:c9:96:0b: ef:2d:17:a9:8b:65:34:e2:0d:7f:44:65:cf:44:5c:7c: a5:b2:88:ed:95:f5:a2:5e:47:6a:9f:d5:0d:2d:1d:c7: cc:7a:5b:51:45:0d:5d:ef:ba:8f:03:c5:05:cc:96:ed: 5c:e5:d1:01:d4:74:f6:4e:de:8b:33:a1:93:bc:53:c9: ca:17:c3:fb:94:a2:81:9b:20:74:33:02:fb:3f:c1:f1: e2:14:9a:84:15:ce:6e:5c:5c:3b:d7:01:ae:e3:17:b5: b7:54:65:49:e2:8e:8a:67:4f:e8:04:ea:90:17:e8:b3: 31:2a:f1:2b:a8:89:80:e5:93:ae:b2:38:fb:b0:59:95: bb:2f:87:2d:37:d1:2d:60:12:0b:d7:f8:d2:95:eb:2b: 1e:66:0a:05:e7:2c:3d:61:ed:8e:ff:33:22:33:46:e5: 9b:03:c1:a0:6f:d8:20:eb:ae:83:0e:cd:ac:24:36:bb: 7f:ec:e8:2f:63:0e:05:97:08:df:9f:0f:d3:30:ed:3b: 54:e0:e0:f1:51:16:3a:97:9c:44:76:a6:5a:9d:27:47: 90:ce:e2:7a:05:14:a6:82:21:36:eb:20:6c:ad:3e:40: 89:30:13:07:bc:20:1f:eb:e1:a7:72:2f:4e:04:49:93 Fingerprint (SHA-256): DD:98:1F:6F:E6:7A:F6:16:10:7C:06:C3:09:FD:57:DD:51:66:2B:78:FB:1A:9F:30:EF:04:20:26:44:52:97:93 Fingerprint (SHA1): F0:10:7B:B3:F5:9E:58:B3:75:17:DC:E7:40:1A:DC:2D:EF:E4:A6:64 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4866: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154343 (0x19575727) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:32:13 2016 Not After : Sun Apr 25 16:32:13 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:86:1d:be:ae:0b:9e:f5:d0:e1:44:92:ec:0b:89:95: 50:00:a6:63:e4:1b:6f:bd:39:88:e8:a6:45:0d:2b:8b: 12:1e:7e:1d:e5:da:a3:8d:a3:bd:91:b6:7c:b3:9b:6c: 14:d6:23:0b:17:92:d7:e1:e5:dd:5b:85:eb:ba:5b:71: 8d:15:d5:30:4c:1e:eb:68:2e:52:11:55:5b:bc:ce:26: 91:02:20:0c:17:94:01:9d:e6:1c:56:7f:f4:44:d5:47: 91:29:71:b5:69:b0:46:e4:6e:0f:7e:a1:d0:bb:0b:cc: 78:fb:1a:46:41:1d:71:7d:4b:61:5d:05:23:d0:98:45: 66:15:25:ba:e7:df:6e:a1:9d:4d:54:11:e1:cc:19:f8: c9:1c:80:ac:c1:a2:1f:46:9e:9c:d1:21:c1:66:63:11: f1:09:fb:0f:2b:59:04:8d:45:b6:bd:15:3d:af:4f:07: 92:b5:a0:2f:66:55:0f:de:9f:18:da:88:2b:e6:8e:8f: 08:f3:26:4d:ba:07:af:a0:71:4a:09:7b:a4:12:1a:ed: 71:0b:df:4c:15:cd:fc:26:6b:79:25:4b:fc:53:17:c4: 98:b3:84:3e:d8:79:22:cb:35:7e:16:b8:15:97:37:41: 95:ba:35:a5:a4:80:c9:27:61:36:a0:52:19:9d:2b:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:4d:c3:78:17:8c:2f:15:36:e5:20:fe:49:c9:96:0b: ef:2d:17:a9:8b:65:34:e2:0d:7f:44:65:cf:44:5c:7c: a5:b2:88:ed:95:f5:a2:5e:47:6a:9f:d5:0d:2d:1d:c7: cc:7a:5b:51:45:0d:5d:ef:ba:8f:03:c5:05:cc:96:ed: 5c:e5:d1:01:d4:74:f6:4e:de:8b:33:a1:93:bc:53:c9: ca:17:c3:fb:94:a2:81:9b:20:74:33:02:fb:3f:c1:f1: e2:14:9a:84:15:ce:6e:5c:5c:3b:d7:01:ae:e3:17:b5: b7:54:65:49:e2:8e:8a:67:4f:e8:04:ea:90:17:e8:b3: 31:2a:f1:2b:a8:89:80:e5:93:ae:b2:38:fb:b0:59:95: bb:2f:87:2d:37:d1:2d:60:12:0b:d7:f8:d2:95:eb:2b: 1e:66:0a:05:e7:2c:3d:61:ed:8e:ff:33:22:33:46:e5: 9b:03:c1:a0:6f:d8:20:eb:ae:83:0e:cd:ac:24:36:bb: 7f:ec:e8:2f:63:0e:05:97:08:df:9f:0f:d3:30:ed:3b: 54:e0:e0:f1:51:16:3a:97:9c:44:76:a6:5a:9d:27:47: 90:ce:e2:7a:05:14:a6:82:21:36:eb:20:6c:ad:3e:40: 89:30:13:07:bc:20:1f:eb:e1:a7:72:2f:4e:04:49:93 Fingerprint (SHA-256): DD:98:1F:6F:E6:7A:F6:16:10:7C:06:C3:09:FD:57:DD:51:66:2B:78:FB:1A:9F:30:EF:04:20:26:44:52:97:93 Fingerprint (SHA1): F0:10:7B:B3:F5:9E:58:B3:75:17:DC:E7:40:1A:DC:2D:EF:E4:A6:64 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #4867: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #4868: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154350 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4869: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #4870: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #4871: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154351 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4872: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #4873: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #4874: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4875: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 425154352 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4876: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4877: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #4878: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4879: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 425154353 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4880: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4881: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #4882: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4883: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 425154354 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4884: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4885: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 425154355 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #4886: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4887: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #4888: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4889: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4890: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425154356 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4891: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4892: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4893: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4894: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425154357 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4895: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4896: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4897: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4898: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154358 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4899: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4900: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4901: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4902: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425154359 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #4903: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4904: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4905: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154350 (0x1957572e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 16:33:33 2016 Not After : Sun Apr 25 16:33:33 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:1c:41:e7:4a:7b:1f:e5:43:09:89:03:d0:a8:6c:b0: 80:71:06:0e:0f:a5:59:5c:dd:d7:ca:f9:46:5b:48:3d: 2a:72:79:e7:21:8a:e2:01:c6:87:c7:29:9d:ec:81:86: e0:e9:51:9e:8d:3c:5f:fe:0c:b2:f7:b4:14:5c:84:87: 62:1d:f5:a8:80:93:2f:82:49:0b:9b:d7:9e:57:61:12: 23:39:aa:b9:c3:d5:02:36:c5:e8:1c:90:25:d5:3f:fb: c7:f6:22:d7:93:0f:6d:9a:88:57:2d:94:c4:81:1b:1d: 66:c6:e5:aa:8e:64:5d:16:e0:85:42:52:12:26:17:dc: dc:09:d6:2f:4c:6f:a1:54:3e:8e:cd:13:62:c3:27:5a: 6c:76:b0:53:b3:76:c4:dd:c0:0c:1a:c2:9e:0a:d2:bd: f8:08:96:e2:e2:b8:e2:d3:a3:9b:7f:1e:29:77:7d:15: 31:14:54:cd:6e:e7:cd:ef:ea:77:fd:d2:24:09:61:05: d7:90:ae:1c:56:33:ff:c2:fa:80:a3:88:2b:5d:41:f6: a1:99:f6:c2:78:91:e4:fd:30:c4:c3:8e:0c:07:49:56: cf:7b:93:b9:cf:a5:54:34:0c:4b:a4:dd:ab:dc:45:d7: 75:46:d7:2a:42:08:93:9e:3c:3a:de:39:91:98:06:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:9f:c2:f4:b5:6c:80:11:56:6f:70:ca:03:3f:7d:40: 8a:f2:39:85:fb:4d:97:e9:da:f0:5f:b9:ff:ba:8c:e8: 80:c8:02:7b:40:18:fa:34:76:dd:2b:db:8b:5f:7f:30: 1b:81:2c:50:92:fd:bc:ff:1c:92:e2:99:aa:c0:01:a9: ba:bd:df:06:67:a6:44:f9:91:19:bb:31:43:8e:a5:90: d0:ff:a8:11:e8:f7:5a:f3:9d:a3:05:b3:53:0f:1e:cf: 11:f1:4f:db:8f:51:47:fa:a6:27:04:71:9a:03:58:84: 24:a1:56:f5:5f:a7:57:03:d2:c3:dc:59:2f:75:14:de: c0:e1:18:aa:b6:14:51:f8:2c:55:df:c3:1f:0d:b9:24: 4f:c5:08:aa:71:b6:ba:49:a9:b6:65:4b:8c:dc:e7:a2: 1b:0e:e6:86:2e:88:78:47:ec:a0:3d:6c:85:f1:f7:d6: f7:11:5f:71:db:51:92:2a:c6:ee:a5:7a:9d:10:69:f2: 81:eb:5f:3d:81:8d:fb:58:38:49:35:c2:61:50:b2:d5: c8:4a:44:bf:9c:82:94:0e:39:ad:13:92:fe:51:1c:3b: 22:08:9d:04:82:0a:85:38:6b:e6:63:1f:54:f9:14:d2: 28:bd:0d:cc:82:a2:2d:d5:c0:c9:47:3d:50:4c:b3:c4 Fingerprint (SHA-256): 89:D0:D8:28:2D:58:DD:76:AC:19:A0:7D:6B:9B:02:98:72:5C:99:1B:B3:BD:DA:D2:EF:0E:0D:0C:00:AE:4F:F1 Fingerprint (SHA1): 92:66:37:9F:4A:CE:72:76:E5:3E:24:C5:57:04:08:21:2C:E4:F0:4F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #4906: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4907: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4908: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4909: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4910: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4911: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4912: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4913: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4914: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154351 (0x1957572f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 16:33:51 2016 Not After : Sun Apr 25 16:33:51 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:ec:d4:af:c3:83:da:fb:30:c2:25:31:1a:3c:67:d8: 4f:5c:54:c7:aa:85:80:14:a7:24:ce:de:f6:42:96:38: 23:17:73:dd:b4:be:fc:2f:63:cb:23:6f:3c:62:bb:7d: 63:38:02:66:06:85:42:da:07:16:c3:bf:dc:91:34:07: 48:1b:61:92:58:a4:bf:4d:08:8f:11:08:7e:2c:b9:f1: 25:c8:a5:7b:d8:84:6c:12:ab:47:b5:91:e7:be:0a:a5: 50:2f:da:44:cf:85:a3:3e:74:e5:38:14:68:a0:d5:aa: 09:32:21:d3:91:25:e0:9b:d5:ec:37:13:4d:68:cb:18: fb:cb:86:9a:b4:2a:5f:c9:00:76:08:d0:3e:c6:fc:91: 9d:20:12:30:eb:1f:26:d4:4f:5b:ef:a5:9b:61:13:70: b5:08:50:e0:7d:4e:32:c6:fc:62:07:0a:89:b5:18:02: 30:2e:5e:d7:eb:9b:77:97:b9:ea:b0:13:ab:a5:4f:f6: aa:4e:2c:c2:0f:c6:53:7e:3b:9a:c6:16:5c:a6:93:e4: 00:34:f1:62:de:bf:38:fb:c5:77:f8:b8:57:70:bc:4f: fb:50:f4:9c:5b:6d:99:16:44:9a:a5:11:f4:f9:04:e0: 5b:1a:1b:b7:6e:2a:ee:ef:2d:c3:81:fe:fc:8b:0f:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:2e:b4:63:4a:ff:ed:23:1c:df:99:dc:47:5e:27:9a: 28:91:80:e1:d0:a7:39:3b:5c:3f:aa:4a:34:d7:b0:57: 16:08:23:f9:8b:c0:c5:0f:46:3b:8c:ee:59:b1:32:21: 6a:15:3d:1a:76:76:25:65:0e:64:65:b6:b5:28:d1:0e: 10:28:aa:68:36:10:be:ad:1e:f6:c1:85:99:19:ca:f4: 9e:d5:ac:75:6f:95:9a:03:b9:20:c9:b7:32:34:55:9a: e6:c2:50:14:4d:f6:71:c2:1b:61:41:f7:14:69:35:3a: 36:74:0c:02:5d:ef:e8:60:5a:08:ac:3b:4f:54:8c:4f: c9:61:f7:70:78:65:53:b5:2c:2d:02:a2:e7:f6:89:ae: 34:ae:06:ab:8b:7a:8c:ed:46:01:11:c7:5b:6f:2a:a6: eb:67:1d:4e:66:6a:39:6e:5a:a4:aa:59:6e:fa:13:f3: b5:2e:b2:1c:c2:e4:d4:4c:52:70:65:3a:2e:a0:56:30: f2:19:47:42:3b:42:ae:d9:06:f2:0b:74:bc:b8:18:90: 65:44:b6:c1:66:90:c1:1e:6b:c9:b8:76:89:8d:62:37: c9:ab:df:48:34:7d:0b:88:fa:d4:b4:af:70:64:de:28: ba:c7:00:11:ef:2e:30:3d:a0:23:4a:19:51:ed:9a:cd Fingerprint (SHA-256): C8:C4:81:7C:1F:94:8C:0D:E5:14:E8:BA:C8:A1:E3:8B:90:3F:AE:D8:82:89:64:5C:19:C8:80:5E:C3:4A:B5:47 Fingerprint (SHA1): 0F:B9:DB:7A:03:CE:0B:FA:E8:7D:FB:82:92:35:26:C1:CC:3E:19:56 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #4915: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4916: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4917: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4918: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4919: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #4920: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4921: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #4922: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #4923: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #4924: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #4925: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #4926: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #4927: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #4928: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #4929: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #4930: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #4931: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #4932: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4933: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154360 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4934: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4935: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4936: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4937: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425154361 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4938: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4939: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #4940: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4941: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425154362 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4942: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4943: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4944: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4945: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 425154363 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4946: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4947: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #4948: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4949: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425154364 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4950: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4951: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #4952: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4953: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 425154365 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4954: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4955: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #4956: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4957: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 425154366 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4958: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4959: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #4960: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4961: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 425154367 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4962: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4963: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #4964: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4965: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 425154368 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4966: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4967: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #4968: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154360 (0x19575738) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:35:36 2016 Not After : Sun Apr 25 16:35:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: ac:58:81:18:55:09:f4:93:68:a8:cf:76:db:50:44:04: 0f:1d:5e:f7:12:66:de:20:91:56:f2:65:af:e3:3e:1a: 1a:2d:ae:74:3b:2e:5c:fd:6d:4b:41:86:e5:cc:e3:27: b7:14:79:c2:27:aa:42:70:29:08:dd:70:90:5f:2f:eb: 76:06:d6:02:27:72:44:6c:83:df:86:fb:93:34:97:2e: 84:d5:bd:cd:e6:38:6e:99:b9:7c:f8:70:48:21:41:9a: e2:69:b3:cd:f0:2c:dc:de:80:f0:84:39:ba:2e:e6:62: 23:db:40:af:b6:ec:cb:a9:3b:b2:f8:48:1b:e7:fc:01: 79:a0:81:88:2f:01:47:b3:74:df:57:c4:9d:07:64:2e: 87:b2:db:b5:1c:46:31:e5:11:c3:7c:48:ef:81:42:c4: f8:5d:a1:68:b8:31:71:11:57:37:4c:d6:67:18:f8:f3: 2f:c5:41:7b:b1:b0:16:9a:f4:38:73:8c:0a:20:36:83: da:9f:9e:cd:4b:7b:e9:a3:9a:a5:68:0d:33:6d:0d:9a: 88:55:41:7a:9a:41:78:89:56:2d:56:e4:3d:66:c5:f5: 52:a1:3a:f1:30:78:35:c8:e9:5e:6e:f2:b8:dd:04:1c: 0b:ae:7b:04:2f:ea:9e:69:5e:34:08:03:36:d6:6e:9e Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:d9:e7:1d:3b:ca:e5:d1:4c:49:6c:b6: 18:07:5f:af:3b:f3:66:01:11:90:69:8b:4c:d5:cd:fb: c0:02:1c:04:cc:6e:8a:b4:46:f9:0f:f5:60:b5:93:d1: fc:9a:28:3d:46:ed:3c:32:fd:cf:c5:6c:ab:89:f4 Fingerprint (SHA-256): B3:4F:8B:67:64:5F:3D:8B:9E:87:04:DF:B6:24:AE:4F:7E:36:B4:A0:F9:97:72:F4:FC:B2:53:FF:3C:1C:00:E5 Fingerprint (SHA1): D1:D2:22:60:65:4A:29:60:6D:5F:71:5E:6C:F7:79:C8:E2:98:E9:9F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #4969: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154360 (0x19575738) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:35:36 2016 Not After : Sun Apr 25 16:35:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: ac:58:81:18:55:09:f4:93:68:a8:cf:76:db:50:44:04: 0f:1d:5e:f7:12:66:de:20:91:56:f2:65:af:e3:3e:1a: 1a:2d:ae:74:3b:2e:5c:fd:6d:4b:41:86:e5:cc:e3:27: b7:14:79:c2:27:aa:42:70:29:08:dd:70:90:5f:2f:eb: 76:06:d6:02:27:72:44:6c:83:df:86:fb:93:34:97:2e: 84:d5:bd:cd:e6:38:6e:99:b9:7c:f8:70:48:21:41:9a: e2:69:b3:cd:f0:2c:dc:de:80:f0:84:39:ba:2e:e6:62: 23:db:40:af:b6:ec:cb:a9:3b:b2:f8:48:1b:e7:fc:01: 79:a0:81:88:2f:01:47:b3:74:df:57:c4:9d:07:64:2e: 87:b2:db:b5:1c:46:31:e5:11:c3:7c:48:ef:81:42:c4: f8:5d:a1:68:b8:31:71:11:57:37:4c:d6:67:18:f8:f3: 2f:c5:41:7b:b1:b0:16:9a:f4:38:73:8c:0a:20:36:83: da:9f:9e:cd:4b:7b:e9:a3:9a:a5:68:0d:33:6d:0d:9a: 88:55:41:7a:9a:41:78:89:56:2d:56:e4:3d:66:c5:f5: 52:a1:3a:f1:30:78:35:c8:e9:5e:6e:f2:b8:dd:04:1c: 0b:ae:7b:04:2f:ea:9e:69:5e:34:08:03:36:d6:6e:9e Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:d9:e7:1d:3b:ca:e5:d1:4c:49:6c:b6: 18:07:5f:af:3b:f3:66:01:11:90:69:8b:4c:d5:cd:fb: c0:02:1c:04:cc:6e:8a:b4:46:f9:0f:f5:60:b5:93:d1: fc:9a:28:3d:46:ed:3c:32:fd:cf:c5:6c:ab:89:f4 Fingerprint (SHA-256): B3:4F:8B:67:64:5F:3D:8B:9E:87:04:DF:B6:24:AE:4F:7E:36:B4:A0:F9:97:72:F4:FC:B2:53:FF:3C:1C:00:E5 Fingerprint (SHA1): D1:D2:22:60:65:4A:29:60:6D:5F:71:5E:6C:F7:79:C8:E2:98:E9:9F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #4970: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154360 (0x19575738) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:35:36 2016 Not After : Sun Apr 25 16:35:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: ac:58:81:18:55:09:f4:93:68:a8:cf:76:db:50:44:04: 0f:1d:5e:f7:12:66:de:20:91:56:f2:65:af:e3:3e:1a: 1a:2d:ae:74:3b:2e:5c:fd:6d:4b:41:86:e5:cc:e3:27: b7:14:79:c2:27:aa:42:70:29:08:dd:70:90:5f:2f:eb: 76:06:d6:02:27:72:44:6c:83:df:86:fb:93:34:97:2e: 84:d5:bd:cd:e6:38:6e:99:b9:7c:f8:70:48:21:41:9a: e2:69:b3:cd:f0:2c:dc:de:80:f0:84:39:ba:2e:e6:62: 23:db:40:af:b6:ec:cb:a9:3b:b2:f8:48:1b:e7:fc:01: 79:a0:81:88:2f:01:47:b3:74:df:57:c4:9d:07:64:2e: 87:b2:db:b5:1c:46:31:e5:11:c3:7c:48:ef:81:42:c4: f8:5d:a1:68:b8:31:71:11:57:37:4c:d6:67:18:f8:f3: 2f:c5:41:7b:b1:b0:16:9a:f4:38:73:8c:0a:20:36:83: da:9f:9e:cd:4b:7b:e9:a3:9a:a5:68:0d:33:6d:0d:9a: 88:55:41:7a:9a:41:78:89:56:2d:56:e4:3d:66:c5:f5: 52:a1:3a:f1:30:78:35:c8:e9:5e:6e:f2:b8:dd:04:1c: 0b:ae:7b:04:2f:ea:9e:69:5e:34:08:03:36:d6:6e:9e Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:d9:e7:1d:3b:ca:e5:d1:4c:49:6c:b6: 18:07:5f:af:3b:f3:66:01:11:90:69:8b:4c:d5:cd:fb: c0:02:1c:04:cc:6e:8a:b4:46:f9:0f:f5:60:b5:93:d1: fc:9a:28:3d:46:ed:3c:32:fd:cf:c5:6c:ab:89:f4 Fingerprint (SHA-256): B3:4F:8B:67:64:5F:3D:8B:9E:87:04:DF:B6:24:AE:4F:7E:36:B4:A0:F9:97:72:F4:FC:B2:53:FF:3C:1C:00:E5 Fingerprint (SHA1): D1:D2:22:60:65:4A:29:60:6D:5F:71:5E:6C:F7:79:C8:E2:98:E9:9F Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #4971: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154360 (0x19575738) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:35:36 2016 Not After : Sun Apr 25 16:35:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: ac:58:81:18:55:09:f4:93:68:a8:cf:76:db:50:44:04: 0f:1d:5e:f7:12:66:de:20:91:56:f2:65:af:e3:3e:1a: 1a:2d:ae:74:3b:2e:5c:fd:6d:4b:41:86:e5:cc:e3:27: b7:14:79:c2:27:aa:42:70:29:08:dd:70:90:5f:2f:eb: 76:06:d6:02:27:72:44:6c:83:df:86:fb:93:34:97:2e: 84:d5:bd:cd:e6:38:6e:99:b9:7c:f8:70:48:21:41:9a: e2:69:b3:cd:f0:2c:dc:de:80:f0:84:39:ba:2e:e6:62: 23:db:40:af:b6:ec:cb:a9:3b:b2:f8:48:1b:e7:fc:01: 79:a0:81:88:2f:01:47:b3:74:df:57:c4:9d:07:64:2e: 87:b2:db:b5:1c:46:31:e5:11:c3:7c:48:ef:81:42:c4: f8:5d:a1:68:b8:31:71:11:57:37:4c:d6:67:18:f8:f3: 2f:c5:41:7b:b1:b0:16:9a:f4:38:73:8c:0a:20:36:83: da:9f:9e:cd:4b:7b:e9:a3:9a:a5:68:0d:33:6d:0d:9a: 88:55:41:7a:9a:41:78:89:56:2d:56:e4:3d:66:c5:f5: 52:a1:3a:f1:30:78:35:c8:e9:5e:6e:f2:b8:dd:04:1c: 0b:ae:7b:04:2f:ea:9e:69:5e:34:08:03:36:d6:6e:9e Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1d:00:d9:e7:1d:3b:ca:e5:d1:4c:49:6c:b6: 18:07:5f:af:3b:f3:66:01:11:90:69:8b:4c:d5:cd:fb: c0:02:1c:04:cc:6e:8a:b4:46:f9:0f:f5:60:b5:93:d1: fc:9a:28:3d:46:ed:3c:32:fd:cf:c5:6c:ab:89:f4 Fingerprint (SHA-256): B3:4F:8B:67:64:5F:3D:8B:9E:87:04:DF:B6:24:AE:4F:7E:36:B4:A0:F9:97:72:F4:FC:B2:53:FF:3C:1C:00:E5 Fingerprint (SHA1): D1:D2:22:60:65:4A:29:60:6D:5F:71:5E:6C:F7:79:C8:E2:98:E9:9F Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #4972: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #4973: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #4974: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #4975: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #4976: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4977: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4978: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4979: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #4980: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4981: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4982: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4983: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #4984: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4985: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4986: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4987: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #4988: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4989: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4990: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4991: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #4992: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #4993: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4994: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4995: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #4996: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #4997: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #4998: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #4999: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425163758Z nextupdate=20170425163758Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 16:37:58 2016 Next Update: Tue Apr 25 16:37:58 2017 CRL Extensions: chains.sh: #5000: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425163759Z nextupdate=20170425163759Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:37:59 2016 Next Update: Tue Apr 25 16:37:59 2017 CRL Extensions: chains.sh: #5001: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425163759Z nextupdate=20170425163800Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 16:37:59 2016 Next Update: Tue Apr 25 16:38:00 2017 CRL Extensions: chains.sh: #5002: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425163800Z nextupdate=20170425163800Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 16:38:00 2016 Next Update: Tue Apr 25 16:38:00 2017 CRL Extensions: chains.sh: #5003: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425163801Z addcert 14 20160425163801Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 16:38:01 2016 Next Update: Tue Apr 25 16:38:00 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Apr 25 16:38:01 2016 CRL Extensions: chains.sh: #5004: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425163802Z addcert 15 20160425163802Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:38:02 2016 Next Update: Tue Apr 25 16:37:59 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Apr 25 16:38:02 2016 CRL Extensions: chains.sh: #5005: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5006: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5007: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5008: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #5009: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #5010: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #5011: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #5012: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #5013: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #5014: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:36:36 2016 Not After : Sun Apr 25 16:36:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:33:27:31:7a:d2:ad:a7:d2:12:05:55:79:8d:7c:fc: 91:5f:5b:6f:8b:29:1d:39:96:77:db:54:0b:54:9a:b6: fa:75:0f:9f:4f:ba:cc:c6:fe:82:2e:0f:13:c2:eb:9f: b3:0f:3a:d0:f8:58:81:37:cd:95:67:b5:d1:b8:5e:08: ce:c2:17:7b:67:a0:fe:45:0c:86:ed:b2:d9:e5:0d:9d: 4b:20:20:5e:4e:48:55:2d:cf:49:7f:a0:9d:51:89:cf: 4a:58:e8:9d:8d:9a:06:c5:99:e4:40:56:54:8e:86:91: 76:4b:d0:32:93:72:0c:e8:ad:e9:c7:9f:ed:ca:f5:9b: 43:74:c8:80:a8:30:1c:d0:a0:97:bf:f2:03:b4:e9:4a: d8:11:67:b3:68:9c:07:e6:9d:6a:fd:72:aa:3b:eb:7d: cb:f7:73:09:17:5f:52:0e:4b:97:50:6a:75:ba:d3:73: 55:b4:7b:95:aa:c2:4f:80:2b:36:4f:eb:26:84:45:3d: fc:9c:27:59:82:b4:1e:48:83:68:08:40:b6:1c:2a:9d: f7:31:12:2a:0f:ef:30:55:78:62:db:ed:7c:c5:0c:79: ef:b4:41:30:c5:1b:e6:12:3a:db:b4:0c:a3:91:28:56: 05:85:9e:dc:32:37:c8:89:1c:8d:ff:bc:f7:99:32:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:37:97:d3:7b:49:13:21:5a:5c:e8:ca:72:5b:55:0f: d7:e0:25:f4:9b:ea:90:fc:d2:ce:5f:c6:80:c0:a5:74: d1:98:61:83:77:db:22:c8:69:d1:e3:85:1d:f7:bd:4d: da:cc:4c:98:6c:3d:92:f4:62:18:df:f0:1e:13:b1:7b: 09:e2:1f:8a:9a:16:42:29:48:e6:6e:01:fe:7f:59:40: 2a:69:d6:0a:9e:90:58:bd:ab:d0:ab:26:45:6d:88:76: bd:17:d9:fd:f0:fc:3a:4e:64:df:a2:3e:e1:fc:48:2f: 39:a1:f8:09:43:77:93:24:48:83:ae:56:15:6d:1e:04: eb:12:77:47:59:0a:2c:cf:00:4b:9e:72:de:e5:4e:86: bc:02:e5:69:c9:a0:98:6e:9b:e7:72:10:0b:3f:92:40: f1:02:70:5d:ab:38:24:92:09:72:7b:a9:28:05:f5:94: 3f:b3:40:44:ee:f9:2d:24:6f:26:91:f9:da:46:de:c8: fb:f4:9e:de:fb:62:a6:86:94:c6:c6:d7:81:dd:a8:e5: 95:02:12:26:8e:05:3d:cf:93:89:5e:b3:f1:65:06:c9: 2c:57:19:95:80:fd:1c:7b:eb:c5:8d:d1:84:cb:a5:46: e4:d9:ef:74:5c:2b:89:9a:d8:40:b0:ca:3f:12:c5:2c Fingerprint (SHA-256): C7:D8:45:78:11:1E:2D:5D:67:CE:83:CB:BE:4D:89:49:3D:82:68:0C:63:F6:12:61:22:67:18:AE:EC:5A:FD:A8 Fingerprint (SHA1): CD:34:19:96:24:BF:C3:65:45:62:5F:F6:C8:2E:2F:2E:25:50:98:3C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5015: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5016: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:36:36 2016 Not After : Sun Apr 25 16:36:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:33:27:31:7a:d2:ad:a7:d2:12:05:55:79:8d:7c:fc: 91:5f:5b:6f:8b:29:1d:39:96:77:db:54:0b:54:9a:b6: fa:75:0f:9f:4f:ba:cc:c6:fe:82:2e:0f:13:c2:eb:9f: b3:0f:3a:d0:f8:58:81:37:cd:95:67:b5:d1:b8:5e:08: ce:c2:17:7b:67:a0:fe:45:0c:86:ed:b2:d9:e5:0d:9d: 4b:20:20:5e:4e:48:55:2d:cf:49:7f:a0:9d:51:89:cf: 4a:58:e8:9d:8d:9a:06:c5:99:e4:40:56:54:8e:86:91: 76:4b:d0:32:93:72:0c:e8:ad:e9:c7:9f:ed:ca:f5:9b: 43:74:c8:80:a8:30:1c:d0:a0:97:bf:f2:03:b4:e9:4a: d8:11:67:b3:68:9c:07:e6:9d:6a:fd:72:aa:3b:eb:7d: cb:f7:73:09:17:5f:52:0e:4b:97:50:6a:75:ba:d3:73: 55:b4:7b:95:aa:c2:4f:80:2b:36:4f:eb:26:84:45:3d: fc:9c:27:59:82:b4:1e:48:83:68:08:40:b6:1c:2a:9d: f7:31:12:2a:0f:ef:30:55:78:62:db:ed:7c:c5:0c:79: ef:b4:41:30:c5:1b:e6:12:3a:db:b4:0c:a3:91:28:56: 05:85:9e:dc:32:37:c8:89:1c:8d:ff:bc:f7:99:32:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:37:97:d3:7b:49:13:21:5a:5c:e8:ca:72:5b:55:0f: d7:e0:25:f4:9b:ea:90:fc:d2:ce:5f:c6:80:c0:a5:74: d1:98:61:83:77:db:22:c8:69:d1:e3:85:1d:f7:bd:4d: da:cc:4c:98:6c:3d:92:f4:62:18:df:f0:1e:13:b1:7b: 09:e2:1f:8a:9a:16:42:29:48:e6:6e:01:fe:7f:59:40: 2a:69:d6:0a:9e:90:58:bd:ab:d0:ab:26:45:6d:88:76: bd:17:d9:fd:f0:fc:3a:4e:64:df:a2:3e:e1:fc:48:2f: 39:a1:f8:09:43:77:93:24:48:83:ae:56:15:6d:1e:04: eb:12:77:47:59:0a:2c:cf:00:4b:9e:72:de:e5:4e:86: bc:02:e5:69:c9:a0:98:6e:9b:e7:72:10:0b:3f:92:40: f1:02:70:5d:ab:38:24:92:09:72:7b:a9:28:05:f5:94: 3f:b3:40:44:ee:f9:2d:24:6f:26:91:f9:da:46:de:c8: fb:f4:9e:de:fb:62:a6:86:94:c6:c6:d7:81:dd:a8:e5: 95:02:12:26:8e:05:3d:cf:93:89:5e:b3:f1:65:06:c9: 2c:57:19:95:80:fd:1c:7b:eb:c5:8d:d1:84:cb:a5:46: e4:d9:ef:74:5c:2b:89:9a:d8:40:b0:ca:3f:12:c5:2c Fingerprint (SHA-256): C7:D8:45:78:11:1E:2D:5D:67:CE:83:CB:BE:4D:89:49:3D:82:68:0C:63:F6:12:61:22:67:18:AE:EC:5A:FD:A8 Fingerprint (SHA1): CD:34:19:96:24:BF:C3:65:45:62:5F:F6:C8:2E:2F:2E:25:50:98:3C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5017: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5018: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5019: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154369 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5020: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5021: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5022: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5023: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 425154370 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5024: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5025: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5026: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154141.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5027: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425154115.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5028: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5029: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5030: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154141.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5031: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 425154371 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5032: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5033: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5034: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154141.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5035: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425154116.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5036: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5037: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5038: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5039: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 425154372 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5040: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5041: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5042: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154141.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5043: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425154117.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5044: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5045: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5046: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425154141.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5047: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425154118.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5048: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5049: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425163956Z nextupdate=20170425163956Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 16:39:56 2016 Next Update: Tue Apr 25 16:39:56 2017 CRL Extensions: chains.sh: #5050: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425163957Z nextupdate=20170425163957Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:39:57 2016 Next Update: Tue Apr 25 16:39:57 2017 CRL Extensions: chains.sh: #5051: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425163957Z nextupdate=20170425163957Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 16:39:57 2016 Next Update: Tue Apr 25 16:39:57 2017 CRL Extensions: chains.sh: #5052: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425163958Z nextupdate=20170425163958Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 16:39:58 2016 Next Update: Tue Apr 25 16:39:58 2017 CRL Extensions: chains.sh: #5053: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425163959Z addcert 20 20160425163959Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:39:59 2016 Next Update: Tue Apr 25 16:39:57 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 16:39:59 2016 CRL Extensions: chains.sh: #5054: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425164000Z addcert 40 20160425164000Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 16:40:00 2016 Next Update: Tue Apr 25 16:39:57 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 16:39:59 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Apr 25 16:40:00 2016 CRL Extensions: chains.sh: #5055: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5056: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5057: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5058: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154369 (0x19575741) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:38:22 2016 Not After : Sun Apr 25 16:38:22 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:9b:e9:0d:f2:70:ce:2a:07:9e:23:d4:d1:7c:3c:2e: ec:22:68:33:75:cb:26:94:47:72:f7:6e:2d:c5:87:9c: 2a:44:0a:d0:8a:85:77:f8:97:b3:d3:17:9e:ff:15:f9: ce:24:78:13:d3:30:3e:e8:00:65:f9:70:d1:e2:d3:99: 1e:1d:1d:4c:c0:d7:76:34:0f:23:3f:30:3e:29:bb:bb: f1:70:39:4a:ee:83:8d:87:c3:63:32:8d:29:12:0a:90: 18:74:a3:86:8b:fd:ea:1d:0d:59:66:67:1f:a3:d8:fd: 45:8e:05:54:25:bf:d5:94:df:e5:b8:53:35:93:af:d6: 3b:a2:3f:af:c6:fb:2f:e3:64:d3:5e:db:8b:13:b6:3b: a6:59:c9:1a:76:21:20:95:36:18:f3:5f:a7:88:cf:17: f7:1f:37:b8:6b:8a:a3:47:a6:e9:08:28:44:d5:67:25: 08:a9:2a:fa:f2:54:bd:7f:da:35:67:01:78:99:6a:3c: c9:73:7e:a4:8b:86:84:75:16:b3:9a:cb:a6:aa:e5:64: 38:26:ee:96:85:82:d4:29:77:93:73:e8:4d:eb:0b:8a: be:26:14:97:5d:fe:2c:7c:1b:31:97:5e:35:a0:c2:b1: 93:4b:8f:d0:7e:e5:fa:ed:fd:64:a2:28:d7:13:78:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:fa:93:e6:e2:81:2b:90:5f:8f:2c:50:62:13:85:38: c6:fe:2d:7d:e1:9a:06:84:12:2f:26:03:d9:37:f5:f5: 04:41:79:a4:94:7a:eb:75:92:10:f9:36:de:6c:e2:d3: b7:52:76:af:31:af:60:35:15:c1:65:93:8f:21:8c:79: e4:d5:38:46:4d:8b:00:ab:e2:fe:e6:1b:14:1b:e7:62: 8f:ea:02:d9:94:0c:17:85:e6:a0:2d:61:ad:f7:a9:0a: 91:c2:c0:d6:32:38:1d:2a:7e:9a:02:76:d7:cd:20:14: f4:90:ad:5d:a3:cf:34:4e:19:fa:55:de:2b:73:bc:9a: 49:35:58:30:5e:56:ad:ea:92:1b:18:58:f5:ea:e8:d1: c7:7c:8f:e2:a3:76:7d:04:57:58:d4:31:e0:01:58:73: 87:12:cb:e4:37:6e:b3:16:69:3f:d1:bf:9d:f2:f8:6e: 3b:7b:09:ee:55:c6:26:bf:c1:9f:22:ce:20:f0:b4:7c: a7:f7:f5:c4:d4:5f:81:86:fe:57:32:89:71:bc:45:df: 10:56:0f:fa:e3:bb:92:4e:ad:f6:43:79:b4:98:70:bc: 99:1e:5c:a7:ca:9a:18:e5:5d:66:d5:4e:5c:77:63:a8: 89:f4:bf:d4:62:3b:da:df:fe:52:e8:3f:a7:20:67:e1 Fingerprint (SHA-256): EC:04:9F:54:6A:96:C5:4F:85:73:AB:1F:C0:DA:55:33:52:7F:3C:EF:64:EC:21:B9:80:CF:E5:4A:9C:DE:FC:BF Fingerprint (SHA1): DD:50:2E:66:98:E1:CC:3B:C9:A7:39:9C:FC:6A:6D:37:66:67:E8:07 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5059: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5060: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154369 (0x19575741) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 16:38:22 2016 Not After : Sun Apr 25 16:38:22 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:9b:e9:0d:f2:70:ce:2a:07:9e:23:d4:d1:7c:3c:2e: ec:22:68:33:75:cb:26:94:47:72:f7:6e:2d:c5:87:9c: 2a:44:0a:d0:8a:85:77:f8:97:b3:d3:17:9e:ff:15:f9: ce:24:78:13:d3:30:3e:e8:00:65:f9:70:d1:e2:d3:99: 1e:1d:1d:4c:c0:d7:76:34:0f:23:3f:30:3e:29:bb:bb: f1:70:39:4a:ee:83:8d:87:c3:63:32:8d:29:12:0a:90: 18:74:a3:86:8b:fd:ea:1d:0d:59:66:67:1f:a3:d8:fd: 45:8e:05:54:25:bf:d5:94:df:e5:b8:53:35:93:af:d6: 3b:a2:3f:af:c6:fb:2f:e3:64:d3:5e:db:8b:13:b6:3b: a6:59:c9:1a:76:21:20:95:36:18:f3:5f:a7:88:cf:17: f7:1f:37:b8:6b:8a:a3:47:a6:e9:08:28:44:d5:67:25: 08:a9:2a:fa:f2:54:bd:7f:da:35:67:01:78:99:6a:3c: c9:73:7e:a4:8b:86:84:75:16:b3:9a:cb:a6:aa:e5:64: 38:26:ee:96:85:82:d4:29:77:93:73:e8:4d:eb:0b:8a: be:26:14:97:5d:fe:2c:7c:1b:31:97:5e:35:a0:c2:b1: 93:4b:8f:d0:7e:e5:fa:ed:fd:64:a2:28:d7:13:78:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:fa:93:e6:e2:81:2b:90:5f:8f:2c:50:62:13:85:38: c6:fe:2d:7d:e1:9a:06:84:12:2f:26:03:d9:37:f5:f5: 04:41:79:a4:94:7a:eb:75:92:10:f9:36:de:6c:e2:d3: b7:52:76:af:31:af:60:35:15:c1:65:93:8f:21:8c:79: e4:d5:38:46:4d:8b:00:ab:e2:fe:e6:1b:14:1b:e7:62: 8f:ea:02:d9:94:0c:17:85:e6:a0:2d:61:ad:f7:a9:0a: 91:c2:c0:d6:32:38:1d:2a:7e:9a:02:76:d7:cd:20:14: f4:90:ad:5d:a3:cf:34:4e:19:fa:55:de:2b:73:bc:9a: 49:35:58:30:5e:56:ad:ea:92:1b:18:58:f5:ea:e8:d1: c7:7c:8f:e2:a3:76:7d:04:57:58:d4:31:e0:01:58:73: 87:12:cb:e4:37:6e:b3:16:69:3f:d1:bf:9d:f2:f8:6e: 3b:7b:09:ee:55:c6:26:bf:c1:9f:22:ce:20:f0:b4:7c: a7:f7:f5:c4:d4:5f:81:86:fe:57:32:89:71:bc:45:df: 10:56:0f:fa:e3:bb:92:4e:ad:f6:43:79:b4:98:70:bc: 99:1e:5c:a7:ca:9a:18:e5:5d:66:d5:4e:5c:77:63:a8: 89:f4:bf:d4:62:3b:da:df:fe:52:e8:3f:a7:20:67:e1 Fingerprint (SHA-256): EC:04:9F:54:6A:96:C5:4F:85:73:AB:1F:C0:DA:55:33:52:7F:3C:EF:64:EC:21:B9:80:CF:E5:4A:9C:DE:FC:BF Fingerprint (SHA1): DD:50:2E:66:98:E1:CC:3B:C9:A7:39:9C:FC:6A:6D:37:66:67:E8:07 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5061: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5062: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5063: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154373 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5064: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5065: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5066: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5067: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425154374 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5068: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5069: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5070: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5071: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425154375 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5072: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5073: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5074: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5075: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 425154376 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5076: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5077: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #5078: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -m 425154377 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #5079: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #5080: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #5081: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5082: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 425154378 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5083: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5084: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5085: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5086: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 425154379 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #5087: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #5088: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #5089: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #5090: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #5091: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154373 (0x19575745) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:40:19 2016 Not After : Sun Apr 25 16:40:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:ce:1c:d1:cf:08:90:23:c5:83:d0:b6:3a:ea:f6:91: e2:a7:49:60:8a:4d:0d:c7:69:44:66:22:c8:e8:e8:b3: 25:6b:76:c9:d4:2e:ac:d6:6d:db:50:59:23:b6:43:28: ea:40:0f:39:bb:0c:1e:a9:71:c1:ee:7c:fd:b3:c9:6a: 21:ea:a8:44:b8:5b:98:0e:57:c0:e1:0b:1a:56:cb:76: 14:85:46:ac:17:a4:cc:04:90:e2:43:78:23:d3:e4:fe: f7:f3:99:39:cc:eb:32:25:71:0d:94:67:c6:d5:56:87: ec:65:61:02:f8:43:4a:08:65:28:19:ac:99:16:7f:7c: ab:27:8c:cb:98:d2:f7:b6:58:1c:ad:2a:b1:65:de:ea: 1a:2c:de:d8:bf:f8:cd:be:46:19:18:ea:9a:7a:a1:1a: 49:cd:0d:e0:d1:9d:d1:2f:93:c3:72:40:c4:f7:a1:e1: 5d:e5:00:49:18:44:3f:e1:39:22:a5:ad:57:20:39:46: 2d:f3:1f:94:2d:ee:33:3f:81:eb:36:ff:de:fd:b9:37: 67:9f:63:2b:ac:e3:c9:cb:47:a1:77:11:6c:1f:c6:a8: 8c:a5:d6:42:28:b1:44:d1:f0:fb:f8:2a:ba:9f:05:1a: 0c:1c:5e:4f:ed:a6:72:96:65:d1:72:09:ab:06:e7:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:81:88:42:77:7b:02:69:4c:a1:70:20:a7:b4:2b:f8: b8:f7:18:88:0e:b3:f7:cb:0c:e9:75:c2:20:de:02:5d: ae:ea:12:91:90:61:3f:e0:3a:00:e4:31:2d:29:d4:40: 7d:0a:20:34:e5:e8:0c:58:a2:cc:9b:10:70:c7:2f:36: 5c:47:89:80:32:82:d9:9a:db:37:89:97:d7:54:91:a2: 19:e2:e2:8a:f3:70:b5:6a:2b:c9:d3:8d:8f:55:18:90: a9:c5:17:1b:3f:c3:a3:47:19:91:c0:1a:aa:c8:36:33: 67:2d:09:b4:1f:e1:01:e2:ab:13:3f:05:87:01:8b:40: 07:d1:d7:c2:fe:09:c5:2c:4b:92:b2:b3:34:1a:0b:84: 66:92:ed:71:cf:29:14:12:17:38:66:0b:b1:f9:44:ef: 0c:34:45:c9:f3:f3:47:61:9c:d5:06:72:90:b8:8a:d5: 18:b9:87:17:cb:78:88:ca:0a:48:52:ba:5a:12:ee:ce: f5:04:88:88:60:45:cf:8c:d2:9c:68:c4:24:68:84:a3: ed:2e:33:c6:ab:47:2f:16:5d:2d:5e:3f:08:79:68:50: 38:c3:6f:07:b9:35:25:de:af:17:4d:30:87:e6:b2:ec: 4b:d1:cb:da:73:5c:33:0f:21:c2:85:57:78:3b:c6:10 Fingerprint (SHA-256): 5C:5F:AB:21:DE:E2:7E:8D:AF:72:88:1B:DF:F3:D5:D3:49:47:14:CF:B0:2A:66:A8:59:E1:6D:0B:B2:2D:99:95 Fingerprint (SHA1): EB:33:CD:18:01:55:3D:71:41:D8:29:FA:BC:FE:08:B7:76:11:77:76 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5092: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154375 (0x19575747) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:40:50 2016 Not After : Sun Apr 25 16:40:50 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:3b:28:b6:57:a2:a4:32:45:16:e4:36:55:5e:36:c9: 1f:6d:b1:eb:c2:48:45:e7:fb:ca:1a:23:84:d1:cf:dd: 63:ff:68:bd:f7:29:93:96:43:a5:aa:91:ab:07:dd:6d: f4:51:ca:f5:d0:9e:c9:4b:48:b8:f0:2e:f3:e8:f5:77: 63:e4:a8:1d:d3:2b:4c:8a:da:66:ef:46:bf:31:86:87: 01:1a:99:2a:ca:dd:56:dd:64:9d:71:cb:45:ac:31:fd: 27:fb:fe:8b:5a:f7:92:12:11:0f:c6:6b:b4:79:fb:db: ac:80:1f:a4:8d:89:b5:a7:7c:dd:6d:e9:68:6b:35:5f: d0:2b:5f:78:ba:5f:16:0b:8b:09:fc:7a:97:d6:eb:53: 80:ae:5e:e4:97:9f:a1:f8:fe:9f:6b:ee:7f:c9:63:0e: 67:49:67:cd:b7:bf:85:af:3a:82:6c:8c:e3:01:97:2f: 7e:b5:0e:57:99:ae:db:a3:35:60:bc:4e:17:53:a1:e9: 49:a1:c3:2a:b5:79:cb:52:43:8e:bc:63:a5:5f:0b:86: ac:13:14:88:56:87:7d:cd:46:96:8c:78:a6:42:b6:77: 48:c4:72:ed:75:50:ea:83:67:b9:7a:fe:9b:a8:ea:bd: 5f:5a:77:37:8e:66:be:f3:e1:6d:2a:5e:06:ce:4f:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:e9:5c:ab:00:4d:91:5c:e8:b0:96:5b:ea:ed:4e:d2: 86:78:94:58:dc:8f:45:b6:10:ed:e0:c1:2b:b1:f3:22: f9:5b:50:e8:96:38:e9:4b:f7:f3:ca:69:72:70:71:79: a0:fe:61:75:9e:6f:3b:0e:ec:69:4b:bf:cd:40:68:a6: 0b:ba:31:ba:d5:e9:f9:3e:91:1d:65:20:dc:96:c7:5a: c5:7e:a1:e7:9a:32:73:5e:9f:43:c0:05:70:16:3c:d1: 4b:89:47:ce:9f:62:00:60:12:6f:f5:ba:7b:ae:64:bd: d4:b0:71:03:5e:3f:e9:d0:70:cf:f6:b0:67:07:b6:84: 03:83:92:1f:7d:fa:92:93:12:a9:48:a0:a0:98:c6:60: 98:18:fb:05:43:0b:27:a2:33:b1:ad:9d:87:e4:4a:dd: 3a:4d:bf:70:8e:f2:ed:e3:e1:45:ec:95:1c:fb:3d:2b: c5:9b:bd:53:42:1f:26:b0:7e:2b:7f:ed:14:aa:82:9b: 9b:5e:a8:96:3f:de:ac:88:50:0a:b6:a6:1f:a6:f0:a3: 22:bd:55:05:87:8b:93:c3:5a:bf:72:64:05:44:4b:ee: ef:39:dc:37:a8:ab:af:0c:3b:4e:6b:3d:98:5b:6f:15: 74:50:9a:2b:55:01:e5:21:66:86:47:08:f5:a6:8e:be Fingerprint (SHA-256): CF:61:4C:C5:5F:18:DC:2C:B1:AC:60:C3:4F:3B:3A:B2:24:AA:CA:30:3B:03:B6:D7:CA:22:E2:4A:F9:F7:95:AB Fingerprint (SHA1): 2B:71:61:A6:71:15:87:15:EA:26:FB:8B:F8:96:67:45:AB:1D:81:C4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #5093: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154373 (0x19575745) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:40:19 2016 Not After : Sun Apr 25 16:40:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:ce:1c:d1:cf:08:90:23:c5:83:d0:b6:3a:ea:f6:91: e2:a7:49:60:8a:4d:0d:c7:69:44:66:22:c8:e8:e8:b3: 25:6b:76:c9:d4:2e:ac:d6:6d:db:50:59:23:b6:43:28: ea:40:0f:39:bb:0c:1e:a9:71:c1:ee:7c:fd:b3:c9:6a: 21:ea:a8:44:b8:5b:98:0e:57:c0:e1:0b:1a:56:cb:76: 14:85:46:ac:17:a4:cc:04:90:e2:43:78:23:d3:e4:fe: f7:f3:99:39:cc:eb:32:25:71:0d:94:67:c6:d5:56:87: ec:65:61:02:f8:43:4a:08:65:28:19:ac:99:16:7f:7c: ab:27:8c:cb:98:d2:f7:b6:58:1c:ad:2a:b1:65:de:ea: 1a:2c:de:d8:bf:f8:cd:be:46:19:18:ea:9a:7a:a1:1a: 49:cd:0d:e0:d1:9d:d1:2f:93:c3:72:40:c4:f7:a1:e1: 5d:e5:00:49:18:44:3f:e1:39:22:a5:ad:57:20:39:46: 2d:f3:1f:94:2d:ee:33:3f:81:eb:36:ff:de:fd:b9:37: 67:9f:63:2b:ac:e3:c9:cb:47:a1:77:11:6c:1f:c6:a8: 8c:a5:d6:42:28:b1:44:d1:f0:fb:f8:2a:ba:9f:05:1a: 0c:1c:5e:4f:ed:a6:72:96:65:d1:72:09:ab:06:e7:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:81:88:42:77:7b:02:69:4c:a1:70:20:a7:b4:2b:f8: b8:f7:18:88:0e:b3:f7:cb:0c:e9:75:c2:20:de:02:5d: ae:ea:12:91:90:61:3f:e0:3a:00:e4:31:2d:29:d4:40: 7d:0a:20:34:e5:e8:0c:58:a2:cc:9b:10:70:c7:2f:36: 5c:47:89:80:32:82:d9:9a:db:37:89:97:d7:54:91:a2: 19:e2:e2:8a:f3:70:b5:6a:2b:c9:d3:8d:8f:55:18:90: a9:c5:17:1b:3f:c3:a3:47:19:91:c0:1a:aa:c8:36:33: 67:2d:09:b4:1f:e1:01:e2:ab:13:3f:05:87:01:8b:40: 07:d1:d7:c2:fe:09:c5:2c:4b:92:b2:b3:34:1a:0b:84: 66:92:ed:71:cf:29:14:12:17:38:66:0b:b1:f9:44:ef: 0c:34:45:c9:f3:f3:47:61:9c:d5:06:72:90:b8:8a:d5: 18:b9:87:17:cb:78:88:ca:0a:48:52:ba:5a:12:ee:ce: f5:04:88:88:60:45:cf:8c:d2:9c:68:c4:24:68:84:a3: ed:2e:33:c6:ab:47:2f:16:5d:2d:5e:3f:08:79:68:50: 38:c3:6f:07:b9:35:25:de:af:17:4d:30:87:e6:b2:ec: 4b:d1:cb:da:73:5c:33:0f:21:c2:85:57:78:3b:c6:10 Fingerprint (SHA-256): 5C:5F:AB:21:DE:E2:7E:8D:AF:72:88:1B:DF:F3:D5:D3:49:47:14:CF:B0:2A:66:A8:59:E1:6D:0B:B2:2D:99:95 Fingerprint (SHA1): EB:33:CD:18:01:55:3D:71:41:D8:29:FA:BC:FE:08:B7:76:11:77:76 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5094: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #5095: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154373 (0x19575745) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:40:19 2016 Not After : Sun Apr 25 16:40:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:ce:1c:d1:cf:08:90:23:c5:83:d0:b6:3a:ea:f6:91: e2:a7:49:60:8a:4d:0d:c7:69:44:66:22:c8:e8:e8:b3: 25:6b:76:c9:d4:2e:ac:d6:6d:db:50:59:23:b6:43:28: ea:40:0f:39:bb:0c:1e:a9:71:c1:ee:7c:fd:b3:c9:6a: 21:ea:a8:44:b8:5b:98:0e:57:c0:e1:0b:1a:56:cb:76: 14:85:46:ac:17:a4:cc:04:90:e2:43:78:23:d3:e4:fe: f7:f3:99:39:cc:eb:32:25:71:0d:94:67:c6:d5:56:87: ec:65:61:02:f8:43:4a:08:65:28:19:ac:99:16:7f:7c: ab:27:8c:cb:98:d2:f7:b6:58:1c:ad:2a:b1:65:de:ea: 1a:2c:de:d8:bf:f8:cd:be:46:19:18:ea:9a:7a:a1:1a: 49:cd:0d:e0:d1:9d:d1:2f:93:c3:72:40:c4:f7:a1:e1: 5d:e5:00:49:18:44:3f:e1:39:22:a5:ad:57:20:39:46: 2d:f3:1f:94:2d:ee:33:3f:81:eb:36:ff:de:fd:b9:37: 67:9f:63:2b:ac:e3:c9:cb:47:a1:77:11:6c:1f:c6:a8: 8c:a5:d6:42:28:b1:44:d1:f0:fb:f8:2a:ba:9f:05:1a: 0c:1c:5e:4f:ed:a6:72:96:65:d1:72:09:ab:06:e7:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:81:88:42:77:7b:02:69:4c:a1:70:20:a7:b4:2b:f8: b8:f7:18:88:0e:b3:f7:cb:0c:e9:75:c2:20:de:02:5d: ae:ea:12:91:90:61:3f:e0:3a:00:e4:31:2d:29:d4:40: 7d:0a:20:34:e5:e8:0c:58:a2:cc:9b:10:70:c7:2f:36: 5c:47:89:80:32:82:d9:9a:db:37:89:97:d7:54:91:a2: 19:e2:e2:8a:f3:70:b5:6a:2b:c9:d3:8d:8f:55:18:90: a9:c5:17:1b:3f:c3:a3:47:19:91:c0:1a:aa:c8:36:33: 67:2d:09:b4:1f:e1:01:e2:ab:13:3f:05:87:01:8b:40: 07:d1:d7:c2:fe:09:c5:2c:4b:92:b2:b3:34:1a:0b:84: 66:92:ed:71:cf:29:14:12:17:38:66:0b:b1:f9:44:ef: 0c:34:45:c9:f3:f3:47:61:9c:d5:06:72:90:b8:8a:d5: 18:b9:87:17:cb:78:88:ca:0a:48:52:ba:5a:12:ee:ce: f5:04:88:88:60:45:cf:8c:d2:9c:68:c4:24:68:84:a3: ed:2e:33:c6:ab:47:2f:16:5d:2d:5e:3f:08:79:68:50: 38:c3:6f:07:b9:35:25:de:af:17:4d:30:87:e6:b2:ec: 4b:d1:cb:da:73:5c:33:0f:21:c2:85:57:78:3b:c6:10 Fingerprint (SHA-256): 5C:5F:AB:21:DE:E2:7E:8D:AF:72:88:1B:DF:F3:D5:D3:49:47:14:CF:B0:2A:66:A8:59:E1:6D:0B:B2:2D:99:95 Fingerprint (SHA1): EB:33:CD:18:01:55:3D:71:41:D8:29:FA:BC:FE:08:B7:76:11:77:76 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5096: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154375 (0x19575747) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 16:40:50 2016 Not After : Sun Apr 25 16:40:50 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:3b:28:b6:57:a2:a4:32:45:16:e4:36:55:5e:36:c9: 1f:6d:b1:eb:c2:48:45:e7:fb:ca:1a:23:84:d1:cf:dd: 63:ff:68:bd:f7:29:93:96:43:a5:aa:91:ab:07:dd:6d: f4:51:ca:f5:d0:9e:c9:4b:48:b8:f0:2e:f3:e8:f5:77: 63:e4:a8:1d:d3:2b:4c:8a:da:66:ef:46:bf:31:86:87: 01:1a:99:2a:ca:dd:56:dd:64:9d:71:cb:45:ac:31:fd: 27:fb:fe:8b:5a:f7:92:12:11:0f:c6:6b:b4:79:fb:db: ac:80:1f:a4:8d:89:b5:a7:7c:dd:6d:e9:68:6b:35:5f: d0:2b:5f:78:ba:5f:16:0b:8b:09:fc:7a:97:d6:eb:53: 80:ae:5e:e4:97:9f:a1:f8:fe:9f:6b:ee:7f:c9:63:0e: 67:49:67:cd:b7:bf:85:af:3a:82:6c:8c:e3:01:97:2f: 7e:b5:0e:57:99:ae:db:a3:35:60:bc:4e:17:53:a1:e9: 49:a1:c3:2a:b5:79:cb:52:43:8e:bc:63:a5:5f:0b:86: ac:13:14:88:56:87:7d:cd:46:96:8c:78:a6:42:b6:77: 48:c4:72:ed:75:50:ea:83:67:b9:7a:fe:9b:a8:ea:bd: 5f:5a:77:37:8e:66:be:f3:e1:6d:2a:5e:06:ce:4f:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:e9:5c:ab:00:4d:91:5c:e8:b0:96:5b:ea:ed:4e:d2: 86:78:94:58:dc:8f:45:b6:10:ed:e0:c1:2b:b1:f3:22: f9:5b:50:e8:96:38:e9:4b:f7:f3:ca:69:72:70:71:79: a0:fe:61:75:9e:6f:3b:0e:ec:69:4b:bf:cd:40:68:a6: 0b:ba:31:ba:d5:e9:f9:3e:91:1d:65:20:dc:96:c7:5a: c5:7e:a1:e7:9a:32:73:5e:9f:43:c0:05:70:16:3c:d1: 4b:89:47:ce:9f:62:00:60:12:6f:f5:ba:7b:ae:64:bd: d4:b0:71:03:5e:3f:e9:d0:70:cf:f6:b0:67:07:b6:84: 03:83:92:1f:7d:fa:92:93:12:a9:48:a0:a0:98:c6:60: 98:18:fb:05:43:0b:27:a2:33:b1:ad:9d:87:e4:4a:dd: 3a:4d:bf:70:8e:f2:ed:e3:e1:45:ec:95:1c:fb:3d:2b: c5:9b:bd:53:42:1f:26:b0:7e:2b:7f:ed:14:aa:82:9b: 9b:5e:a8:96:3f:de:ac:88:50:0a:b6:a6:1f:a6:f0:a3: 22:bd:55:05:87:8b:93:c3:5a:bf:72:64:05:44:4b:ee: ef:39:dc:37:a8:ab:af:0c:3b:4e:6b:3d:98:5b:6f:15: 74:50:9a:2b:55:01:e5:21:66:86:47:08:f5:a6:8e:be Fingerprint (SHA-256): CF:61:4C:C5:5F:18:DC:2C:B1:AC:60:C3:4F:3B:3A:B2:24:AA:CA:30:3B:03:B6:D7:CA:22:E2:4A:F9:F7:95:AB Fingerprint (SHA1): 2B:71:61:A6:71:15:87:15:EA:26:FB:8B:F8:96:67:45:AB:1D:81:C4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #5097: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #5098: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #5099: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #5100: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154373 (0x19575745) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:40:19 2016 Not After : Sun Apr 25 16:40:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:ce:1c:d1:cf:08:90:23:c5:83:d0:b6:3a:ea:f6:91: e2:a7:49:60:8a:4d:0d:c7:69:44:66:22:c8:e8:e8:b3: 25:6b:76:c9:d4:2e:ac:d6:6d:db:50:59:23:b6:43:28: ea:40:0f:39:bb:0c:1e:a9:71:c1:ee:7c:fd:b3:c9:6a: 21:ea:a8:44:b8:5b:98:0e:57:c0:e1:0b:1a:56:cb:76: 14:85:46:ac:17:a4:cc:04:90:e2:43:78:23:d3:e4:fe: f7:f3:99:39:cc:eb:32:25:71:0d:94:67:c6:d5:56:87: ec:65:61:02:f8:43:4a:08:65:28:19:ac:99:16:7f:7c: ab:27:8c:cb:98:d2:f7:b6:58:1c:ad:2a:b1:65:de:ea: 1a:2c:de:d8:bf:f8:cd:be:46:19:18:ea:9a:7a:a1:1a: 49:cd:0d:e0:d1:9d:d1:2f:93:c3:72:40:c4:f7:a1:e1: 5d:e5:00:49:18:44:3f:e1:39:22:a5:ad:57:20:39:46: 2d:f3:1f:94:2d:ee:33:3f:81:eb:36:ff:de:fd:b9:37: 67:9f:63:2b:ac:e3:c9:cb:47:a1:77:11:6c:1f:c6:a8: 8c:a5:d6:42:28:b1:44:d1:f0:fb:f8:2a:ba:9f:05:1a: 0c:1c:5e:4f:ed:a6:72:96:65:d1:72:09:ab:06:e7:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:81:88:42:77:7b:02:69:4c:a1:70:20:a7:b4:2b:f8: b8:f7:18:88:0e:b3:f7:cb:0c:e9:75:c2:20:de:02:5d: ae:ea:12:91:90:61:3f:e0:3a:00:e4:31:2d:29:d4:40: 7d:0a:20:34:e5:e8:0c:58:a2:cc:9b:10:70:c7:2f:36: 5c:47:89:80:32:82:d9:9a:db:37:89:97:d7:54:91:a2: 19:e2:e2:8a:f3:70:b5:6a:2b:c9:d3:8d:8f:55:18:90: a9:c5:17:1b:3f:c3:a3:47:19:91:c0:1a:aa:c8:36:33: 67:2d:09:b4:1f:e1:01:e2:ab:13:3f:05:87:01:8b:40: 07:d1:d7:c2:fe:09:c5:2c:4b:92:b2:b3:34:1a:0b:84: 66:92:ed:71:cf:29:14:12:17:38:66:0b:b1:f9:44:ef: 0c:34:45:c9:f3:f3:47:61:9c:d5:06:72:90:b8:8a:d5: 18:b9:87:17:cb:78:88:ca:0a:48:52:ba:5a:12:ee:ce: f5:04:88:88:60:45:cf:8c:d2:9c:68:c4:24:68:84:a3: ed:2e:33:c6:ab:47:2f:16:5d:2d:5e:3f:08:79:68:50: 38:c3:6f:07:b9:35:25:de:af:17:4d:30:87:e6:b2:ec: 4b:d1:cb:da:73:5c:33:0f:21:c2:85:57:78:3b:c6:10 Fingerprint (SHA-256): 5C:5F:AB:21:DE:E2:7E:8D:AF:72:88:1B:DF:F3:D5:D3:49:47:14:CF:B0:2A:66:A8:59:E1:6D:0B:B2:2D:99:95 Fingerprint (SHA1): EB:33:CD:18:01:55:3D:71:41:D8:29:FA:BC:FE:08:B7:76:11:77:76 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5101: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154377 (0x19575749) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 16:41:13 2016 Not After : Sun Apr 25 16:41:13 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:02:58:05:b4:d4:c2:23:89:0d:14:4a:ae:09:9b:12: 3b:04:3c:76:4b:84:b0:11:1a:49:7f:b7:4d:18:4a:f8: e3:dd:e9:b2:ee:1b:11:6f:f2:2e:66:3a:8c:37:00:00: 27:eb:0c:ba:84:aa:5f:52:fa:af:8c:a3:af:e3:78:1c: f1:f3:25:2f:a8:1c:74:ac:6f:e8:ac:a8:0f:17:87:d7: b0:de:75:b3:64:25:a1:fe:18:a3:32:8e:a4:44:a5:86: bc:b3:ba:f3:7b:2d:da:38:ca:84:dc:c4:20:41:fd:29: f2:aa:2d:f3:48:0d:5e:a5:63:d6:4f:61:da:35:94:1b: e4:3f:29:d4:40:75:7c:ea:35:01:64:a5:ae:02:b5:cb: 97:67:47:d9:34:d2:97:4d:26:f6:bb:1b:be:2d:34:2a: 9b:2e:76:d6:43:23:b7:43:30:89:9c:21:7a:b1:c4:6b: 56:ed:3a:33:14:bc:27:d6:c2:27:53:1d:0c:91:75:0f: 6f:c7:c8:51:8b:e5:72:ba:2b:40:ab:a9:63:8d:6c:9d: a0:ca:db:c7:b7:78:66:dc:cf:71:f5:67:77:1d:6f:b1: 49:36:52:0c:f4:c7:24:3a:bc:23:5e:2c:ac:32:ee:87: 48:20:7d:87:49:3c:d0:f1:02:f5:60:e3:be:b2:e5:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:f6:00:d9:6b:ae:b5:c5:f5:be:4e:bf:dc:78:0e:2e: 4c:aa:27:e4:35:c3:76:83:48:d8:8c:0a:92:ce:60:ac: 06:39:49:24:f5:46:40:78:6c:4b:68:12:63:3e:52:8a: 00:11:75:42:7d:48:1a:00:e2:a3:93:8d:92:0b:6d:9a: 6a:f7:c4:fb:c5:4f:ec:d1:b0:84:76:36:a0:8c:a7:73: a3:c6:ce:c9:01:a2:bb:ca:8f:0e:06:f2:20:85:61:60: 96:28:30:a7:1c:3d:16:39:d2:e0:fd:8f:8a:51:1e:13: a6:4c:cb:d2:4d:0f:05:c4:ef:74:e5:ce:bc:4c:57:01: 01:93:b9:4a:2a:60:63:ac:ad:7d:90:d4:7d:6c:53:b5: a2:d0:47:4b:47:fb:a5:8c:45:64:49:56:fe:9d:a2:65: e5:93:54:9f:81:61:e5:e4:ec:2c:75:a0:d3:6a:df:b0: c6:20:a6:92:e2:e2:6e:a0:b4:64:24:88:46:08:54:a5: cb:a7:09:84:97:54:e2:d5:59:a8:4b:7d:32:57:59:fb: 76:69:4d:ba:81:40:54:c8:ad:d8:80:25:fa:39:11:e0: b9:8b:01:d2:cc:14:4d:ee:65:9e:18:9d:51:4c:14:03: 7a:bc:23:c5:79:ec:f3:a3:e4:4b:60:7c:40:16:8f:07 Fingerprint (SHA-256): F3:5C:4B:0E:7A:2F:53:03:CE:EE:2B:0B:D4:7E:A4:5A:5F:EA:34:C7:7A:A8:6D:13:72:5F:2D:1B:07:B4:EC:B0 Fingerprint (SHA1): 9F:D9:3F:72:41:6A:FC:57:28:D1:1A:4B:EC:30:C4:E3:6C:77:0B:C2 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #5102: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154373 (0x19575745) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 16:40:19 2016 Not After : Sun Apr 25 16:40:19 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:ce:1c:d1:cf:08:90:23:c5:83:d0:b6:3a:ea:f6:91: e2:a7:49:60:8a:4d:0d:c7:69:44:66:22:c8:e8:e8:b3: 25:6b:76:c9:d4:2e:ac:d6:6d:db:50:59:23:b6:43:28: ea:40:0f:39:bb:0c:1e:a9:71:c1:ee:7c:fd:b3:c9:6a: 21:ea:a8:44:b8:5b:98:0e:57:c0:e1:0b:1a:56:cb:76: 14:85:46:ac:17:a4:cc:04:90:e2:43:78:23:d3:e4:fe: f7:f3:99:39:cc:eb:32:25:71:0d:94:67:c6:d5:56:87: ec:65:61:02:f8:43:4a:08:65:28:19:ac:99:16:7f:7c: ab:27:8c:cb:98:d2:f7:b6:58:1c:ad:2a:b1:65:de:ea: 1a:2c:de:d8:bf:f8:cd:be:46:19:18:ea:9a:7a:a1:1a: 49:cd:0d:e0:d1:9d:d1:2f:93:c3:72:40:c4:f7:a1:e1: 5d:e5:00:49:18:44:3f:e1:39:22:a5:ad:57:20:39:46: 2d:f3:1f:94:2d:ee:33:3f:81:eb:36:ff:de:fd:b9:37: 67:9f:63:2b:ac:e3:c9:cb:47:a1:77:11:6c:1f:c6:a8: 8c:a5:d6:42:28:b1:44:d1:f0:fb:f8:2a:ba:9f:05:1a: 0c:1c:5e:4f:ed:a6:72:96:65:d1:72:09:ab:06:e7:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:81:88:42:77:7b:02:69:4c:a1:70:20:a7:b4:2b:f8: b8:f7:18:88:0e:b3:f7:cb:0c:e9:75:c2:20:de:02:5d: ae:ea:12:91:90:61:3f:e0:3a:00:e4:31:2d:29:d4:40: 7d:0a:20:34:e5:e8:0c:58:a2:cc:9b:10:70:c7:2f:36: 5c:47:89:80:32:82:d9:9a:db:37:89:97:d7:54:91:a2: 19:e2:e2:8a:f3:70:b5:6a:2b:c9:d3:8d:8f:55:18:90: a9:c5:17:1b:3f:c3:a3:47:19:91:c0:1a:aa:c8:36:33: 67:2d:09:b4:1f:e1:01:e2:ab:13:3f:05:87:01:8b:40: 07:d1:d7:c2:fe:09:c5:2c:4b:92:b2:b3:34:1a:0b:84: 66:92:ed:71:cf:29:14:12:17:38:66:0b:b1:f9:44:ef: 0c:34:45:c9:f3:f3:47:61:9c:d5:06:72:90:b8:8a:d5: 18:b9:87:17:cb:78:88:ca:0a:48:52:ba:5a:12:ee:ce: f5:04:88:88:60:45:cf:8c:d2:9c:68:c4:24:68:84:a3: ed:2e:33:c6:ab:47:2f:16:5d:2d:5e:3f:08:79:68:50: 38:c3:6f:07:b9:35:25:de:af:17:4d:30:87:e6:b2:ec: 4b:d1:cb:da:73:5c:33:0f:21:c2:85:57:78:3b:c6:10 Fingerprint (SHA-256): 5C:5F:AB:21:DE:E2:7E:8D:AF:72:88:1B:DF:F3:D5:D3:49:47:14:CF:B0:2A:66:A8:59:E1:6D:0B:B2:2D:99:95 Fingerprint (SHA1): EB:33:CD:18:01:55:3D:71:41:D8:29:FA:BC:FE:08:B7:76:11:77:76 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5103: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #5104: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #5105: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #5106: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #5107: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #5108: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425154378 (0x1957574a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 16:41:23 2016 Not After : Sun Apr 25 16:41:23 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:5c:93:80:6d:be:71:44:ad:14:4c:0b:1c:90:92:86: 79:7a:dd:33:9c:b2:e9:1c:35:9e:83:a4:d8:ff:fd:1d: 9f:d3:d0:53:42:18:1b:a2:38:bb:6d:91:ff:d0:cb:8e: d4:6a:67:b9:64:a9:f6:40:9b:6d:12:bb:05:48:e8:04: ff:e3:47:22:ad:bf:9c:8d:d6:a2:d7:63:62:03:63:37: 48:07:cd:4e:45:3a:0e:dd:fc:a6:4d:9b:60:19:55:a7: 25:13:21:23:5e:8c:b7:6f:21:60:5e:4c:93:39:b2:1b: a2:9c:ac:d1:e1:bf:40:7c:2e:a5:a1:57:51:57:21:67: f3:e8:21:1c:c0:8f:fd:1c:7e:7b:c0:35:4b:11:49:5f: 2c:23:2a:5f:7c:2e:dd:37:88:d0:4b:a9:41:35:69:18: e0:66:b6:df:0a:6a:44:36:dd:ff:25:5f:9c:81:22:19: d6:14:eb:0f:3a:94:de:d3:c4:c8:71:01:02:cb:d7:3b: 2c:ec:88:84:9b:ba:fb:3d:15:6a:27:73:99:2b:fc:9d: 5c:18:fe:8b:d7:18:8a:bb:7f:32:6e:22:af:ca:82:fb: 66:ab:fc:e3:76:ba:61:18:d6:3d:34:f4:87:4d:15:e1: 46:73:f1:21:2a:b2:76:64:4d:c2:56:a2:d7:df:9f:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:82:5a:c9:80:af:ae:ad:09:0e:60:0a:53:6f:9d:82: eb:ae:3b:c8:2d:78:eb:24:2a:95:4d:9b:19:83:ec:48: f7:6d:6d:e7:25:b7:4d:4b:3f:96:c6:69:85:60:29:56: 16:5a:c6:fa:8c:29:64:4a:85:6b:73:6f:4b:dd:17:97: cf:e7:ab:17:0b:95:9d:98:19:09:c7:70:df:54:9d:a3: 9c:33:78:fa:a9:5e:8f:92:62:ab:bf:6a:2d:15:0b:ef: 9d:db:06:c1:f2:51:3c:43:46:01:56:b2:66:3d:0b:ce: d2:eb:5b:88:4c:cd:60:34:7f:6e:4c:b3:f8:43:f3:f1: ab:a8:23:45:29:5c:c1:53:dd:28:a3:6f:5d:4e:40:eb: 74:d2:8e:a4:61:95:9a:df:8e:ae:52:1f:94:5e:79:c4: 26:18:ec:7e:b5:6c:76:1e:a2:19:17:9a:14:9a:ac:04: 11:12:50:4f:69:db:4f:09:cc:20:9d:95:60:b4:65:1c: 43:d8:74:70:5f:8a:fa:4a:e8:c2:1f:52:3d:d1:53:36: 67:7a:f0:4c:00:26:e9:5a:5d:48:ca:ee:e8:2e:6e:71: 29:2d:aa:68:02:db:9c:18:7d:02:65:01:6b:d1:1e:ea: c8:dc:e3:88:b9:8f:1e:6e:8a:93:82:02:6b:ee:99:22 Fingerprint (SHA-256): 95:FA:0D:61:15:26:BF:07:E6:89:1F:B5:F4:DE:B9:C2:28:EC:7C:70:D1:E0:49:5A:41:A1:65:24:D1:94:E9:0E Fingerprint (SHA1): C5:51:85:64:26:12:C3:E3:EA:FB:EC:00:9A:2A:9A:C3:05:A7:A5:87 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #5109: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #5110: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #5111: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #5112: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #5113: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5114: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5115: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #5116: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5117: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5118: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #5119: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #5120: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #5121: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5122: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5123: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #5124: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5125: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #5126: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5127: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #5128: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5129: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #5130: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #5131: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #5132: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 3805 at Mon Apr 25 16:41:58 UTC 2016 kill -USR1 3805 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 3805 killed at Mon Apr 25 16:41:59 UTC 2016 TIMESTAMP chains END: Mon Apr 25 16:41:59 UTC 2016 chains.sh: Testing with PKIX =============================== Checking if libpkix should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Running tests for libpkix TIMESTAMP libpkix BEGIN: Mon Apr 25 16:41:59 UTC 2016 TIMESTAMP libpkix END: Mon Apr 25 16:41:59 UTC 2016 Checking if cert should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Running tests for cert TIMESTAMP cert BEGIN: Mon Apr 25 16:41:59 UTC 2016 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #5133: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #5134: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5135: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5136: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5137: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #5138: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5139: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5140: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #5141: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5142: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #5143: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5144: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #5145: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #5146: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5147: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5148: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #5149: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5150: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #5151: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5152: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #5153: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5154: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #5155: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5156: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #5157: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5158: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #5159: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5160: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #5161: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5162: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #5163: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5164: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #5165: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5166: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #5167: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5168: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #5169: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5170: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #5171: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5172: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #5173: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5174: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #5175: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5176: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #5177: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5178: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #5179: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5180: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #5181: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #5182: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5183: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5184: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #5185: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5186: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #5187: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5188: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #5189: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5190: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #5191: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5192: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #5193: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5194: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5195: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #5196: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5197: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #5198: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5199: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #5200: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5201: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5202: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5203: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5204: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #5205: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5206: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5207: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #5208: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #5209: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5210: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #5211: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5212: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5213: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #5214: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5215: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #5216: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5217: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #5218: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5219: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #5220: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5221: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #5222: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5223: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5224: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #5225: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5226: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #5227: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5228: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #5229: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5230: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5231: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #5232: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #5233: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5234: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5235: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5236: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5237: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5238: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #5239: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #5240: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5241: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #5242: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #5243: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #5244: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5245: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #5246: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5247: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5248: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #5249: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5250: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5251: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #5252: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5253: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5254: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #5255: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5256: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5257: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #5258: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5259: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #5260: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5261: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #5262: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #5263: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #5264: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5265: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #5266: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5267: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5268: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #5269: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5270: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5271: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #5272: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5273: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5274: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #5275: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5276: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5277: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #5278: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5279: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5280: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #5281: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5282: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5283: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #5284: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5285: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5286: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #5287: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5288: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5289: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #5290: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5291: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5292: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #5293: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5294: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #5295: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #5296: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #5297: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #5298: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5299: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #5300: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #5301: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #5302: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5303: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #5304: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5305: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5306: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #5307: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5308: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5309: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #5310: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5311: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5312: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #5313: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5314: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5315: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #5316: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5317: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #5318: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5319: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #5320: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #5321: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #5322: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5323: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #5324: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5325: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5326: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #5327: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5328: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5329: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #5330: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5331: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5332: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #5333: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5334: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5335: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #5336: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5337: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #5338: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5339: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #5340: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #5341: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #5342: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5343: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #5344: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5345: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5346: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #5347: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5348: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5349: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #5350: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5351: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5352: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #5353: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5354: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5355: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #5356: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5357: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #5358: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5359: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #5360: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #5361: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #5362: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5363: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5364: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5365: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5366: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5367: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5368: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5369: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5370: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5371: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5372: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5373: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5374: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5375: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #5376: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5377: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #5378: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #5379: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #5380: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #5381: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #5382: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #5383: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #5384: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #5385: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #5386: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5387: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #5388: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5389: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #5390: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5391: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #5392: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5393: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #5394: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5395: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5396: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #5397: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5398: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5399: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #5400: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5401: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #5402: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5403: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #5404: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #5405: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #5406: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5407: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #5408: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5409: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5410: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #5411: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5412: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5413: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #5414: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5415: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5416: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #5417: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5418: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5419: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #5420: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5421: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3d:a9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:47:11 2016 Not After : Mon Jul 25 16:47:11 2016 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:bd:55:0f:32:0d:e2:4b:38:67:50:ff:47:bd:ee:85: c1:b4:8b:be:3f:91:d1:07:91:0b:d0:32:81:24:0a:e3: 70:a1:49:d2:67:c8:b6:db:52:cc:b7:37:a1:58:ac:a2: c2:f8:0c:a4:cf:f4:a2:f6:9a:bd:14:dc:7f:7b:f4:c0: 38:ef:43:e3:c6:07:a5:e3:00:d7:e2:84:d7:bd:78:1c: ef:20:ed:7e:f0:9a:f2:18:9d:39:8e:84:80:5b:81:88: 0a:2f:9b:33:9d:28:7a:4b:22:07:a4:20:55:40:f6:b8: a3:29:07:57:56:bb:97:95:d4:c1:fc:91:4c:df:9e:e8: 26:2c:0e:c5:05:34:e3:6b:8e:1d:aa:f2:78:2f:91:3c: 26:58:35:fd:1e:4b:4f:b5:7f:0e:23:ef:25:36:e8:5f: f3:fd:4e:52:e0:40:e3:e7:17:0b:a0:a8:33:44:ca:01: 6b:e9:32:4e:2d:de:c3:ae:d9:6a:b8:9c:a0:5a:95:74: 4d:c3:bd:da:f0:c0:19:02:44:db:ce:38:1d:1d:be:fd: 69:4a:08:7f:f5:33:b4:58:d2:f9:10:2b:b7:4e:02:ff: 6d:54:7a:08:ff:0b:50:26:dc:c9:0a:ca:20:cb:6f:a5: ba:ad:68:6e:20:00:8a:df:b4:80:f0:28:64:64:19:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:48:9a:00:e0:50:19:21:dc:ee:cf:61:68:a7:1a:2e: e2:08:46:fa:45:90:df:e2:e1:18:a4:84:32:b9:c2:99: 2d:7b:66:92:49:a2:c5:7d:8d:21:fa:21:c7:80:d9:ea: 1c:3a:31:a0:dc:d4:71:4f:39:c6:e6:18:13:dc:31:90: fa:45:af:ac:88:a0:fc:3a:ea:bf:cf:d9:db:bd:58:e9: 8e:e1:73:24:38:9b:c7:a5:32:1f:90:5e:b5:f5:41:1a: 69:d7:70:45:6e:85:e8:d2:68:96:9f:bc:3a:ac:c2:d3: a2:ac:d1:3a:3f:89:8b:06:cc:fa:1d:b2:61:51:08:8e: b2:f9:35:b9:e5:b3:1e:fd:95:53:94:26:6e:8e:46:d4: 4f:3e:37:3f:90:7e:94:c6:2e:c7:fe:ed:c2:56:d2:53: f8:86:d8:18:57:a8:77:7b:c8:1b:15:fb:0e:24:ea:0b: 4f:0e:eb:a0:c6:02:00:10:9f:42:40:b7:f5:e7:c9:a1: 3e:d9:3c:6e:cf:3e:d3:a5:e6:04:68:d2:e4:d4:0a:3e: fa:79:7a:7f:97:c1:0e:61:1f:bd:92:86:dc:01:a3:9b: aa:d9:d8:e8:cc:85:f7:d3:c5:94:47:35:0d:79:3a:e8: 93:ba:41:58:b6:ab:bf:c0:f1:93:a1:73:ed:76:78:3a Fingerprint (SHA-256): EE:68:21:97:81:C6:4E:02:B8:4C:D6:BF:13:0D:2E:1B:D6:13:99:4D:18:F2:1F:CA:E1:C4:ED:94:D7:F9:0A:90 Fingerprint (SHA1): 18:7D:E0:70:7D:AE:C4:81:CD:74:77:3D:01:EE:06:C1:10:7A:12:8F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5422: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3d:b4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:47:17 2016 Not After : Mon Jul 25 16:47:17 2016 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:ad:04:fb:4f:76:1f:6d:89:89:09:fb:13:be:9f:ae: 56:b5:0d:af:e7:24:9a:4e:d0:40:98:b0:c7:8e:a1:0a: ad:1a:f2:6f:a6:ea:29:50:ee:01:73:9f:41:24:f3:f1: 3b:80:8e:84:88:b3:91:e4:5e:f0:8e:5e:d9:a0:9b:8f: c6:dc:84:6f:42:2c:7b:29:4c:07:21:bc:58:ce:d2:3d: 66:15:c3:31:ba:8a:56:64:96:74:0e:92:67:28:14:58: fa:40:7a:14:24:2e:19:27:6e:f5:9b:e3:e5:83:b2:5d: f0:96:8d:f5:b4:74:b8:40:bd:21:07:26:45:09:39:ac: 6a:0d:c5:59:d7:c4:aa:db:5a:b9:28:b4:dd:5b:85:b2: 07:32:d7:9c:02:b3:56:20:c0:15:b0:7c:77:cf:b5:f6: 35:ea:b3:e0:d6:7e:c6:73:9a:81:49:d0:24:0f:0a:f2: 6d:20:a5:a6:27:bd:70:27:0f:2c:0e:b3:29:93:c7:ae: da:17:dd:ae:53:a3:f0:2e:e8:4f:ee:c5:f4:be:03:45: 1b:e9:9c:e2:bb:af:64:da:2d:6f:db:41:71:90:46:d2: 67:19:82:f0:7d:92:58:f7:fa:47:f9:51:72:76:d9:80: 49:de:1a:dc:b6:c9:74:bf:ed:b5:4c:19:37:d0:2a:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:cc:5f:21:37:6d:cd:bd:29:88:87:a8:f0:50:68:61: 26:48:3b:c5:ab:a0:a7:13:ca:e0:ca:3f:fa:48:3d:1a: 40:8c:0e:98:57:e6:0b:52:ba:a6:64:60:7d:89:6c:d9: 3a:1b:0c:bd:f5:77:fd:ac:91:b1:1e:54:61:0b:99:30: 90:8c:e7:9e:11:87:ef:33:c8:d0:d7:70:21:18:0b:75: 86:25:65:df:eb:49:64:59:29:6b:7d:f4:52:17:ae:cf: 77:a7:c9:35:cf:eb:6c:2c:1d:46:ec:4b:e2:45:8a:62: d9:a1:33:89:09:5e:d3:f3:90:a0:38:72:a7:61:93:fd: 56:70:83:d5:28:51:e0:e9:2d:7d:e7:a9:70:2f:eb:37: 96:cf:d3:de:4e:71:7b:20:28:f5:38:0f:2b:c8:29:a6: ae:91:85:86:cb:e9:b4:51:56:31:80:bb:ff:d4:27:df: 5f:ff:df:f2:9b:08:c4:73:67:58:85:12:f9:8a:95:30: e7:24:49:6a:73:98:60:44:20:80:82:68:1d:2a:a9:b4: b6:10:1f:e1:2e:0a:d8:a4:25:7e:4f:02:05:37:fb:df: 7b:28:dd:db:b3:86:bd:46:39:57:ce:bd:fe:c3:79:aa: 15:eb:af:f6:90:0c:47:24:cc:9f:1a:14:43:05:59:3a Fingerprint (SHA-256): 9D:92:95:A3:A0:DF:7B:34:76:4A:2D:4B:8A:FB:3B:35:9D:2D:EE:29:16:B7:09:71:A6:4F:CD:92:A6:7F:9C:66 Fingerprint (SHA1): 6D:F5:CE:8D:27:4B:D3:06:B6:45:B6:5E:F1:49:81:77:A0:51:80:91 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5423: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3d:bf Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:47:24 2016 Not After : Mon Jul 25 16:47:24 2016 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:ae:f4:e9:cd:4d:24:33:73:a2:ce:70:7d:fc:88:39: b1:7a:70:d6:2a:b7:93:c6:6f:b0:39:27:7c:9f:8d:3f: fd:26:49:8b:69:2f:a3:be:d5:9d:f5:a9:e4:36:e4:af: c7:48:f5:e9:91:e1:7e:15:a7:15:62:57:d2:70:be:49: 78:40:79:9b:da:00:05:30:cc:48:5b:06:87:72:39:07: 32:36:8c:c2:b7:00:91:c9:36:ad:e1:06:cc:12:e2:5f: 98:73:1f:d7:3f:16:09:58:5e:5e:e4:ee:88:f4:08:17: 41:89:87:da:03:d4:8f:36:3b:c7:5d:bd:f8:db:69:7f: 7a:67:3c:44:c6:e6:57:82:bc:27:2d:de:54:df:83:12: fc:1f:25:df:c4:7a:19:0d:94:fb:fe:e8:2a:13:ca:37: 8c:9a:7e:43:1a:21:81:41:e0:1a:7a:34:85:3c:2f:52: 8c:0b:22:af:c3:2a:fc:16:1b:3e:6f:80:42:08:7f:ac: 4a:c5:2f:e1:c9:6d:e2:96:05:40:14:79:67:d0:c6:44: e8:a8:1a:f7:bf:8a:22:74:df:f6:34:52:cd:53:2f:d8: b4:d6:9d:62:d2:ba:e9:85:c8:74:1b:19:c4:ca:5a:31: 62:21:c6:3c:84:fa:8b:2f:53:ee:2e:6c:6f:5d:32:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:2c:c0:1e:88:bb:99:c2:1d:95:96:1c:74:c2:f2:0a: 89:a5:87:fb:6f:b9:47:66:81:be:cd:ff:a7:54:81:4d: c2:f8:cc:b5:c2:ea:3b:04:2d:7b:85:9c:40:2e:f5:0d: 7b:75:d7:8b:8c:af:1a:82:04:5d:67:46:29:89:a6:48: 4e:de:1d:69:af:82:50:e5:6d:73:9c:26:b4:9a:f8:da: 69:d1:62:9f:d7:15:21:ea:09:4d:25:9e:fd:cc:f1:c5: 8d:33:a1:47:df:92:7e:79:a6:65:2a:33:01:37:d1:30: 8b:18:d3:f0:ec:eb:cc:2d:be:54:c7:1e:2e:ab:7a:c6: 32:08:57:72:0f:37:53:fa:a5:3f:8c:72:91:94:04:f7: 61:04:4e:93:eb:f3:09:a1:56:b8:fb:60:07:a4:10:b4: 41:91:31:28:d2:f8:2a:48:aa:75:17:96:62:31:fe:7e: fe:d7:0b:45:61:65:4f:d6:74:41:36:5c:80:89:83:29: f3:1c:a7:03:18:d2:48:61:e1:3c:f2:49:79:6e:92:52: 1f:63:83:c6:8f:74:69:76:a5:38:03:46:67:ea:7c:b3: e6:d1:65:12:d9:a6:d0:19:70:f2:4c:9c:b9:8f:c0:af: c3:19:b7:7e:2e:29:09:ea:5f:49:f6:aa:9e:5e:85:07 Fingerprint (SHA-256): 29:94:FC:24:BF:00:83:FB:64:3A:1A:B4:08:E2:53:2F:A6:C7:23:59:56:A4:05:D4:28:10:AD:10:15:30:10:B4 Fingerprint (SHA1): 16:B0:9C:A9:D3:F0:18:DC:88:B6:E0:43:86:50:47:2A:51:C1:B1:35 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5424: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3d:cd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:47:36 2016 Not After : Mon Jul 25 16:47:36 2016 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:cb:92:b1:ac:09:27:fe:8e:98:fe:f9:b0:d8:f3:da: d0:d4:44:39:73:e0:f6:61:10:53:3a:f2:37:49:e8:17: f4:b9:da:93:61:ca:56:99:60:dc:21:f4:0e:8d:b4:5d: 3a:97:4e:10:f8:e0:83:f8:cf:e8:36:73:2b:16:7b:a3: 9f:fc:b0:fa:54:13:9a:94:d6:e3:f9:f6:b9:98:ce:15: c0:1a:20:50:ec:3b:e9:a1:5d:9e:2b:73:6d:72:20:4c: 94:bf:53:59:52:2b:9d:08:b3:60:39:6a:50:5b:69:88: 8e:c6:5b:72:74:5b:59:f8:e6:88:44:02:8d:cd:73:ea: 19:0d:77:f6:1d:6a:d5:31:37:bb:5f:21:56:a6:7e:a9: eb:0f:f9:1c:f3:f7:74:1f:f4:31:67:f7:2b:9e:da:b3: fa:ec:05:3b:09:76:37:da:a5:1c:62:7e:21:db:ba:ea: a1:5d:74:2c:25:78:28:75:0a:9e:b3:a8:ef:84:87:dd: 83:3d:e1:f8:65:86:97:29:26:f9:f1:56:b9:51:d0:cf: db:bb:e8:34:a0:c1:62:d8:1a:0c:85:f0:1a:9c:0c:f9: 72:ab:60:55:4b:f4:fc:30:6d:a8:81:0c:55:e7:5f:85: b8:6b:1e:8c:8a:bf:0a:30:61:4c:5f:b7:a8:fe:47:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:0b:e5:40:41:86:35:05:f8:ce:e9:d3:60:98:32:e4: ca:ac:c5:46:cf:e4:c9:c7:1e:04:98:a6:07:8d:aa:bc: b6:a9:12:47:c6:7f:07:2b:d8:04:db:f1:15:9a:65:63: fe:c9:19:42:bb:9a:44:f8:36:eb:c5:88:da:94:b5:39: 43:04:2b:06:bd:10:fc:30:f2:64:12:5e:60:7a:9f:c9: da:43:46:8f:e4:f1:da:a4:3e:2a:61:4b:c5:3f:dd:60: c2:c8:6e:81:8f:a2:e1:20:3e:72:3a:e3:16:01:7e:8e: da:12:a0:a1:30:0d:0d:46:c3:f7:e2:a8:f4:d5:d4:df: 4c:e4:e4:7b:55:5e:46:c8:dc:aa:7c:54:79:cd:5e:01: 24:92:2d:29:f8:15:fb:3c:ba:fa:2d:06:52:ec:15:33: d3:34:29:5b:22:da:b8:98:2f:6a:ee:4e:a2:be:03:80: d0:4b:20:cd:74:8a:9e:65:e1:83:e1:f8:60:97:f8:0d: a4:71:4c:ed:89:29:ed:78:be:61:36:b4:81:d3:a8:bf: 7c:ee:55:f9:c4:4c:52:0c:43:b7:0c:b6:4d:71:16:3a: 3e:9d:9e:5d:bc:03:08:d3:30:78:ec:ce:a6:50:b3:90: 19:6c:28:92:1b:fd:73:c0:dd:57:69:26:8c:00:d5:cd Fingerprint (SHA-256): DB:4D:D8:61:25:2A:D4:76:9C:0F:79:5F:A8:60:32:03:6B:84:76:F1:C7:5E:08:65:D7:93:C9:12:99:F9:EC:E6 Fingerprint (SHA1): 06:89:B3:0A:A1:16:BB:C7:A9:AD:AC:B5:3E:62:1B:7F:6F:14:54:7E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5425: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3d:e4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:47:50 2016 Not After : Mon Jul 25 16:47:50 2016 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:bf:10:61:0a:dc:77:8e:02:ac:77:e7:2a:ab:38:ca: 2f:89:43:30:58:eb:32:64:aa:b6:de:91:c8:fc:63:ff: ff:6c:ed:62:9a:78:7e:bc:84:5e:8e:a0:66:83:d5:d9: 76:9d:0d:a6:65:53:6e:f5:b3:86:2b:36:d9:92:87:d9: aa:8c:cb:6d:9e:8f:b6:68:00:aa:a0:57:fb:d5:00:96: 02:0d:44:c0:67:93:08:06:62:69:19:a0:87:f5:8e:3c: ab:19:a3:2d:7e:c0:46:83:6e:63:01:0c:cc:97:10:c0: 45:af:73:3b:dd:b3:84:d1:07:11:9a:bc:73:fa:81:92: 56:85:bc:58:03:7b:88:e0:5e:14:5a:53:b7:cb:3f:c4: f1:68:eb:6f:50:f1:00:6b:a1:ad:30:89:0f:3f:22:f0: 36:1e:f8:4b:c7:c0:6b:3a:d9:17:91:f8:11:ca:0b:88: 6d:cf:8b:23:8f:86:56:12:4b:20:94:f5:11:59:4f:91: 7e:c1:30:19:a5:ba:dd:57:20:3d:cf:29:bb:37:0d:1c: 7f:56:ec:7b:39:ba:05:9d:93:60:0a:c9:68:95:1c:b3: d4:e5:0f:62:f0:3e:8d:1a:60:14:b3:d7:ed:eb:a6:eb: d7:30:34:99:12:c8:3e:68:57:18:a2:73:35:1d:38:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:14:07:9a:3b:6b:19:43:21:d6:1d:2a:1d:ce:23:e1: 85:e6:a2:da:24:c3:50:a6:82:49:af:cb:23:91:b8:5a: c5:bd:a0:6a:39:42:0b:06:3b:b2:41:d5:9b:df:cd:e4: 2f:59:8d:26:4a:f1:99:7c:95:02:97:73:60:49:0e:a3: 77:4f:9b:5a:c0:33:bf:f6:5b:81:09:1f:93:1a:6d:b5: cc:89:75:f7:02:3d:8c:2f:6b:32:d5:b9:bc:32:ba:26: 80:5e:44:5f:a7:1d:5a:bd:d3:fd:b9:65:af:19:74:04: 4e:56:f0:e3:c8:41:53:c6:8b:2c:4e:5c:52:75:7c:98: fa:c1:0b:9f:21:86:a0:af:45:67:28:f8:89:f0:a5:66: e4:0a:f9:43:02:37:0f:85:dd:30:a1:a7:d5:e3:b4:48: 36:30:1d:8a:35:88:8d:39:98:dc:37:3e:6e:5e:a2:15: 2e:09:6f:fb:30:32:21:a8:bd:5d:5a:52:ec:e7:d1:98: ee:74:1c:4d:fa:0e:8c:13:65:aa:50:b2:84:45:b4:cd: 87:fc:03:7e:72:8a:29:2f:a1:34:e6:10:52:0f:e3:6a: e9:1e:a2:7b:60:76:5c:63:89:4d:7f:28:10:05:10:64: 04:5b:1f:19:28:0f:3f:e9:e4:b9:37:b2:03:ac:ad:bb Fingerprint (SHA-256): E4:0F:27:B7:F2:94:F9:B0:1D:71:7E:1F:56:31:F6:F4:80:D7:55:83:8B:2E:3B:93:83:F9:37:C5:9B:76:61:EB Fingerprint (SHA1): B4:44:47:5D:04:09:9B:A6:07:AB:FB:27:4E:15:AC:1D:8D:85:90:1E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5426: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3d:fe Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:48:03 2016 Not After : Mon Jul 25 16:48:03 2016 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:6c:e7:8a:5b:d6:ca:03:f7:8d:98:1f:db:ec:5a:33: 06:99:c7:5d:ce:75:04:ef:e0:85:97:ff:16:08:25:f9: cb:07:fd:1f:ac:bc:52:6f:95:81:11:08:3b:78:9b:7b: 4f:c5:a6:39:e8:ac:9a:90:72:21:a6:a9:08:79:96:b0: 8a:11:42:75:9c:58:17:10:b2:90:22:3d:e4:7e:1a:6f: 2e:2f:72:75:3a:56:0f:c7:e3:c7:e7:28:88:24:5f:5c: 0e:84:c9:10:59:07:b9:8f:d7:47:5c:56:91:16:e5:47: 3b:91:42:34:6c:a9:15:02:39:bc:0d:46:dd:91:f2:04: 3d:50:67:69:09:36:92:7c:3f:42:9b:16:b1:94:92:88: 7f:8b:a8:3b:9d:24:e0:00:5f:98:df:ba:64:23:5c:ee: ad:6e:0a:45:64:fc:8c:dc:d9:01:2c:13:5e:56:2a:3f: 2a:c3:86:9b:60:4c:d1:18:25:00:e0:9d:0d:cc:89:92: 7e:74:c7:ea:98:9e:db:ea:87:9f:33:4c:20:ae:19:82: 99:52:cd:20:b3:8b:91:52:b4:b4:90:23:9e:44:af:fe: ba:c6:68:de:cb:ec:5c:75:81:93:b7:47:fe:fa:71:fb: fe:21:9d:c5:f0:64:5a:3f:b9:88:c6:d8:3a:b0:4a:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:5a:24:c4:14:b4:b4:22:a9:7d:33:8c:48:70:a0:46: db:97:90:63:f9:c1:92:fb:fb:fb:93:c5:c7:99:16:28: ed:e8:50:01:21:1e:fe:ea:51:40:24:b5:09:ee:05:bd: 66:d4:70:49:4d:b0:76:40:8e:89:b4:be:23:67:08:59: f4:72:1a:ee:f4:0b:37:7a:c5:b8:cb:ad:9a:41:50:5d: 77:ba:1a:93:68:d9:c7:66:1c:79:be:94:df:22:f9:12: c0:6d:67:51:8e:10:72:8b:13:3d:82:fc:7f:a2:76:6b: 5c:50:c5:6f:38:43:c5:2c:d0:04:79:8e:e8:26:24:c5: b3:cc:71:94:5d:63:2a:8b:03:f5:61:db:56:03:b5:26: ee:c7:95:1c:b4:c5:2c:c1:37:dd:20:aa:7c:97:5c:a1: 77:45:2e:45:fd:d2:6f:67:33:33:c3:d3:38:c2:02:23: ab:4b:b5:b5:e7:3e:8f:a0:da:9b:49:19:5d:a0:71:ed: ce:5d:d3:dc:3b:68:0d:eb:51:33:e0:5e:3c:ab:c4:fc: 9c:0a:f0:47:1d:1e:43:5c:67:e4:07:d2:a1:4b:71:f0: b4:f0:03:9b:9a:a7:eb:ff:91:d5:c8:b0:d9:8a:30:ec: 85:b8:96:6a:d0:17:95:2b:11:7b:d1:4f:c7:99:68:37 Fingerprint (SHA-256): 5E:D1:14:07:B8:E9:56:E5:96:19:17:B6:6F:80:6F:9C:52:70:93:DE:C5:DD:69:8E:5C:D2:D1:81:11:D9:D2:DC Fingerprint (SHA1): 89:4A:39:28:F3:D7:A8:E9:53:99:F2:89:78:F2:98:73:8E:F5:F6:5A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5427: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3e:17 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:48:09 2016 Not After : Mon Jul 25 16:48:09 2016 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:2b:5c:68:d2:f3:7c:a7:5e:f8:7c:ac:65:31:22:12: 5b:29:57:9b:94:a0:eb:c0:54:5d:f7:7e:e5:9d:33:db: 46:fe:11:a2:df:6a:c1:85:6f:32:5b:b7:ee:ad:b4:3b: 9d:2b:10:c6:82:8b:07:2e:7f:3a:9c:69:75:5b:0e:78: 1e:01:e2:55:ff:8f:ec:66:11:ae:11:b2:83:a6:98:89: 0e:2e:87:e7:98:08:b8:9e:b6:8d:c2:45:ef:5a:60:7f: c3:a9:e9:4c:92:69:b5:f0:91:cb:3c:58:84:6b:7f:1b: 6d:a2:56:c8:d0:46:97:35:f0:6d:0f:22:14:10:b9:b4: 5e:cb:8f:88:cc:2a:6b:24:6b:c2:78:18:46:cd:fa:1b: ae:c8:81:83:84:7d:05:b4:0a:aa:56:ae:84:fe:60:0d: 38:74:08:75:36:a4:71:de:fe:4a:08:a1:19:b8:41:2e: 0a:dd:6b:f3:96:35:dd:8a:77:2f:5c:51:4e:2f:1a:a6: da:4b:69:dc:f4:cb:67:27:32:c1:72:53:0d:5e:d1:97: f5:ba:40:36:e5:61:7b:b1:f0:5d:89:1e:77:27:0c:b0: c9:28:ae:fd:bb:da:ca:3a:40:98:92:29:67:4c:07:1e: ec:e6:89:13:a5:76:7b:ab:1f:5d:6f:11:b5:e1:ea:5d Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:f2:1e:8f:ec:4e:fa:55:bd:fb:8c:04:6f:e5:ba:91: db:0e:34:3a:67:af:12:e1:0e:a7:a6:04:07:df:59:b6: e3:f2:58:a9:ca:45:5c:ab:8e:dd:3b:51:ee:e5:a7:94: 67:b5:3f:f2:a0:75:b0:81:e7:5e:44:7f:8d:52:63:13: cb:ba:55:6e:fd:ab:78:5d:92:17:8a:0f:ea:c1:4a:47: 02:36:b4:7c:7e:29:ad:eb:7c:97:8a:52:7e:de:cf:47: 14:68:d7:b9:a8:cb:1b:c2:97:ac:79:f7:21:79:c1:4e: b2:82:56:ae:bd:24:39:8a:1c:78:a5:04:e5:28:d8:d6: cd:d6:64:20:94:e4:5d:1d:83:54:bc:7d:2a:32:e4:aa: 38:8c:a2:af:1b:25:69:9b:eb:76:83:4e:16:75:94:46: 6c:f3:c9:1f:bf:98:94:82:f1:85:86:0b:02:16:19:2d: 45:02:16:be:60:9c:7f:9b:87:e6:21:7a:f2:f6:a3:8b: 97:72:33:d6:06:ab:ee:da:8f:d3:d4:62:05:fe:f0:e9: 38:bc:91:b7:c0:0a:f0:1c:7f:b7:96:2f:0b:fb:1d:9f: 23:62:73:ad:07:fd:09:79:a5:93:ae:58:ac:4e:c2:3d: 2f:c7:33:d0:ba:6f:d2:58:07:e6:21:fd:a2:8c:50:40 Fingerprint (SHA-256): B8:58:8A:96:57:C9:28:5E:1C:40:83:BA:13:72:59:D2:DE:7A:A8:A3:B0:96:68:F3:35:AB:2D:0F:B9:A4:79:80 Fingerprint (SHA1): DB:6C:E1:BC:0D:9D:3D:C2:39:EC:89:CA:5D:A2:A1:F6:5D:11:BE:03 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5428: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3e:22 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:48:21 2016 Not After : Mon Jul 25 16:48:21 2016 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:d1:cc:57:f4:32:8b:6f:61:3f:e7:22:f1:97:a8:8b: cb:1a:c3:f9:09:f9:de:18:aa:5e:de:3c:26:d8:8e:4f: f9:50:85:d2:99:6c:a6:1b:77:98:fe:32:34:a0:ee:fe: fb:23:7c:9a:f3:ec:13:4d:81:18:ba:6e:28:a5:0b:35: 4e:1f:78:0b:08:61:04:c2:73:51:fc:2e:3c:58:a3:d4: 5b:43:13:ff:3f:8e:c7:65:93:9b:23:e3:aa:cf:5d:e6: f2:4b:b0:43:68:75:6c:83:aa:eb:a7:7b:28:81:f8:d3: 15:00:94:ac:18:1c:c5:7a:84:0f:e0:2f:b0:ed:57:dc: d8:08:cf:28:68:68:b2:38:26:3f:bf:96:98:91:98:11: 0e:fb:fd:92:c2:81:b8:1d:e2:de:ed:50:3f:73:73:88: d3:21:ac:d3:c5:ea:71:7f:17:2d:61:e3:71:b6:50:e4: c0:1a:b4:bc:84:6a:6f:18:ba:8f:6c:d3:8b:99:d1:6b: 17:ff:fc:8e:a8:29:6d:6c:27:10:25:3f:86:c7:b6:67: 2f:7d:99:14:78:22:f2:a9:44:ac:74:a2:90:4b:dd:b6: 9c:26:51:d7:ac:e1:ac:df:16:d1:7e:e5:63:8c:1e:bc: 83:b1:e3:5d:a8:90:12:d9:18:92:11:5e:10:a8:dc:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:df:54:e5:15:43:97:36:ae:69:fe:f1:81:54:ce:89: 31:36:4f:27:54:8d:41:ab:1c:fa:9a:89:f5:1e:2b:83: 45:24:a6:fe:1e:6f:10:84:8f:ba:32:4b:d3:69:a6:9c: a3:38:6b:ac:e2:fb:48:b8:78:cc:d8:50:da:14:60:11: 3e:83:ac:10:ae:16:55:a9:8d:4c:0b:8c:80:32:22:08: b2:de:c9:2c:4d:3b:d7:d9:b4:32:af:3d:16:f0:a5:f1: 35:3b:9c:33:52:94:a4:eb:00:f6:5d:f8:1b:15:cc:e6: a3:d5:d1:32:d6:92:c3:8d:d4:a0:07:bf:29:a0:b7:6e: bd:44:e1:12:19:83:5c:1b:c7:81:a0:1a:e8:d2:5c:57: 0d:44:db:29:6d:18:4d:8d:63:37:89:3d:57:16:c4:f4: 27:29:c0:7c:5a:a5:88:d3:4d:bc:73:04:85:75:e8:69: d0:f0:05:0e:cc:73:2d:21:f4:bd:11:e3:b9:91:75:8e: 9d:d9:eb:55:42:3a:19:33:32:74:a2:b0:35:04:2e:02: af:1b:0d:ad:64:95:9b:7d:a2:63:a9:cb:e3:7a:38:a6: ce:d0:20:f7:0f:5d:ac:53:94:f4:36:08:16:34:ec:d8: ce:ad:70:e6:c9:f2:57:3c:ae:36:80:0e:3d:4c:9f:bf Fingerprint (SHA-256): E5:20:AC:D6:E4:E1:5F:83:DA:61:4E:0D:C0:E7:6E:64:4C:BC:02:79:AF:20:68:F3:22:76:29:22:79:B1:F0:0F Fingerprint (SHA1): 30:AD:D6:27:01:5D:D8:03:22:C7:C9:FD:07:25:A1:94:4A:14:E6:E9 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5429: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3e:3a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:48:28 2016 Not After : Mon Jul 25 16:48:28 2016 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:57:40:38:d3:fa:57:cb:01:5b:e7:ce:d3:95:65:2a: ea:21:78:62:b6:a6:bf:76:86:bb:84:14:0f:43:99:e4: 93:e6:41:03:16:f0:4c:f2:ac:a0:da:24:a1:8b:25:2b: e3:f3:4a:69:4a:c3:65:eb:a9:38:1b:01:3f:da:20:cb: c1:f5:1f:f0:43:7c:21:25:34:cd:b8:c2:16:0c:8e:4b: 6a:4c:f4:7a:6a:48:37:52:7e:41:51:81:80:c8:ca:f2: 72:7b:6f:78:d0:a1:69:4f:9d:3a:93:ab:3e:bd:a0:95: 2c:1c:19:33:01:dc:f0:54:94:63:74:27:ac:a1:a4:2f: 19:a8:15:6d:6e:3a:bc:07:ec:f8:96:06:23:af:72:93: 6c:e4:84:f0:e4:18:47:2d:c9:e8:df:09:96:3d:06:29: 05:f9:11:3e:54:27:16:d5:84:37:a2:0e:ba:65:37:93: e7:ca:e7:93:17:b6:47:80:cc:26:40:f6:26:fc:cd:b5: 30:06:45:71:a4:dd:10:81:2f:b0:97:c4:d3:df:6e:78: 7e:16:80:a7:7b:89:17:49:db:0f:29:ff:a4:2d:f2:64: a5:a3:2d:12:6e:b0:d0:06:fb:5b:2f:fe:f3:6f:6a:df: 3a:64:85:0e:86:0f:eb:4c:6a:7c:ee:ea:92:b0:90:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:28:c9:ff:09:c8:43:4b:d9:a0:00:6e:6d:3d:15:43: 65:17:04:68:34:08:ee:60:b3:8f:76:dd:e1:ff:00:82: 10:18:23:8a:2c:46:cc:54:15:6e:4c:7a:13:00:84:d6: 26:77:b4:23:3b:7e:d3:b8:90:d4:1b:a8:21:7e:a0:12: a5:d3:eb:89:5f:25:9c:f2:fd:6f:85:c4:44:fb:40:b9: e1:01:df:a5:fa:15:b8:10:ee:3f:30:a8:eb:5a:6a:db: c6:92:d2:2f:b2:6f:67:13:ba:ad:b9:20:5c:37:a4:6e: c2:e4:7f:c7:0f:01:8e:c4:bf:cf:55:c6:05:50:18:bf: 52:ef:f8:66:b3:61:e7:74:21:30:cf:ce:5e:ce:7c:6b: dc:5e:b5:19:da:28:d9:57:4d:04:60:38:6b:60:f2:b0: 32:8b:ec:fd:d0:5a:30:08:e9:df:a6:81:8b:52:0c:84: 53:aa:39:1d:f7:2c:16:00:c8:50:c4:db:81:b9:ae:ec: 6f:66:5e:83:92:81:6c:55:c0:f4:53:11:f3:c3:79:e4: a8:3b:9a:d3:c7:19:e7:3d:a4:da:79:69:64:5c:93:cd: ef:a8:d7:89:9f:da:5b:1f:12:fe:9c:cd:a1:67:7d:1c: 09:e4:42:0e:ff:54:73:fb:e0:c0:2f:4f:1c:9b:e6:12 Fingerprint (SHA-256): 77:E9:03:FE:00:F6:41:12:F2:F0:A3:C6:48:56:36:77:5C:DC:51:20:08:01:BE:86:41:9D:82:5C:54:B4:DC:0F Fingerprint (SHA1): E2:BB:95:14:B0:9D:25:15:2C:58:52:6E:F2:56:FC:84:39:1D:23:B8 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5430: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3e:47 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:48:33 2016 Not After : Mon Jul 25 16:48:33 2016 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:07:6d:bd:37:31:5c:30:cc:21:69:5b:d2:85:a6:47: 48:2c:df:d0:48:66:c5:9e:e3:2c:08:a6:3e:9b:6f:66: 94:fe:5f:76:ba:54:4b:58:df:3d:ce:25:91:68:5f:38: 88:ca:99:a5:2c:a3:a7:3e:32:95:02:d0:88:e7:4c:20: 4c:b0:2c:0d:4b:ee:27:ba:66:83:94:14:5a:98:f5:74: 94:83:8b:83:44:d3:1a:74:e1:c5:bc:61:49:e2:a3:2b: 0d:df:b7:d6:1a:eb:cb:78:25:1b:a1:15:08:18:42:aa: 8d:71:2c:c2:b4:5c:47:d4:2e:50:fc:cf:b1:f2:58:8e: 38:05:45:b3:cf:c4:b5:a1:e6:5f:c6:0f:8b:80:4e:36: 3c:41:e2:e8:f3:9c:c5:7b:d5:a0:63:fb:77:e4:17:ca: 50:7f:83:3d:b3:57:2c:a5:9e:30:f4:37:03:6d:2a:4c: 95:84:5b:f3:9b:a2:1f:f4:83:be:11:6e:a0:db:2b:1d: 3a:38:f2:bf:d4:47:c3:89:89:a8:06:93:cc:c2:c0:1f: 7c:d3:9a:74:37:e9:8e:98:d1:88:ad:1c:f1:19:40:8b: fc:0e:7e:23:18:64:87:56:c0:8b:20:4a:12:34:1d:62: ee:a5:17:33:3c:7a:36:81:61:dc:ec:bc:42:17:6f:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:9a:ff:43:6a:d4:ab:94:13:6f:ff:20:4d:cc:21:e6: 03:0c:80:71:69:5a:f4:64:02:00:93:43:2f:72:66:50: d5:ce:5e:b6:3c:06:5b:59:73:91:aa:e2:ae:34:62:b7: 16:7f:41:a4:e9:cc:9d:1d:82:62:97:dc:4c:b5:5b:b9: a1:5b:f3:c9:cc:21:14:e0:6d:c4:fb:51:b1:06:ec:56: 70:06:52:d4:ab:4a:f9:26:e2:3a:08:90:9b:41:c4:50: 23:4d:7f:2b:db:d1:83:3e:56:f6:da:1e:18:44:fc:ed: a0:72:60:a6:2b:b7:d0:fe:8b:98:aa:37:e8:26:6f:4f: 96:92:2f:90:4b:59:b6:e4:03:8d:73:1a:af:fd:35:8c: d5:df:89:db:63:bc:a1:f6:42:a3:e7:7a:da:93:58:40: 65:a1:56:76:7a:5d:61:24:41:6f:9d:d2:84:51:b8:ab: 8d:f8:5f:cb:4e:d9:a9:1a:fb:28:33:94:2c:37:bc:87: 23:fa:d8:c6:8b:24:2a:d4:22:35:5d:44:d6:01:84:0a: 01:ee:ed:60:47:a0:48:a6:3b:0a:b0:d0:b5:14:e5:f2: 6c:d1:3e:1e:62:10:0a:9c:aa:11:57:57:1b:5c:0d:29: 14:eb:2a:77:8a:56:3a:0b:11:37:c6:e6:ef:10:c1:b7 Fingerprint (SHA-256): 6E:A2:08:A7:BF:4D:AB:52:DF:29:D0:FF:8A:A7:CB:8B:6C:14:79:8E:CC:58:68:04:2C:4A:21:18:96:74:77:71 Fingerprint (SHA1): AA:B8:92:41:DD:69:B1:3F:A2:17:0F:B9:75:63:DC:E0:6B:3D:A9:49 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5431: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3e:52 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Apr 25 16:48:37 2016 Not After : Mon Jul 25 16:48:37 2016 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:96:e0:f9:b1:77:68:03:9d:db:ab:7a:68:9c:c9:4c: 01:d0:e3:77:42:6e:b6:c1:9a:0c:46:b0:a8:48:4a:40: 7b:ca:d8:88:f8:b0:95:54:70:2e:11:96:06:17:4d:4a: 4f:76:d2:fb:c8:90:ab:f0:fe:54:a7:67:2d:f5:45:31: 58:eb:d9:a5:14:d2:2e:bf:64:1f:b2:6a:71:69:21:54: 8c:be:75:a1:c1:40:dc:31:07:a2:55:5e:12:f3:ba:60: 9a:7c:ec:9a:c8:30:0f:66:2f:e0:0d:a4:c4:06:00:22: 75:d6:00:f8:aa:fe:5a:81:ea:ec:1e:37:82:74:44:72: 86:84:91:13:99:02:31:9e:46:0f:26:b7:4a:ec:66:b3: a4:8a:30:70:d9:53:90:58:8c:35:ba:73:97:cc:57:9a: 9c:43:de:47:58:fd:0c:d4:f0:82:9e:c9:bb:ef:66:76: 10:24:22:45:e2:79:c9:24:08:1d:39:61:d2:98:6f:e9: e1:ce:34:ce:8e:b5:67:84:f1:9e:d3:16:89:d0:d5:5f: 2f:be:6b:4e:53:6e:10:a2:e5:85:b2:e6:01:aa:22:17: 1f:6f:7e:53:e2:50:18:be:8c:1b:ac:08:ea:a7:70:b5: 04:23:b2:e0:e6:e5:48:15:15:bd:48:3c:8f:43:07:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:2e:87:98:89:b8:fc:30:dc:f8:d0:a6:b7:10:e3:69: 93:3b:ea:08:04:3e:f5:0c:9a:6c:ab:40:09:5a:ed:e0: eb:fc:aa:97:a3:0d:02:0e:37:ec:a5:3f:8c:8f:1f:86: 19:a6:2a:f6:c8:a6:81:e3:75:48:e7:a0:58:81:20:2a: 26:11:a5:b4:cc:37:77:35:34:d7:d5:4b:e2:7e:1a:20: 60:53:8d:9b:92:2f:65:61:b4:99:33:2d:b9:e1:5e:5a: 73:ab:59:45:b5:5a:bf:52:1c:47:e4:6c:22:d1:7e:55: 03:00:94:7c:8b:ad:57:4d:11:2a:ee:d7:84:9a:12:5d: b4:9a:c1:e3:d4:bd:ff:64:ae:10:ac:cc:ee:e9:d7:2f: ec:ac:e3:8a:d1:f3:52:6a:3c:05:c7:94:41:c5:e4:8b: c7:57:28:60:db:a3:f0:4e:90:8b:5f:6b:c9:42:6b:61: 6e:b1:51:a7:ad:45:35:61:4e:4c:94:14:9e:8d:0a:d2: e1:8a:cd:b4:b1:08:8a:e7:13:09:c8:94:ff:8b:64:97: 14:02:0d:7a:18:a7:e0:95:b4:2f:97:32:2a:14:d4:dd: 75:e5:44:a8:2a:f1:04:e9:c1:bb:73:64:4d:4f:36:6b: f1:fa:96:1d:fb:e3:70:cc:1f:d0:f3:fe:57:e3:a5:e9 Fingerprint (SHA-256): 9F:93:E3:D1:6A:22:F6:45:0D:26:D3:41:AF:DD:BA:7E:E4:E6:CD:E2:0B:F6:27:D2:BB:95:8D:F6:CD:1C:B2:CB Fingerprint (SHA1): D5:FB:D0:9C:08:B1:27:DC:4F:BC:2F:D2:95:B5:9C:1D:0C:E5:49:C3 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5432: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #5433: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #5434: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #5435: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3e:bf Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Apr 25 16:49:39 2016 Not After : Mon Jul 25 16:49:39 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:68:f7:e6:bb:47:36:e8:e4:69:cd:45:69:48:18:1f: 9a:61:63:31:06:19:5a:91:76:1f:2f:f2:b4:9d:6a:d4: c6:84:87:4e:da:81:b6:04:38:77:3e:67:84:bd:81:f7: 9f:e5:35:de:8f:7c:04:e5:70:32:f4:35:68:ea:ec:8a: 49:20:64:c5:9a:25:e0:7e:03:e9:93:23:6a:aa:a4:6d: 1f:4a:55:89:bb:9c:29:23:0d:93:23:86:ec:bc:be:42: 9b:10:e3:88:59:33:37:91:1b:fa:b4:d1:af:8e:2e:ee: 23:d1:70:5a:d0:69:31:fc:24:65:3e:5d:b3:2a:86:31: 7d:3a:3a:70:cf:e9:a8:76:34:a3:aa:9e:f6:c0:2a:65: 90:f3:3a:8b:79:da:85:ef:e8:9e:bd:dc:6f:f5:d8:10: f8:79:5b:3d:f8:b9:54:e3:03:5e:c6:d6:73:45:65:69: 53:63:e2:6f:d3:47:78:2b:1e:23:19:86:a4:53:51:ac: 0d:d5:b9:7a:60:2b:f7:08:43:46:c0:b7:3f:21:88:d1: 90:54:c0:7d:16:90:19:ab:9f:59:de:10:6e:7b:24:f6: 4b:fd:52:34:b2:76:bc:9b:62:59:72:a9:89:aa:a0:41: 14:e9:ce:47:46:f1:b8:91:04:7a:9f:0c:74:87:cc:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:4e:3e:e5:eb:3d:68:f6:88:3e:78:cf:d9:ac:c4:1c: 11:14:b0:67:ad:e2:64:fc:6b:9c:ab:83:ff:77:13:d1: 9b:cd:1a:dd:0a:7b:03:cb:c3:6e:dd:54:74:46:58:bc: ee:1b:15:26:6d:12:46:b2:5a:80:6d:d2:33:0f:d1:f5: 33:4b:7a:61:13:3b:fc:00:34:22:15:4d:18:27:95:f6: 24:86:41:05:db:bc:10:51:59:4a:91:21:99:46:59:59: a8:89:a5:26:88:3f:a7:dc:8f:40:47:64:04:8f:ab:9e: ac:3f:60:c9:ff:e8:c3:dd:8c:79:7e:1f:3a:00:5c:bf: c8:74:53:64:ac:9a:39:04:18:73:fd:cc:08:cd:2d:20: f6:3c:b9:35:f7:c8:a3:44:30:e6:18:d9:98:65:88:ac: 44:fe:fb:41:b6:91:78:5f:c5:e1:51:be:46:da:75:59: ea:5f:a1:1a:1e:b2:a0:c9:9b:3a:a3:bf:40:57:7d:dd: 13:52:9a:c8:1b:e3:0a:ee:81:16:b2:6f:87:7d:4f:0b: 2f:7c:61:9c:e5:35:d6:59:62:92:d3:8f:d6:1e:6d:af: 75:eb:f0:80:51:42:3d:5f:ec:81:6b:4e:e6:de:99:f7: b7:f6:8d:cb:ec:d6:82:2e:f5:15:b7:03:11:bb:11:2d Fingerprint (SHA-256): D4:52:72:9B:BB:F4:F0:98:6B:02:12:02:E5:7D:CA:C9:3B:82:DE:4D:9B:E9:82:99:E0:35:D1:BB:73:BA:BB:57 Fingerprint (SHA1): 7C:47:45:2F:53:74:AE:9E:0D:C5:92:70:77:37:A9:55:98:73:03:09 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5436: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #5437: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #5438: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #5439: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #5440: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #5441: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #5442: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #5443: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:3f:0a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Apr 25 16:50:15 2016 Not After : Mon Jul 25 16:50:15 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:ba:03:38:69:4b:46:27:70:4e:29:82:7a:d6:4b:9b: 1a:c2:0d:e9:74:20:6c:8d:d2:f0:89:3b:01:26:df:b4: 44:4f:40:7a:54:25:92:bc:7d:6b:6b:34:b9:5a:ca:82: 40:a8:d6:28:91:21:38:04:d9:30:7e:9b:f4:a6:9f:c4: a5:81:c7:0c:b2:04:7b:dd:78:6d:48:d3:fe:b9:41:e6: 32:6d:2f:ab:b7:6c:3b:45:23:22:1b:5b:28:90:81:d0: 75:65:ec:02:be:10:5f:99:ad:83:43:99:67:5d:29:72: 85:7d:4f:6f:be:e4:47:6c:27:72:51:a5:bc:7c:0e:25: 03:c3:c9:91:c6:19:d4:73:34:0d:51:fa:48:43:06:e5: 56:40:75:45:e7:e9:82:1d:18:37:62:5b:53:e9:ee:7b: b6:fa:09:9b:fd:3b:f8:cd:00:db:91:8b:0a:1e:81:f7: cf:f3:f4:0e:d1:34:5a:0f:28:c9:2e:ef:78:35:e1:5d: 3f:90:18:7d:07:96:03:5a:6d:d3:2b:cb:e3:c9:84:58: d0:d0:92:80:3b:97:d3:9b:18:29:de:1e:0b:13:7c:fb: 37:5c:83:72:9d:b1:b9:5f:f7:f1:87:36:66:9e:33:c2: b5:74:a3:3c:ce:ae:b4:ed:76:e7:06:1c:b8:97:65:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:dc:0f:ad:e0:12:6f:a4:58:93:7f:c8:d5:01:7a:60: 9e:5e:46:a1:ab:64:02:8c:a1:94:0e:28:85:99:f7:88: 8b:b7:55:bb:5b:e1:93:76:c9:55:6e:43:5e:76:7d:d3: 29:6d:29:eb:04:f4:87:b4:c1:8e:f7:10:a2:5f:4b:26: 91:15:1d:8c:fe:9f:e3:f0:a8:7c:b8:df:2f:38:47:e1: 50:05:51:70:56:17:85:df:49:fd:14:ba:87:be:67:92: 2b:c5:ab:d7:be:f2:75:81:9e:c5:9e:0d:0c:99:76:e9: a0:d6:83:41:88:7a:58:b5:bc:d5:a8:5d:4b:f7:15:b8: 4b:8f:12:5f:81:72:f8:09:ca:a3:cf:08:9f:1b:fc:73: a6:57:3d:d3:8a:e3:e5:3e:77:98:a4:18:7a:61:e0:b8: 05:de:91:6d:d4:a9:1b:d1:7d:38:b1:4b:22:85:ea:35: eb:f3:a4:f8:b1:86:f8:89:09:a4:2f:8b:87:25:74:20: 98:cb:c4:bf:08:f7:fe:c7:57:d0:d2:83:21:ec:46:4d: a1:d1:5d:c2:d3:89:64:43:4b:c1:10:7c:a5:32:d7:b3: c0:2d:0e:31:c2:a4:6c:bc:3c:25:b6:29:2d:41:f2:31: b5:3b:a0:73:12:5d:5d:5a:6a:81:89:4c:34:eb:63:bd Fingerprint (SHA-256): B2:4E:3D:1F:26:D8:06:79:E9:A2:6D:19:5E:1A:DC:72:4E:EB:85:87:56:9D:DB:41:2C:DD:46:92:AC:47:DB:3E Fingerprint (SHA1): 64:65:5B:89:54:5F:6A:9C:5D:A3:0F:7C:A1:86:6F:E4:0F:18:29:5E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #5444: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #5445: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #5446: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #5447: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5448: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #5449: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #5450: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #5451: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5452: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #5453: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #5454: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #5455: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #5456: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #5457: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #5458: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5459: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #5460: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5461: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5462: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #5463: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5464: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5465: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #5466: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5467: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5468: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #5469: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5470: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5471: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #5472: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5473: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #5474: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #5475: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5476: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #5477: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5478: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #5479: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5480: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5481: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5482: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5483: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5484: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #5485: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #5486: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5487: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5488: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5489: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5490: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #5491: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #5492: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #5493: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5494: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #5495: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5496: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5497: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #5498: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5499: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5500: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #5501: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5502: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5503: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #5504: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5505: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5506: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #5507: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5508: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5509: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #5510: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5511: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5512: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #5513: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5514: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5515: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #5516: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5517: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5518: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #5519: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5520: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5521: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #5522: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5523: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5524: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #5525: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5526: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5527: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #5528: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5529: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5530: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #5531: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5532: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5533: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #5534: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5535: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5536: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #5537: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5538: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5539: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #5540: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5541: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5542: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #5543: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5544: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5545: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #5546: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5547: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5548: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #5549: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5550: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5551: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #5552: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5553: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5554: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #5555: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5556: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5557: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #5558: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5559: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5560: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #5561: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5562: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5563: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #5564: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5565: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5566: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #5567: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5568: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5569: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #5570: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5571: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5572: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #5573: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5574: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5575: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #5576: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5577: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5578: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #5579: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5580: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5581: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #5582: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5583: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5584: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #5585: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5586: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5587: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #5588: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5589: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5590: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #5591: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5592: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5593: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #5594: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5595: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5596: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #5597: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5598: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5599: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #5600: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5601: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5602: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #5603: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5604: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5605: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #5606: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5607: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5608: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #5609: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5610: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5611: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #5612: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5613: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5614: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #5615: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5616: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5617: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #5618: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5619: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5620: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #5621: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5622: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5623: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #5624: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5625: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5626: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #5627: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5628: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5629: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #5630: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5631: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5632: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #5633: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5634: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5635: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #5636: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5637: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5638: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #5639: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5640: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5641: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #5642: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5643: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5644: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #5645: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5646: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5647: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #5648: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5649: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5650: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #5651: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5652: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5653: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #5654: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5655: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5656: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #5657: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5658: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5659: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #5660: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5661: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5662: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #5663: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5664: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5665: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #5666: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5667: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5668: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #5669: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5670: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5671: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #5672: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5673: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5674: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #5675: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5676: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5677: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #5678: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5679: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5680: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #5681: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5682: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5683: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #5684: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5685: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #5686: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #5687: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #5688: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #5689: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #5690: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #5691: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #5692: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #5693: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #5694: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #5695: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #5696: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #5697: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #5698: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #5699: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #5700: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #5701: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #5702: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #5703: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #5704: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #5705: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Apr 25 16:55:34 UTC 2016 Checking if dbtests should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Checking if tools should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Running tests for tools TIMESTAMP tools BEGIN: Mon Apr 25 16:55:34 UTC 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5706: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 04:a5:3c:7b:19:06:11:94:60:8b:2d:7e:51:13:54:30 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5707: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5708: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5709: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5710: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: df:f4:66:6c:6c:df:6b:a9:bc:1c:0f:71:c7:fa:dd:6b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Apr 25 16:43:23 2016 Not After : Sun Apr 25 16:43:23 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:e0:ff:bf:9e:97:b4:b4:d1:7f:fb:ed:26:60:49: 45:3d:3e:cb:e3:29:5d:fc:79:6b:e0:3b:a2:46:a6:ba: 2f:3b:b7:b3:8c:88:ef:03:03:76:fa:21:ed:ef:8e:35: e8:b9:23:3e:61:68:36:45:d2:07:2d:ae:fc:e8:b4:fd: 35:4d:80:00:30:4e:f5:2f:73:9f:ff:be:9c:3a:3c:d0: 24:5e:f2:4c:96:cb:bc:18:ef:02:61:f0:91:4a:81:e7: 03:13:dc:63:78:af:c6:6c:98:c6:cd:61:6b:40:09:05: c5:cf:f5:66:7d:b9:6f:eb:ea:e1:ce:67:42:b8:e8:4d: e0:12:2a:65:75 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:f2:ee:ad:3a:97:9a:79:30:d4:14: ac:cb:1e:3a:a9:7d:0a:42:a6:bd:ad:3c:9b:ac:ec:c9: 9d:47:57:95:59:8b:1e:d7:b6:86:ca:e4:97:60:5d:66: 83:a8:93:2f:18:88:74:97:51:0b:b6:f6:7e:a2:91:79: 85:da:1d:60:58:9d:bb:02:42:00:86:b4:8d:31:5b:1f: 74:ae:0b:0c:f2:fd:55:6d:8b:18:ba:2c:da:b6:c7:ef: f9:d5:f9:04:7e:33:c7:e1:83:2e:5f:9d:42:a0:08:4b: 0b:74:e0:f3:24:0d:39:3e:f0:29:b5:ce:c3:f8:c0:18: 65:fa:d4:d3:a6:47:85:59:8e:68:bd Fingerprint (SHA-256): 6D:CB:A3:BB:FA:51:89:CA:05:A8:91:EB:80:80:9D:9E:A8:BC:50:A6:01:2C:DA:A4:6F:7C:7D:5D:33:A4:DF:CC Fingerprint (SHA1): F0:E5:75:55:4A:86:F1:1F:5C:DE:B8:4B:CE:50:99:14:53:79:14:6D Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Apr 25 16:45:31 2016 Not After : Sun Apr 25 16:45:31 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:df:2e:26:de:db:c0:e5:dc:65:21:2b:df:ab:0f:8f: 84:72:4f:b1:c4:b4:0d:3d:7b:26:39:2c:dd:03:68:6f: 16:1b:f5:0f:b4:cd:54:d9:24:80:19:09:ac:48:0f:c7: 68:c8:3c:ab:67:2b:4c:6b:1a:25:50:50:97:79:02:17: 8f:a4:5a:a3:e7:7d:d2:9f:25:a0:59:40:d7:20:8c:28: fe:21:2c:9b:d0:a7:c9:d3:cc:50:d3:e8:54:a0:f5:c6: 86 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:87:02:42:00:b9:b8:1e:9d:5f:c8:a0:22:17:78: b8:ae:f3:43:03:8f:f5:d7:88:f3:a0:0b:eb:2a:1d:ec: e9:7e:5e:c3:8e:e6:30:9a:be:f2:bc:3a:0c:6f:3c:62: 14:10:4a:c1:4e:8a:0f:7e:73:3e:27:28:85:df:46:d0: da:be:03:70:34:37:28:02:41:5e:88:04:2f:ae:b5:bb: a9:56:be:54:bf:3c:cd:f0:9f:87:97:09:eb:7d:2a:cb: f6:94:e1:13:02:5f:99:a0:1e:e5:2f:37:01:88:ae:92: c8:8d:88:b0:25:c4:f1:4e:97:27:5d:a2:62:ed:60:eb: 63:9c:60:2c:be:26:b9:c7:03:33 Fingerprint (SHA-256): 72:7B:1D:58:C5:84:56:C8:A1:34:59:AE:57:18:44:4B:98:D0:B5:A3:8F:FC:7A:1F:F2:45:28:74:F5:2C:81:78 Fingerprint (SHA1): 96:9B:C1:E9:51:D9:38:ED:21:29:44:42:47:BD:18:24:80:92:61:E3 Friendly Name: Alice-ec tools.sh: #5711: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5712: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: aa:27:80:df:75:01:b0:09:8a:8a:ed:08:f3:d6:be:26 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5713: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5714: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5715: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9d:9b:d6:9c:64:f9:d0:ec:f2:a2:06:ca:89:f2:01:58 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5716: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5717: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5718: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 6b:79:92:87:61:b4:f4:4e:b8:5f:e1:c9:61:0d:1c:35 Iteration Count: 2000 (0x7d0) tools.sh: #5719: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5720: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5721: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:33:f1:e3:58:6d:4c:d3:7a:9e:ef:e5:26:ee:8e:76 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5722: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5723: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5724: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:56:ae:55:29:47:dd:ea:86:27:3e:00:8b:d8:0c:fc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5725: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5726: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5727: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: df:fa:de:e4:c3:d9:ee:17:47:03:7b:8c:c6:91:47:bc Iteration Count: 2000 (0x7d0) tools.sh: #5728: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5729: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5730: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9a:74:d6:f2:47:2e:0b:98:3d:61:a2:18:91:45:b3:cd Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:1a:3f:75:0a:41:c4:f3:61:43:8f:60:a3:5a:47: 1c:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5731: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5732: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5733: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2c:c7:b8:db:41:7a:56:a0:b7:54:0a:7f:90:ee:76:00 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:c0:7f:b4:f8:d1:e0:53:d8:a9:ad:de:46:19:61: cc:64 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5734: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5735: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5736: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d5:51:f4:99:1e:cb:72:29:45:56:a4:fe:3e:a0:7e:56 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:56:6f:94:58:14:4b:8e:c8:8a:d7:f6:18:c7:75: 21:07 tools.sh: #5737: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5738: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5739: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:43:01:3d:56:4f:51:65:e7:28:9d:53:9c:21:ba:6a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:1f:be:dc:60:11:b1:8b:61:d5:33:ea:00:ed:d4: 42:c1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5740: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5741: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5742: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 41:b1:bf:25:8c:07:63:ae:b4:7b:9c:d2:6b:b8:f2:9f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:24:df:05:0c:b7:6b:93:36:c7:5d:ac:1a:6c:4a: f8:6c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5743: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5744: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5745: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:0e:10:47:06:5a:8e:ee:d6:66:0f:88:1f:34:72:c6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:b7:6a:b8:51:4c:43:ab:bf:75:91:ff:4c:2b:9b: f2:49 tools.sh: #5746: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5747: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5748: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b0:39:9d:cf:ea:8e:b6:85:1e:c3:6c:7a:a7:3a:3f:fb Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d7:b9:92:91:a4:fe:61:63:c2:4d:5b:00:94:aa: 4a:d2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5749: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5750: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5751: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 13:ff:cd:c9:76:57:b6:93:46:33:0f:f5:22:9f:38:3d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f3:b2:da:db:df:85:40:da:65:a5:cf:0c:2c:01: ee:15 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5752: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5753: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5754: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 32:45:fb:d7:1b:b5:dc:8e:3e:3c:e2:cc:26:c1:a6:5d Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:98:8a:9f:1a:10:fc:e9:f3:70:ed:d3:90:8f:8d: 87:57 tools.sh: #5755: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5756: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5757: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 45:9e:04:5a:dd:d2:e6:b3:74:52:11:c1:66:ce:c9:4a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:29:52:db:09:78:99:d0:67:c7:e6:bc:f5:cb:b2: b4:eb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5758: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5759: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5760: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a3:94:40:82:8f:0f:a6:4c:93:06:9b:11:10:17:1d:20 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:6f:03:f8:8b:e5:5a:da:10:63:3f:58:e8:3f:06: fe:1a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5761: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5762: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5763: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:f3:9d:5f:6c:0b:17:da:0c:ca:03:29:a4:c6:62:33 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:b1:3c:f9:0d:df:9b:55:a0:6d:21:9c:2a:97:e4: 70:1f tools.sh: #5764: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5765: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5766: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:dc:d5:72:17:ee:dc:c4:66:15:66:11:af:61:59:f8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:38:94:d7:22:7f:af:81:33:3f:81:2f:f3:8c:36: 27:b3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5767: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5768: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5769: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7e:0a:04:83:fa:03:0d:91:27:bc:11:c5:15:36:91:dd Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:0c:27:cc:48:4b:d5:f6:e1:b4:3f:d0:35:4e:84: d0:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5770: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5771: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5772: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 81:c0:a3:ae:11:0a:ad:6b:3a:da:8b:1f:ce:af:27:0b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:b5:46:60:1f:95:58:57:48:46:73:64:6d:fd:56: e7:c7 tools.sh: #5773: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5774: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5775: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2a:16:54:f7:02:cf:1f:7d:d4:97:fc:33:6b:7b:5b:67 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:b8:ea:67:4a:2f:9c:12:8b:61:f1:12:b9:d4:ba: 21:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5776: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5777: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5778: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2e:91:7f:4f:cf:7c:ab:9b:90:5b:82:e0:95:f2:d1:56 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:19:21:f7:34:3a:7d:2d:79:cd:d4:1a:f8:14:49: 29:b1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5779: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5780: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5781: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c6:2b:c7:be:96:ef:be:7d:cb:77:9a:9e:7e:29:62:d0 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:39:cc:da:f5:01:a6:0e:f8:a9:dd:f5:b4:a3:dc: f3:9a tools.sh: #5782: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5783: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5784: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: fb:07:ac:03:b0:42:91:80:cf:17:3f:7e:92:22:bf:b2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5785: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5786: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5787: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 06:a5:57:4e:32:38:ae:07:4e:26:11:29:89:d0:f4:78 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5788: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5789: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5790: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 5b:44:a4:27:4d:e0:57:fa:60:27:b3:6e:ca:74:24:29 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5791: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5792: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5793: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: bd:99:fe:5f:af:50:f7:63:98:a5:c7:b8:a0:c6:f3:03 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5794: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5795: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5796: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d7:35:23:97:08:c1:49:04:19:1a:dd:ed:e0:67:af:a7 Iteration Count: 2000 (0x7d0) tools.sh: #5797: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5798: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5799: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ba:67:89:4e:c0:3d:b8:18:8f:fb:a3:5e:35:bd:59:d2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5800: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5801: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5802: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 46:ed:2a:de:ce:e4:3a:68:f4:0c:f7:66:7f:d7:3b:dc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5803: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5804: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5805: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 3b:db:79:9a:f8:47:b6:c0:d5:f5:70:9f:27:9d:c9:ad Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5806: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5807: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5808: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b2:10:fe:df:b4:93:98:ab:4b:1b:b3:3a:23:8e:eb:b0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5809: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5810: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5811: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 05:a8:13:0f:c7:06:b4:7f:fc:04:0b:d0:07:1b:1f:67 Iteration Count: 2000 (0x7d0) tools.sh: #5812: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5813: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5814: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 44:fb:40:e7:4d:a2:e5:16:69:2b:2d:e1:ca:b8:00:11 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5815: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5816: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5817: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 60:49:f8:db:77:c0:41:6d:9f:b5:1c:01:ac:a2:ef:5f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5818: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5819: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5820: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 12:a9:03:3f:68:2d:2a:e9:56:84:37:d2:b5:ba:37:6a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5821: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5822: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5823: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b6:c9:12:c3:79:88:53:a3:70:37:8e:bb:84:14:ef:b1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5824: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5825: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5826: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 37:18:6a:d6:8f:96:ee:95:b2:7b:a0:db:33:4d:bf:0e Iteration Count: 2000 (0x7d0) tools.sh: #5827: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5828: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5829: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:5c:c5:5e:ae:4c:d3:dd:b8:56:4d:c1:1a:63:6f:01 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5830: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5831: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5832: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2a:79:e3:ef:99:8d:16:2e:f6:2f:9f:b9:de:a6:95:4a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5833: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5834: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5835: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2d:ff:50:7a:af:8f:12:df:91:74:af:cb:3e:05:b1:41 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5836: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5837: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5838: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:d9:33:40:5f:b4:83:15:e5:df:19:3a:e8:26:77:60 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5839: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5840: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5841: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 55:b7:6a:da:0f:fc:67:d9:5b:2b:7a:02:b5:2c:c1:f1 Iteration Count: 2000 (0x7d0) tools.sh: #5842: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5843: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5844: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 20:d2:f7:98:86:c5:d6:91:03:e0:e1:77:62:b3:a5:79 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5845: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5846: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5847: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3f:bd:cd:97:76:5d:15:a4:37:55:dd:95:7f:56:4c:1f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5848: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5849: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5850: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b7:7e:98:59:7a:6c:3b:88:94:c7:f5:11:12:28:b9:27 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5851: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5852: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5853: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 55:c1:8e:74:de:46:41:84:ce:2a:3b:72:dc:54:d6:cc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5854: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5855: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5856: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:30:38:87:66:87:11:e7:95:32:df:42:b2:0e:ef:d9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5857: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5858: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5859: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bb:aa:d0:07:86:d7:85:10:eb:cc:4d:f1:fb:fe:a1:c6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5860: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5861: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5862: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:69:76:8e:49:6b:f5:3d:99:38:d4:e2:6a:80:3c:28 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5863: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5864: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5865: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:41:70:36:17:4f:0a:22:5b:9a:c7:55:08:10:b3:7c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5866: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5867: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5868: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 71:2a:7e:f8:ff:7f:86:75:3a:58:f9:7c:1b:c1:92:ad Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5869: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5870: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5871: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 00:17:70:78:de:a3:8a:44:7c:f7:12:98:84:5f:79:f0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:42:04 2016 Not After : Sun Apr 25 16:42:04 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:b2:b4:88:a7:f8:9e:b8:67:93:e3:56:60:b3:a1:6d: 22:f1:90:3a:a1:2c:bc:a4:91:da:7e:9b:86:21:22:f5: 35:f5:3b:d9:53:bb:f3:44:8e:c1:f6:4b:84:d7:92:b7: c2:5e:51:7d:e9:4a:fe:5b:ad:2c:17:6d:16:6d:17:1f: 1c:7b:cf:25:09:60:d3:0b:d8:a5:e9:ab:90:01:82:e9: 7b:fa:11:53:70:06:d0:15:3d:96:ba:ad:12:54:c8:f9: 88:18:23:4b:27:eb:99:2a:63:e7:b0:86:ac:1e:f5:35: a1:9d:34:53:a5:59:c5:fc:ae:69:47:fb:d4:2f:71:fa: bd:23:73:c1:4d:de:07:ec:4a:9f:b4:08:ee:95:d5:20: 31:32:b9:8b:c8:dc:fd:93:8d:0f:04:a6:a0:87:69:8f: 54:09:19:53:89:64:b7:10:3b:41:a8:e9:0f:96:ec:23: 6c:08:33:d6:a0:67:c7:9c:bb:84:56:10:3f:bf:ab:a3: 39:7a:c5:2f:ef:c8:64:62:f7:64:80:cd:90:89:83:75: a9:0b:5d:ab:7c:ce:f9:7b:74:5c:a2:87:2e:a8:99:2b: 21:b7:2e:0b:7d:27:d6:67:8e:c3:f0:08:d7:3d:7b:1a: bd:e8:3c:2c:b2:cb:c2:70:f2:93:89:89:51:d7:73:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:51:7f:f6:6a:e8:89:7e:34:94:7f:38:7c:fb:57:c2: 05:d4:71:c0:ed:71:71:1c:d0:51:5f:a9:bd:72:a1:2e: 6d:c1:61:9a:84:39:6b:d9:4d:7a:26:99:1c:47:31:75: 09:6a:f7:52:9e:cb:4e:51:b5:f2:8c:f8:36:53:1f:99: a0:e1:af:82:74:3e:23:04:75:3a:bd:36:5e:88:79:12: d9:2f:2e:bb:2a:7f:15:da:04:a2:fb:7f:ff:20:91:35: cb:5d:76:9f:da:d2:57:8e:1c:e9:9a:66:06:73:06:b3: 45:5c:35:66:d6:ba:47:8d:76:da:55:59:b9:83:eb:bd: 4e:c7:33:df:91:f9:91:dd:11:95:f9:72:c7:71:05:27: e7:11:e1:33:6a:1c:73:91:c4:04:88:98:69:87:b4:66: 4e:e5:60:0f:15:cc:cc:3e:92:25:4b:ed:b3:cd:0a:39: fb:30:7b:45:fd:ed:0f:e8:ce:9e:4f:d4:71:a5:8d:58: 84:b3:f9:eb:d8:b2:75:fd:b9:eb:0a:a1:96:1e:ec:c7: 2b:c8:90:4e:dc:6e:5f:09:89:04:b9:a6:8a:b3:a4:86: af:40:24:ec:bd:c0:24:8a:66:7a:4d:3b:5c:a4:06:ed: 39:64:06:77:62:9a:fc:12:49:e9:f6:13:76:7f:7d:1b Fingerprint (SHA-256): 1A:ED:83:4A:A8:8F:27:E5:D7:84:4C:86:94:A9:6A:3F:73:5D:E0:F9:2E:4B:2C:B9:61:01:49:AB:29:AE:F6:C4 Fingerprint (SHA1): 2A:30:2C:F8:4F:27:5E:24:15:44:AC:84:B1:6D:0B:4D:28:3B:32:4C Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 16:45:26 2016 Not After : Sun Apr 25 16:45:26 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:95:b5:62:10:82:c8:34:6e:45:06:a2:90:87:76: ae:b3:ff:4c:15:d5:ea:eb:96:28:ea:fa:fc:9a:73:64: f6:b3:64:ad:5a:da:2f:32:4c:11:3b:84:f0:84:45:26: 21:60:8c:10:1d:50:0d:ff:ba:20:90:16:59:fb:69:16: 74:5d:62:06:ef:1b:ce:3c:58:66:8e:5e:15:94:66:a1: 0c:54:f9:a8:73:c3:b6:8c:b3:62:14:be:4b:c1:23:f2: ca:b4:9b:a4:a1:90:76:2a:9f:8f:19:28:f4:8c:b7:84: c1:21:db:8e:15:b5:a9:aa:fd:b1:1c:ee:c5:f8:81:71: 79:c0:ba:c1:af:91:a8:5d:fe:2c:51:7c:b6:9a:e9:79: 34:4f:32:b3:a4:e9:bb:17:7f:9d:cd:22:2d:c8:6d:f0: f0:60:b8:0c:4c:a5:3d:06:dc:d6:dc:6f:6b:8a:c3:35: 87:c3:11:6a:44:54:d2:2f:20:64:f3:74:13:68:ed:50: e5:7e:a4:89:a4:b4:ea:1b:83:9c:ee:1d:24:45:f9:07: fd:42:64:cc:49:c5:d0:3f:fb:1b:78:bd:9c:69:ae:02: 47:bc:b7:5c:b2:9f:0d:43:9f:a3:cd:86:2d:f7:2d:6b: c1:40:4e:7e:8c:d1:c9:5c:74:39:d8:cd:3b:bd:ba:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0b:57:8a:70:07:6d:25:64:87:54:09:44:bd:2d:2f: 1f:cf:c7:8a:c1:09:bf:67:b9:fa:03:36:e3:fa:98:0c: ed:c9:fa:e6:ee:19:d0:a0:7a:3a:9f:f1:fa:86:25:9f: 58:b1:4e:80:bd:2c:ac:12:9e:15:b1:10:ef:cb:0b:25: 9a:6a:02:8b:0d:fa:bc:39:30:d7:fb:61:95:43:93:18: 0d:7b:75:25:5d:94:b2:cc:47:cc:6e:41:ca:19:b6:9a: 85:bd:4c:9d:f6:32:05:0a:20:52:0c:b9:fc:08:58:e0: 4b:cb:62:ef:2d:b5:f4:b9:f3:4e:6f:11:9c:02:2e:b9: 29:2c:fc:4e:01:54:1a:9e:3c:a8:32:6d:d0:fd:64:d1: b1:cb:d4:ae:5c:a6:8c:3d:8b:10:bb:c0:b3:19:ac:69: 3a:ab:ea:bd:98:c9:e9:c6:88:ae:38:c7:4f:f4:ae:07: 2a:ff:61:a4:a8:05:24:12:1a:65:3f:0b:dd:7d:26:ce: 85:78:40:a1:68:4c:52:3f:cd:d9:5c:18:14:e6:ba:ac: 26:42:46:dd:3f:e2:47:48:5e:1c:26:31:d6:16:b1:37: de:f6:cd:42:34:ff:f1:87:22:0e:2d:a7:f9:86:69:2a: cf:26:33:44:d1:a8:e4:43:7a:85:a9:36:c2:50:7b:43 Fingerprint (SHA-256): 5E:2F:F6:9A:31:3C:9D:5D:5D:83:DC:23:94:28:BB:8D:84:C3:0A:9B:EA:AB:CA:6C:CD:47:ED:B3:33:A9:62:FD Fingerprint (SHA1): 5D:77:76:7E:2D:91:3B:7F:84:A3:07:05:32:B1:B3:D0:0E:28:74:13 Friendly Name: Alice tools.sh: #5872: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #5873: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #5874: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5875: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #5876: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #5877: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #5878: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #5879: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #5880: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #5881: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #5882: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Apr 25 16:57:05 UTC 2016 Checking if fips should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Running tests for fips TIMESTAMP fips BEGIN: Mon Apr 25 16:57:05 UTC 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #5883: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #5884: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 373553441c1988b09243767545452e93b76d2797 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #5885: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #5886: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5887: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #5888: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #5889: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #5890: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #5891: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #5892: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #5893: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #5894: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #5895: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 373553441c1988b09243767545452e93b76d2797 FIPS_PUB_140_Test_Certificate fips.sh: #5896: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #5897: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #5898: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #5899: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #5900: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 373553441c1988b09243767545452e93b76d2797 FIPS_PUB_140_Test_Certificate fips.sh: #5901: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #5902: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #5903: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle Changing byte 0x00032fe4 (208868): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #5904: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Apr 25 16:58:17 UTC 2016 Checking if sdr should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Checking if crmf should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Checking if smime should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Checking if ssl should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Running tests for ssl TIMESTAMP ssl BEGIN: Mon Apr 25 16:58:17 UTC 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28943 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28943 found at Mon Apr 25 16:58:18 UTC 2016 selfserv_9709 with PID 28943 started at Mon Apr 25 16:58:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5905: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28943 at Mon Apr 25 16:58:19 UTC 2016 kill -USR1 28943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28943 killed at Mon Apr 25 16:58:19 UTC 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28999 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28999 found at Mon Apr 25 16:58:20 UTC 2016 selfserv_9709 with PID 28999 started at Mon Apr 25 16:58:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5906: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28999 at Mon Apr 25 16:58:21 UTC 2016 kill -USR1 28999 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28999 killed at Mon Apr 25 16:58:21 UTC 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29055 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29055 found at Mon Apr 25 16:58:22 UTC 2016 selfserv_9709 with PID 29055 started at Mon Apr 25 16:58:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5907: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29055 at Mon Apr 25 16:58:23 UTC 2016 kill -USR1 29055 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29055 killed at Mon Apr 25 16:58:23 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:58:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29123 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29123 found at Mon Apr 25 16:58:24 UTC 2016 selfserv_9709 with PID 29123 started at Mon Apr 25 16:58:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5908: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29123 at Mon Apr 25 16:58:25 UTC 2016 kill -USR1 29123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29123 killed at Mon Apr 25 16:58:25 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:58:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29182 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29182 found at Mon Apr 25 16:58:26 UTC 2016 selfserv_9709 with PID 29182 started at Mon Apr 25 16:58:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5909: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29182 at Mon Apr 25 16:58:27 UTC 2016 kill -USR1 29182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29182 killed at Mon Apr 25 16:58:27 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:58:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29239 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29239 found at Mon Apr 25 16:58:28 UTC 2016 selfserv_9709 with PID 29239 started at Mon Apr 25 16:58:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5910: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29239 at Mon Apr 25 16:58:29 UTC 2016 kill -USR1 29239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29239 killed at Mon Apr 25 16:58:30 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29307 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29307 found at Mon Apr 25 16:58:30 UTC 2016 selfserv_9709 with PID 29307 started at Mon Apr 25 16:58:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #5911: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29307 at Mon Apr 25 16:58:31 UTC 2016 kill -USR1 29307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29307 killed at Mon Apr 25 16:58:32 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29363 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29363 found at Mon Apr 25 16:58:32 UTC 2016 selfserv_9709 with PID 29363 started at Mon Apr 25 16:58:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5912: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29363 at Mon Apr 25 16:58:33 UTC 2016 kill -USR1 29363 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29363 killed at Mon Apr 25 16:58:34 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29419 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29419 found at Mon Apr 25 16:58:34 UTC 2016 selfserv_9709 with PID 29419 started at Mon Apr 25 16:58:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #5913: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29419 at Mon Apr 25 16:58:35 UTC 2016 kill -USR1 29419 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29419 killed at Mon Apr 25 16:58:36 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29487 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29487 found at Mon Apr 25 16:58:36 UTC 2016 selfserv_9709 with PID 29487 started at Mon Apr 25 16:58:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5914: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29487 at Mon Apr 25 16:58:37 UTC 2016 kill -USR1 29487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29487 killed at Mon Apr 25 16:58:37 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29543 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29543 found at Mon Apr 25 16:58:38 UTC 2016 selfserv_9709 with PID 29543 started at Mon Apr 25 16:58:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5915: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29543 at Mon Apr 25 16:58:39 UTC 2016 kill -USR1 29543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29543 killed at Mon Apr 25 16:58:39 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29599 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29599 found at Mon Apr 25 16:58:40 UTC 2016 selfserv_9709 with PID 29599 started at Mon Apr 25 16:58:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5916: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29599 at Mon Apr 25 16:58:41 UTC 2016 kill -USR1 29599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29599 killed at Mon Apr 25 16:58:41 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:58:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29667 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29667 found at Mon Apr 25 16:58:42 UTC 2016 selfserv_9709 with PID 29667 started at Mon Apr 25 16:58:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5917: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29667 at Mon Apr 25 16:58:43 UTC 2016 kill -USR1 29667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29667 killed at Mon Apr 25 16:58:43 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:58:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29723 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29723 found at Mon Apr 25 16:58:43 UTC 2016 selfserv_9709 with PID 29723 started at Mon Apr 25 16:58:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5918: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29723 at Mon Apr 25 16:58:44 UTC 2016 kill -USR1 29723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29723 killed at Mon Apr 25 16:58:45 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:58:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29779 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29779 found at Mon Apr 25 16:58:45 UTC 2016 selfserv_9709 with PID 29779 started at Mon Apr 25 16:58:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5919: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29779 at Mon Apr 25 16:58:46 UTC 2016 kill -USR1 29779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29779 killed at Mon Apr 25 16:58:47 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29847 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29847 found at Mon Apr 25 16:58:47 UTC 2016 selfserv_9709 with PID 29847 started at Mon Apr 25 16:58:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #5920: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29847 at Mon Apr 25 16:58:48 UTC 2016 kill -USR1 29847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29847 killed at Mon Apr 25 16:58:49 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29904 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29904 found at Mon Apr 25 16:58:49 UTC 2016 selfserv_9709 with PID 29904 started at Mon Apr 25 16:58:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5921: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29904 at Mon Apr 25 16:58:50 UTC 2016 kill -USR1 29904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29904 killed at Mon Apr 25 16:58:51 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29960 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29960 found at Mon Apr 25 16:58:51 UTC 2016 selfserv_9709 with PID 29960 started at Mon Apr 25 16:58:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #5922: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 29960 at Mon Apr 25 16:58:52 UTC 2016 kill -USR1 29960 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29960 killed at Mon Apr 25 16:58:53 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30028 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30028 found at Mon Apr 25 16:58:53 UTC 2016 selfserv_9709 with PID 30028 started at Mon Apr 25 16:58:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5923: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30028 at Mon Apr 25 16:58:54 UTC 2016 kill -USR1 30028 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30028 killed at Mon Apr 25 16:58:54 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30084 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30084 found at Mon Apr 25 16:58:55 UTC 2016 selfserv_9709 with PID 30084 started at Mon Apr 25 16:58:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5924: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30084 at Mon Apr 25 16:58:56 UTC 2016 kill -USR1 30084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30084 killed at Mon Apr 25 16:58:56 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:58:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30140 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30140 found at Mon Apr 25 16:58:57 UTC 2016 selfserv_9709 with PID 30140 started at Mon Apr 25 16:58:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5925: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30140 at Mon Apr 25 16:58:57 UTC 2016 kill -USR1 30140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30140 killed at Mon Apr 25 16:58:58 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:58:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:58:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30208 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30208 found at Mon Apr 25 16:58:58 UTC 2016 selfserv_9709 with PID 30208 started at Mon Apr 25 16:58:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5926: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30208 at Mon Apr 25 16:58:59 UTC 2016 kill -USR1 30208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30208 killed at Mon Apr 25 16:59:00 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30264 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30264 found at Mon Apr 25 16:59:00 UTC 2016 selfserv_9709 with PID 30264 started at Mon Apr 25 16:59:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5927: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30264 at Mon Apr 25 16:59:01 UTC 2016 kill -USR1 30264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30264 killed at Mon Apr 25 16:59:01 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30333 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30333 found at Mon Apr 25 16:59:02 UTC 2016 selfserv_9709 with PID 30333 started at Mon Apr 25 16:59:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5928: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30333 at Mon Apr 25 16:59:03 UTC 2016 kill -USR1 30333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30333 killed at Mon Apr 25 16:59:03 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30401 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30401 found at Mon Apr 25 16:59:04 UTC 2016 selfserv_9709 with PID 30401 started at Mon Apr 25 16:59:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #5929: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30401 at Mon Apr 25 16:59:04 UTC 2016 kill -USR1 30401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30401 killed at Mon Apr 25 16:59:05 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30457 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30457 found at Mon Apr 25 16:59:05 UTC 2016 selfserv_9709 with PID 30457 started at Mon Apr 25 16:59:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5930: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30457 at Mon Apr 25 16:59:06 UTC 2016 kill -USR1 30457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30457 killed at Mon Apr 25 16:59:07 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30513 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30513 found at Mon Apr 25 16:59:07 UTC 2016 selfserv_9709 with PID 30513 started at Mon Apr 25 16:59:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #5931: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30513 at Mon Apr 25 16:59:08 UTC 2016 kill -USR1 30513 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30513 killed at Mon Apr 25 16:59:08 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30582 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30582 found at Mon Apr 25 16:59:09 UTC 2016 selfserv_9709 with PID 30582 started at Mon Apr 25 16:59:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5932: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30582 at Mon Apr 25 16:59:10 UTC 2016 kill -USR1 30582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30582 killed at Mon Apr 25 16:59:10 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30638 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30638 found at Mon Apr 25 16:59:11 UTC 2016 selfserv_9709 with PID 30638 started at Mon Apr 25 16:59:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5933: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30638 at Mon Apr 25 16:59:11 UTC 2016 kill -USR1 30638 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30638 killed at Mon Apr 25 16:59:12 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30694 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30694 found at Mon Apr 25 16:59:12 UTC 2016 selfserv_9709 with PID 30694 started at Mon Apr 25 16:59:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5934: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30694 at Mon Apr 25 16:59:13 UTC 2016 kill -USR1 30694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30694 killed at Mon Apr 25 16:59:13 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30762 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30762 found at Mon Apr 25 16:59:14 UTC 2016 selfserv_9709 with PID 30762 started at Mon Apr 25 16:59:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5935: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30762 at Mon Apr 25 16:59:15 UTC 2016 kill -USR1 30762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30762 killed at Mon Apr 25 16:59:15 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30818 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30818 found at Mon Apr 25 16:59:16 UTC 2016 selfserv_9709 with PID 30818 started at Mon Apr 25 16:59:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5936: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30818 at Mon Apr 25 16:59:16 UTC 2016 kill -USR1 30818 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30818 killed at Mon Apr 25 16:59:17 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30874 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30874 found at Mon Apr 25 16:59:17 UTC 2016 selfserv_9709 with PID 30874 started at Mon Apr 25 16:59:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #5937: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30874 at Mon Apr 25 16:59:18 UTC 2016 kill -USR1 30874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30874 killed at Mon Apr 25 16:59:18 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30942 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30942 found at Mon Apr 25 16:59:19 UTC 2016 selfserv_9709 with PID 30942 started at Mon Apr 25 16:59:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #5938: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30942 at Mon Apr 25 16:59:20 UTC 2016 kill -USR1 30942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30942 killed at Mon Apr 25 16:59:20 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30998 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30998 found at Mon Apr 25 16:59:21 UTC 2016 selfserv_9709 with PID 30998 started at Mon Apr 25 16:59:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5939: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30998 at Mon Apr 25 16:59:22 UTC 2016 kill -USR1 30998 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30998 killed at Mon Apr 25 16:59:22 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31054 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31054 found at Mon Apr 25 16:59:23 UTC 2016 selfserv_9709 with PID 31054 started at Mon Apr 25 16:59:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #5940: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 31054 at Mon Apr 25 16:59:23 UTC 2016 kill -USR1 31054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31054 killed at Mon Apr 25 16:59:24 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31125 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31125 found at Mon Apr 25 16:59:24 UTC 2016 selfserv_9709 with PID 31125 started at Mon Apr 25 16:59:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5941: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31125 at Mon Apr 25 16:59:26 UTC 2016 kill -USR1 31125 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31125 killed at Mon Apr 25 16:59:26 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31181 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31181 found at Mon Apr 25 16:59:26 UTC 2016 selfserv_9709 with PID 31181 started at Mon Apr 25 16:59:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5942: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31181 at Mon Apr 25 16:59:28 UTC 2016 kill -USR1 31181 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31181 killed at Mon Apr 25 16:59:28 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31238 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31238 found at Mon Apr 25 16:59:29 UTC 2016 selfserv_9709 with PID 31238 started at Mon Apr 25 16:59:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5943: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31238 at Mon Apr 25 16:59:30 UTC 2016 kill -USR1 31238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31238 killed at Mon Apr 25 16:59:30 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31306 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31306 found at Mon Apr 25 16:59:31 UTC 2016 selfserv_9709 with PID 31306 started at Mon Apr 25 16:59:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5944: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31306 at Mon Apr 25 16:59:32 UTC 2016 kill -USR1 31306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31306 killed at Mon Apr 25 16:59:32 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31362 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31362 found at Mon Apr 25 16:59:33 UTC 2016 selfserv_9709 with PID 31362 started at Mon Apr 25 16:59:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5945: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31362 at Mon Apr 25 16:59:34 UTC 2016 kill -USR1 31362 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31362 killed at Mon Apr 25 16:59:35 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31418 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31418 found at Mon Apr 25 16:59:35 UTC 2016 selfserv_9709 with PID 31418 started at Mon Apr 25 16:59:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5946: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31418 at Mon Apr 25 16:59:36 UTC 2016 kill -USR1 31418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31418 killed at Mon Apr 25 16:59:37 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31486 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31486 found at Mon Apr 25 16:59:37 UTC 2016 selfserv_9709 with PID 31486 started at Mon Apr 25 16:59:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5947: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31486 at Mon Apr 25 16:59:38 UTC 2016 kill -USR1 31486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31486 killed at Mon Apr 25 16:59:39 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31542 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31542 found at Mon Apr 25 16:59:39 UTC 2016 selfserv_9709 with PID 31542 started at Mon Apr 25 16:59:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5948: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31542 at Mon Apr 25 16:59:41 UTC 2016 kill -USR1 31542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31542 killed at Mon Apr 25 16:59:41 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31598 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31598 found at Mon Apr 25 16:59:42 UTC 2016 selfserv_9709 with PID 31598 started at Mon Apr 25 16:59:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5949: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31598 at Mon Apr 25 16:59:43 UTC 2016 kill -USR1 31598 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31598 killed at Mon Apr 25 16:59:43 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31666 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31666 found at Mon Apr 25 16:59:44 UTC 2016 selfserv_9709 with PID 31666 started at Mon Apr 25 16:59:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5950: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31666 at Mon Apr 25 16:59:45 UTC 2016 kill -USR1 31666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31666 killed at Mon Apr 25 16:59:45 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31722 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31722 found at Mon Apr 25 16:59:46 UTC 2016 selfserv_9709 with PID 31722 started at Mon Apr 25 16:59:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5951: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31722 at Mon Apr 25 16:59:47 UTC 2016 kill -USR1 31722 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31722 killed at Mon Apr 25 16:59:47 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31778 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31778 found at Mon Apr 25 16:59:48 UTC 2016 selfserv_9709 with PID 31778 started at Mon Apr 25 16:59:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5952: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31778 at Mon Apr 25 16:59:49 UTC 2016 kill -USR1 31778 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31778 killed at Mon Apr 25 16:59:49 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31847 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31847 found at Mon Apr 25 16:59:50 UTC 2016 selfserv_9709 with PID 31847 started at Mon Apr 25 16:59:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5953: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31847 at Mon Apr 25 16:59:51 UTC 2016 kill -USR1 31847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31847 killed at Mon Apr 25 16:59:52 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31903 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31903 found at Mon Apr 25 16:59:52 UTC 2016 selfserv_9709 with PID 31903 started at Mon Apr 25 16:59:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5954: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31903 at Mon Apr 25 16:59:53 UTC 2016 kill -USR1 31903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31903 killed at Mon Apr 25 16:59:54 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 16:59:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31959 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 31959 found at Mon Apr 25 16:59:54 UTC 2016 selfserv_9709 with PID 31959 started at Mon Apr 25 16:59:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5955: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 31959 at Mon Apr 25 16:59:55 UTC 2016 kill -USR1 31959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31959 killed at Mon Apr 25 16:59:56 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32027 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32027 found at Mon Apr 25 16:59:56 UTC 2016 selfserv_9709 with PID 32027 started at Mon Apr 25 16:59:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5956: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32027 at Mon Apr 25 16:59:57 UTC 2016 kill -USR1 32027 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32027 killed at Mon Apr 25 16:59:58 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 16:59:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 16:59:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32083 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32083 found at Mon Apr 25 16:59:58 UTC 2016 selfserv_9709 with PID 32083 started at Mon Apr 25 16:59:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5957: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32083 at Mon Apr 25 17:00:00 UTC 2016 kill -USR1 32083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32083 killed at Mon Apr 25 17:00:00 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32139 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32139 found at Mon Apr 25 17:00:01 UTC 2016 selfserv_9709 with PID 32139 started at Mon Apr 25 17:00:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5958: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32139 at Mon Apr 25 17:00:02 UTC 2016 kill -USR1 32139 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32139 killed at Mon Apr 25 17:00:02 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32220 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32220 found at Mon Apr 25 17:00:03 UTC 2016 selfserv_9709 with PID 32220 started at Mon Apr 25 17:00:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5959: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32220 at Mon Apr 25 17:00:04 UTC 2016 kill -USR1 32220 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32220 killed at Mon Apr 25 17:00:04 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32276 found at Mon Apr 25 17:00:05 UTC 2016 selfserv_9709 with PID 32276 started at Mon Apr 25 17:00:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5960: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32276 at Mon Apr 25 17:00:06 UTC 2016 kill -USR1 32276 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32276 killed at Mon Apr 25 17:00:07 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32332 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32332 found at Mon Apr 25 17:00:07 UTC 2016 selfserv_9709 with PID 32332 started at Mon Apr 25 17:00:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5961: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32332 at Mon Apr 25 17:00:08 UTC 2016 kill -USR1 32332 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32332 killed at Mon Apr 25 17:00:09 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:00:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32400 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32400 found at Mon Apr 25 17:00:09 UTC 2016 selfserv_9709 with PID 32400 started at Mon Apr 25 17:00:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5962: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32400 at Mon Apr 25 17:00:10 UTC 2016 kill -USR1 32400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32400 killed at Mon Apr 25 17:00:11 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:00:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32457 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32457 found at Mon Apr 25 17:00:11 UTC 2016 selfserv_9709 with PID 32457 started at Mon Apr 25 17:00:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5963: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32457 at Mon Apr 25 17:00:13 UTC 2016 kill -USR1 32457 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32457 killed at Mon Apr 25 17:00:13 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:00:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32513 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32513 found at Mon Apr 25 17:00:13 UTC 2016 selfserv_9709 with PID 32513 started at Mon Apr 25 17:00:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5964: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32513 at Mon Apr 25 17:00:15 UTC 2016 kill -USR1 32513 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32513 killed at Mon Apr 25 17:00:15 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32581 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32581 found at Mon Apr 25 17:00:16 UTC 2016 selfserv_9709 with PID 32581 started at Mon Apr 25 17:00:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5965: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32581 at Mon Apr 25 17:00:17 UTC 2016 kill -USR1 32581 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32581 killed at Mon Apr 25 17:00:17 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32637 found at Mon Apr 25 17:00:18 UTC 2016 selfserv_9709 with PID 32637 started at Mon Apr 25 17:00:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5966: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32637 at Mon Apr 25 17:00:19 UTC 2016 kill -USR1 32637 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32637 killed at Mon Apr 25 17:00:19 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32693 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32693 found at Mon Apr 25 17:00:20 UTC 2016 selfserv_9709 with PID 32693 started at Mon Apr 25 17:00:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5967: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32693 at Mon Apr 25 17:00:21 UTC 2016 kill -USR1 32693 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32693 killed at Mon Apr 25 17:00:22 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32761 found at Mon Apr 25 17:00:22 UTC 2016 selfserv_9709 with PID 32761 started at Mon Apr 25 17:00:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5968: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32761 at Mon Apr 25 17:00:23 UTC 2016 kill -USR1 32761 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32761 killed at Mon Apr 25 17:00:24 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 354 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 354 found at Mon Apr 25 17:00:24 UTC 2016 selfserv_9709 with PID 354 started at Mon Apr 25 17:00:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5969: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 354 at Mon Apr 25 17:00:25 UTC 2016 kill -USR1 354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 354 killed at Mon Apr 25 17:00:26 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 411 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 411 found at Mon Apr 25 17:00:26 UTC 2016 selfserv_9709 with PID 411 started at Mon Apr 25 17:00:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5970: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 411 at Mon Apr 25 17:00:27 UTC 2016 kill -USR1 411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 411 killed at Mon Apr 25 17:00:28 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:00:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 480 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 480 found at Mon Apr 25 17:00:28 UTC 2016 selfserv_9709 with PID 480 started at Mon Apr 25 17:00:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5971: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 480 at Mon Apr 25 17:00:30 UTC 2016 kill -USR1 480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 480 killed at Mon Apr 25 17:00:30 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:00:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 537 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 537 found at Mon Apr 25 17:00:30 UTC 2016 selfserv_9709 with PID 537 started at Mon Apr 25 17:00:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5972: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 537 at Mon Apr 25 17:00:32 UTC 2016 kill -USR1 537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 537 killed at Mon Apr 25 17:00:32 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:00:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 593 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 593 found at Mon Apr 25 17:00:32 UTC 2016 selfserv_9709 with PID 593 started at Mon Apr 25 17:00:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5973: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 593 at Mon Apr 25 17:00:34 UTC 2016 kill -USR1 593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 593 killed at Mon Apr 25 17:00:34 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 661 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 661 found at Mon Apr 25 17:00:35 UTC 2016 selfserv_9709 with PID 661 started at Mon Apr 25 17:00:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5974: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 661 at Mon Apr 25 17:00:36 UTC 2016 kill -USR1 661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 661 killed at Mon Apr 25 17:00:36 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 717 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 717 found at Mon Apr 25 17:00:37 UTC 2016 selfserv_9709 with PID 717 started at Mon Apr 25 17:00:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5975: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 717 at Mon Apr 25 17:00:38 UTC 2016 kill -USR1 717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 717 killed at Mon Apr 25 17:00:38 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 773 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 773 found at Mon Apr 25 17:00:39 UTC 2016 selfserv_9709 with PID 773 started at Mon Apr 25 17:00:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5976: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 773 at Mon Apr 25 17:00:40 UTC 2016 kill -USR1 773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 773 killed at Mon Apr 25 17:00:41 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 841 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 841 found at Mon Apr 25 17:00:41 UTC 2016 selfserv_9709 with PID 841 started at Mon Apr 25 17:00:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5977: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 841 at Mon Apr 25 17:00:42 UTC 2016 kill -USR1 841 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 841 killed at Mon Apr 25 17:00:42 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 897 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 897 found at Mon Apr 25 17:00:43 UTC 2016 selfserv_9709 with PID 897 started at Mon Apr 25 17:00:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5978: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 897 at Mon Apr 25 17:00:44 UTC 2016 kill -USR1 897 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 897 killed at Mon Apr 25 17:00:44 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 953 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 953 found at Mon Apr 25 17:00:45 UTC 2016 selfserv_9709 with PID 953 started at Mon Apr 25 17:00:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5979: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 953 at Mon Apr 25 17:00:46 UTC 2016 kill -USR1 953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 953 killed at Mon Apr 25 17:00:46 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:00:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1037 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1037 found at Mon Apr 25 17:00:47 UTC 2016 selfserv_9709 with PID 1037 started at Mon Apr 25 17:00:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5980: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1037 at Mon Apr 25 17:00:48 UTC 2016 kill -USR1 1037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1037 killed at Mon Apr 25 17:00:48 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:00:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1094 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1094 found at Mon Apr 25 17:00:48 UTC 2016 selfserv_9709 with PID 1094 started at Mon Apr 25 17:00:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5981: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1094 at Mon Apr 25 17:00:49 UTC 2016 kill -USR1 1094 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1094 killed at Mon Apr 25 17:00:50 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:00:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1151 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1151 found at Mon Apr 25 17:00:50 UTC 2016 selfserv_9709 with PID 1151 started at Mon Apr 25 17:00:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5982: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1151 at Mon Apr 25 17:00:51 UTC 2016 kill -USR1 1151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1151 killed at Mon Apr 25 17:00:52 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1220 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1220 found at Mon Apr 25 17:00:52 UTC 2016 selfserv_9709 with PID 1220 started at Mon Apr 25 17:00:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5983: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1220 at Mon Apr 25 17:00:53 UTC 2016 kill -USR1 1220 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1220 killed at Mon Apr 25 17:00:54 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1276 found at Mon Apr 25 17:00:54 UTC 2016 selfserv_9709 with PID 1276 started at Mon Apr 25 17:00:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5984: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1276 at Mon Apr 25 17:00:55 UTC 2016 kill -USR1 1276 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1276 killed at Mon Apr 25 17:00:56 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1332 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1332 found at Mon Apr 25 17:00:56 UTC 2016 selfserv_9709 with PID 1332 started at Mon Apr 25 17:00:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5985: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1332 at Mon Apr 25 17:00:57 UTC 2016 kill -USR1 1332 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1332 killed at Mon Apr 25 17:00:57 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1400 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1400 found at Mon Apr 25 17:00:58 UTC 2016 selfserv_9709 with PID 1400 started at Mon Apr 25 17:00:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5986: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1400 at Mon Apr 25 17:00:59 UTC 2016 kill -USR1 1400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1400 killed at Mon Apr 25 17:00:59 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:00:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:00:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1456 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1456 found at Mon Apr 25 17:01:00 UTC 2016 selfserv_9709 with PID 1456 started at Mon Apr 25 17:01:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5987: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1456 at Mon Apr 25 17:01:01 UTC 2016 kill -USR1 1456 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1456 killed at Mon Apr 25 17:01:01 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1513 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1513 found at Mon Apr 25 17:01:02 UTC 2016 selfserv_9709 with PID 1513 started at Mon Apr 25 17:01:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5988: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1513 at Mon Apr 25 17:01:03 UTC 2016 kill -USR1 1513 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1513 killed at Mon Apr 25 17:01:03 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1618 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1618 found at Mon Apr 25 17:01:04 UTC 2016 selfserv_9709 with PID 1618 started at Mon Apr 25 17:01:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5989: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1618 at Mon Apr 25 17:01:04 UTC 2016 kill -USR1 1618 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1618 killed at Mon Apr 25 17:01:05 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1676 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1676 found at Mon Apr 25 17:01:05 UTC 2016 selfserv_9709 with PID 1676 started at Mon Apr 25 17:01:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5990: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1676 at Mon Apr 25 17:01:06 UTC 2016 kill -USR1 1676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1676 killed at Mon Apr 25 17:01:07 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1732 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1732 found at Mon Apr 25 17:01:07 UTC 2016 selfserv_9709 with PID 1732 started at Mon Apr 25 17:01:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #5991: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1732 at Mon Apr 25 17:01:08 UTC 2016 kill -USR1 1732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1732 killed at Mon Apr 25 17:01:09 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1800 found at Mon Apr 25 17:01:09 UTC 2016 selfserv_9709 with PID 1800 started at Mon Apr 25 17:01:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5992: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1800 at Mon Apr 25 17:01:10 UTC 2016 kill -USR1 1800 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1800 killed at Mon Apr 25 17:01:11 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1857 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1857 found at Mon Apr 25 17:01:11 UTC 2016 selfserv_9709 with PID 1857 started at Mon Apr 25 17:01:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5993: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1857 at Mon Apr 25 17:01:12 UTC 2016 kill -USR1 1857 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1857 killed at Mon Apr 25 17:01:13 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1913 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1913 found at Mon Apr 25 17:01:13 UTC 2016 selfserv_9709 with PID 1913 started at Mon Apr 25 17:01:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #5994: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1913 at Mon Apr 25 17:01:14 UTC 2016 kill -USR1 1913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1913 killed at Mon Apr 25 17:01:15 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1991 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1991 found at Mon Apr 25 17:01:15 UTC 2016 selfserv_9709 with PID 1991 started at Mon Apr 25 17:01:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5995: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1991 at Mon Apr 25 17:01:16 UTC 2016 kill -USR1 1991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1991 killed at Mon Apr 25 17:01:17 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2052 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2052 found at Mon Apr 25 17:01:17 UTC 2016 selfserv_9709 with PID 2052 started at Mon Apr 25 17:01:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5996: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2052 at Mon Apr 25 17:01:18 UTC 2016 kill -USR1 2052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2052 killed at Mon Apr 25 17:01:18 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2108 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2108 found at Mon Apr 25 17:01:19 UTC 2016 selfserv_9709 with PID 2108 started at Mon Apr 25 17:01:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5997: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2108 at Mon Apr 25 17:01:20 UTC 2016 kill -USR1 2108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2108 killed at Mon Apr 25 17:01:20 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2177 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2177 found at Mon Apr 25 17:01:21 UTC 2016 selfserv_9709 with PID 2177 started at Mon Apr 25 17:01:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #5998: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 2177 at Mon Apr 25 17:01:22 UTC 2016 kill -USR1 2177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2177 killed at Mon Apr 25 17:01:22 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2233 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2233 found at Mon Apr 25 17:01:23 UTC 2016 selfserv_9709 with PID 2233 started at Mon Apr 25 17:01:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #5999: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2233 at Mon Apr 25 17:01:24 UTC 2016 kill -USR1 2233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2233 killed at Mon Apr 25 17:01:25 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2292 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2292 found at Mon Apr 25 17:01:25 UTC 2016 selfserv_9709 with PID 2292 started at Mon Apr 25 17:01:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #6000: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 2292 at Mon Apr 25 17:01:26 UTC 2016 kill -USR1 2292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2292 killed at Mon Apr 25 17:01:27 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2360 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2360 found at Mon Apr 25 17:01:27 UTC 2016 selfserv_9709 with PID 2360 started at Mon Apr 25 17:01:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6001: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 2360 at Mon Apr 25 17:01:28 UTC 2016 kill -USR1 2360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2360 killed at Mon Apr 25 17:01:29 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2416 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2416 found at Mon Apr 25 17:01:29 UTC 2016 selfserv_9709 with PID 2416 started at Mon Apr 25 17:01:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6002: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 2416 at Mon Apr 25 17:01:30 UTC 2016 kill -USR1 2416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2416 killed at Mon Apr 25 17:01:30 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2472 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2472 found at Mon Apr 25 17:01:31 UTC 2016 selfserv_9709 with PID 2472 started at Mon Apr 25 17:01:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6003: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 2472 at Mon Apr 25 17:01:32 UTC 2016 kill -USR1 2472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2472 killed at Mon Apr 25 17:01:32 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2541 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2541 found at Mon Apr 25 17:01:33 UTC 2016 selfserv_9709 with PID 2541 started at Mon Apr 25 17:01:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #6004: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 2541 at Mon Apr 25 17:01:34 UTC 2016 kill -USR1 2541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2541 killed at Mon Apr 25 17:01:34 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2597 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2597 found at Mon Apr 25 17:01:35 UTC 2016 selfserv_9709 with PID 2597 started at Mon Apr 25 17:01:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6005: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2597 at Mon Apr 25 17:01:36 UTC 2016 kill -USR1 2597 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2597 killed at Mon Apr 25 17:01:36 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2653 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2653 found at Mon Apr 25 17:01:37 UTC 2016 selfserv_9709 with PID 2653 started at Mon Apr 25 17:01:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #6006: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 2653 at Mon Apr 25 17:01:38 UTC 2016 kill -USR1 2653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2653 killed at Mon Apr 25 17:01:38 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2721 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2721 found at Mon Apr 25 17:01:39 UTC 2016 selfserv_9709 with PID 2721 started at Mon Apr 25 17:01:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6007: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2721 at Mon Apr 25 17:01:40 UTC 2016 kill -USR1 2721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2721 killed at Mon Apr 25 17:01:40 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2777 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2777 found at Mon Apr 25 17:01:41 UTC 2016 selfserv_9709 with PID 2777 started at Mon Apr 25 17:01:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6008: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2777 at Mon Apr 25 17:01:42 UTC 2016 kill -USR1 2777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2777 killed at Mon Apr 25 17:01:42 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2833 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2833 found at Mon Apr 25 17:01:42 UTC 2016 selfserv_9709 with PID 2833 started at Mon Apr 25 17:01:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6009: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2833 at Mon Apr 25 17:01:43 UTC 2016 kill -USR1 2833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2833 killed at Mon Apr 25 17:01:44 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2902 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2902 found at Mon Apr 25 17:01:44 UTC 2016 selfserv_9709 with PID 2902 started at Mon Apr 25 17:01:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #6010: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 2902 at Mon Apr 25 17:01:45 UTC 2016 kill -USR1 2902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2902 killed at Mon Apr 25 17:01:46 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2964 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2964 found at Mon Apr 25 17:01:46 UTC 2016 selfserv_9709 with PID 2964 started at Mon Apr 25 17:01:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6011: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2964 at Mon Apr 25 17:01:47 UTC 2016 kill -USR1 2964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2964 killed at Mon Apr 25 17:01:47 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3031 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3031 found at Mon Apr 25 17:01:48 UTC 2016 selfserv_9709 with PID 3031 started at Mon Apr 25 17:01:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #6012: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 3031 at Mon Apr 25 17:01:49 UTC 2016 kill -USR1 3031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3031 killed at Mon Apr 25 17:01:49 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3120 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3120 found at Mon Apr 25 17:01:50 UTC 2016 selfserv_9709 with PID 3120 started at Mon Apr 25 17:01:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6013: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 3120 at Mon Apr 25 17:01:51 UTC 2016 kill -USR1 3120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3120 killed at Mon Apr 25 17:01:51 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3176 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3176 found at Mon Apr 25 17:01:52 UTC 2016 selfserv_9709 with PID 3176 started at Mon Apr 25 17:01:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6014: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 3176 at Mon Apr 25 17:01:52 UTC 2016 kill -USR1 3176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3176 killed at Mon Apr 25 17:01:53 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:01:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3233 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3233 found at Mon Apr 25 17:01:53 UTC 2016 selfserv_9709 with PID 3233 started at Mon Apr 25 17:01:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6015: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 3233 at Mon Apr 25 17:01:54 UTC 2016 kill -USR1 3233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3233 killed at Mon Apr 25 17:01:54 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3301 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3301 found at Mon Apr 25 17:01:55 UTC 2016 selfserv_9709 with PID 3301 started at Mon Apr 25 17:01:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #6016: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 3301 at Mon Apr 25 17:01:56 UTC 2016 kill -USR1 3301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3301 killed at Mon Apr 25 17:01:56 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3357 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3357 found at Mon Apr 25 17:01:57 UTC 2016 selfserv_9709 with PID 3357 started at Mon Apr 25 17:01:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6017: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 3357 at Mon Apr 25 17:01:58 UTC 2016 kill -USR1 3357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3357 killed at Mon Apr 25 17:01:58 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:01:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:01:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3417 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3417 found at Mon Apr 25 17:01:59 UTC 2016 selfserv_9709 with PID 3417 started at Mon Apr 25 17:01:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #6018: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 3417 at Mon Apr 25 17:02:00 UTC 2016 kill -USR1 3417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3417 killed at Mon Apr 25 17:02:00 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3485 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3485 found at Mon Apr 25 17:02:00 UTC 2016 selfserv_9709 with PID 3485 started at Mon Apr 25 17:02:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6019: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 3485 at Mon Apr 25 17:02:02 UTC 2016 kill -USR1 3485 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3485 killed at Mon Apr 25 17:02:02 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3554 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3554 found at Mon Apr 25 17:02:03 UTC 2016 selfserv_9709 with PID 3554 started at Mon Apr 25 17:02:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6020: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 3554 at Mon Apr 25 17:02:04 UTC 2016 kill -USR1 3554 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3554 killed at Mon Apr 25 17:02:04 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3610 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3610 found at Mon Apr 25 17:02:05 UTC 2016 selfserv_9709 with PID 3610 started at Mon Apr 25 17:02:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6021: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 3610 at Mon Apr 25 17:02:06 UTC 2016 kill -USR1 3610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3610 killed at Mon Apr 25 17:02:07 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3678 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3678 found at Mon Apr 25 17:02:07 UTC 2016 selfserv_9709 with PID 3678 started at Mon Apr 25 17:02:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6022: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 3678 at Mon Apr 25 17:02:08 UTC 2016 kill -USR1 3678 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3678 killed at Mon Apr 25 17:02:09 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3736 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3736 found at Mon Apr 25 17:02:09 UTC 2016 selfserv_9709 with PID 3736 started at Mon Apr 25 17:02:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6023: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 3736 at Mon Apr 25 17:02:11 UTC 2016 kill -USR1 3736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3736 killed at Mon Apr 25 17:02:11 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3793 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3793 found at Mon Apr 25 17:02:12 UTC 2016 selfserv_9709 with PID 3793 started at Mon Apr 25 17:02:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6024: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 3793 at Mon Apr 25 17:02:13 UTC 2016 kill -USR1 3793 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3793 killed at Mon Apr 25 17:02:13 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3862 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3862 found at Mon Apr 25 17:02:14 UTC 2016 selfserv_9709 with PID 3862 started at Mon Apr 25 17:02:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6025: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 3862 at Mon Apr 25 17:02:15 UTC 2016 kill -USR1 3862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3862 killed at Mon Apr 25 17:02:15 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3918 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3918 found at Mon Apr 25 17:02:16 UTC 2016 selfserv_9709 with PID 3918 started at Mon Apr 25 17:02:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6026: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 3918 at Mon Apr 25 17:02:17 UTC 2016 kill -USR1 3918 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3918 killed at Mon Apr 25 17:02:18 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3974 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 3974 found at Mon Apr 25 17:02:18 UTC 2016 selfserv_9709 with PID 3974 started at Mon Apr 25 17:02:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6027: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 3974 at Mon Apr 25 17:02:19 UTC 2016 kill -USR1 3974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3974 killed at Mon Apr 25 17:02:20 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4045 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4045 found at Mon Apr 25 17:02:20 UTC 2016 selfserv_9709 with PID 4045 started at Mon Apr 25 17:02:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6028: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4045 at Mon Apr 25 17:02:22 UTC 2016 kill -USR1 4045 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4045 killed at Mon Apr 25 17:02:22 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4101 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4101 found at Mon Apr 25 17:02:22 UTC 2016 selfserv_9709 with PID 4101 started at Mon Apr 25 17:02:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6029: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 4101 at Mon Apr 25 17:02:24 UTC 2016 kill -USR1 4101 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4101 killed at Mon Apr 25 17:02:24 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4160 found at Mon Apr 25 17:02:25 UTC 2016 selfserv_9709 with PID 4160 started at Mon Apr 25 17:02:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6030: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4160 at Mon Apr 25 17:02:26 UTC 2016 kill -USR1 4160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4160 killed at Mon Apr 25 17:02:27 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4228 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4228 found at Mon Apr 25 17:02:27 UTC 2016 selfserv_9709 with PID 4228 started at Mon Apr 25 17:02:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6031: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 4228 at Mon Apr 25 17:02:28 UTC 2016 kill -USR1 4228 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4228 killed at Mon Apr 25 17:02:29 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4284 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4284 found at Mon Apr 25 17:02:29 UTC 2016 selfserv_9709 with PID 4284 started at Mon Apr 25 17:02:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6032: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 4284 at Mon Apr 25 17:02:30 UTC 2016 kill -USR1 4284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4284 killed at Mon Apr 25 17:02:31 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4340 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4340 found at Mon Apr 25 17:02:31 UTC 2016 selfserv_9709 with PID 4340 started at Mon Apr 25 17:02:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6033: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 4340 at Mon Apr 25 17:02:33 UTC 2016 kill -USR1 4340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4340 killed at Mon Apr 25 17:02:33 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4408 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4408 found at Mon Apr 25 17:02:33 UTC 2016 selfserv_9709 with PID 4408 started at Mon Apr 25 17:02:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6034: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4408 at Mon Apr 25 17:02:35 UTC 2016 kill -USR1 4408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4408 killed at Mon Apr 25 17:02:35 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4465 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4465 found at Mon Apr 25 17:02:36 UTC 2016 selfserv_9709 with PID 4465 started at Mon Apr 25 17:02:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6035: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 4465 at Mon Apr 25 17:02:37 UTC 2016 kill -USR1 4465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4465 killed at Mon Apr 25 17:02:38 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4521 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4521 found at Mon Apr 25 17:02:38 UTC 2016 selfserv_9709 with PID 4521 started at Mon Apr 25 17:02:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6036: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4521 at Mon Apr 25 17:02:40 UTC 2016 kill -USR1 4521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4521 killed at Mon Apr 25 17:02:40 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4589 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4589 found at Mon Apr 25 17:02:41 UTC 2016 selfserv_9709 with PID 4589 started at Mon Apr 25 17:02:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6037: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4589 at Mon Apr 25 17:02:42 UTC 2016 kill -USR1 4589 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4589 killed at Mon Apr 25 17:02:42 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4645 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4645 found at Mon Apr 25 17:02:43 UTC 2016 selfserv_9709 with PID 4645 started at Mon Apr 25 17:02:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6038: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4645 at Mon Apr 25 17:02:44 UTC 2016 kill -USR1 4645 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4645 killed at Mon Apr 25 17:02:44 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4701 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4701 found at Mon Apr 25 17:02:45 UTC 2016 selfserv_9709 with PID 4701 started at Mon Apr 25 17:02:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6039: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4701 at Mon Apr 25 17:02:46 UTC 2016 kill -USR1 4701 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4701 killed at Mon Apr 25 17:02:46 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4769 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4769 found at Mon Apr 25 17:02:47 UTC 2016 selfserv_9709 with PID 4769 started at Mon Apr 25 17:02:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6040: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4769 at Mon Apr 25 17:02:48 UTC 2016 kill -USR1 4769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4769 killed at Mon Apr 25 17:02:49 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4825 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4825 found at Mon Apr 25 17:02:49 UTC 2016 selfserv_9709 with PID 4825 started at Mon Apr 25 17:02:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6041: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 4825 at Mon Apr 25 17:02:51 UTC 2016 kill -USR1 4825 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4825 killed at Mon Apr 25 17:02:51 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4881 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4881 found at Mon Apr 25 17:02:52 UTC 2016 selfserv_9709 with PID 4881 started at Mon Apr 25 17:02:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6042: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4881 at Mon Apr 25 17:02:53 UTC 2016 kill -USR1 4881 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4881 killed at Mon Apr 25 17:02:53 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4949 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4949 found at Mon Apr 25 17:02:54 UTC 2016 selfserv_9709 with PID 4949 started at Mon Apr 25 17:02:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6043: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 4949 at Mon Apr 25 17:02:55 UTC 2016 kill -USR1 4949 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4949 killed at Mon Apr 25 17:02:55 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5006 found at Mon Apr 25 17:02:56 UTC 2016 selfserv_9709 with PID 5006 started at Mon Apr 25 17:02:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6044: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 5006 at Mon Apr 25 17:02:57 UTC 2016 kill -USR1 5006 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5006 killed at Mon Apr 25 17:02:57 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:02:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5062 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5062 found at Mon Apr 25 17:02:58 UTC 2016 selfserv_9709 with PID 5062 started at Mon Apr 25 17:02:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6045: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 5062 at Mon Apr 25 17:02:58 UTC 2016 kill -USR1 5062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5062 killed at Mon Apr 25 17:02:59 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:02:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:02:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5130 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5130 found at Mon Apr 25 17:02:59 UTC 2016 selfserv_9709 with PID 5130 started at Mon Apr 25 17:02:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6046: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 5130 at Mon Apr 25 17:03:01 UTC 2016 kill -USR1 5130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5130 killed at Mon Apr 25 17:03:01 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:03:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5188 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5188 found at Mon Apr 25 17:03:01 UTC 2016 selfserv_9709 with PID 5188 started at Mon Apr 25 17:03:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6047: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 5188 at Mon Apr 25 17:03:03 UTC 2016 kill -USR1 5188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5188 killed at Mon Apr 25 17:03:03 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:03:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5256 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5256 found at Mon Apr 25 17:03:04 UTC 2016 selfserv_9709 with PID 5256 started at Mon Apr 25 17:03:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6048: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 5256 at Mon Apr 25 17:03:05 UTC 2016 kill -USR1 5256 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5256 killed at Mon Apr 25 17:03:05 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:03:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5324 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5324 found at Mon Apr 25 17:03:06 UTC 2016 selfserv_9709 with PID 5324 started at Mon Apr 25 17:03:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6049: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 5324 at Mon Apr 25 17:03:07 UTC 2016 kill -USR1 5324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5324 killed at Mon Apr 25 17:03:07 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:03:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5380 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5380 found at Mon Apr 25 17:03:07 UTC 2016 selfserv_9709 with PID 5380 started at Mon Apr 25 17:03:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6050: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 5380 at Mon Apr 25 17:03:08 UTC 2016 kill -USR1 5380 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5380 killed at Mon Apr 25 17:03:09 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:03:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5436 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5436 found at Mon Apr 25 17:03:09 UTC 2016 selfserv_9709 with PID 5436 started at Mon Apr 25 17:03:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6051: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 5436 at Mon Apr 25 17:03:10 UTC 2016 kill -USR1 5436 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5436 killed at Mon Apr 25 17:03:11 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:03:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5504 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5504 found at Mon Apr 25 17:03:11 UTC 2016 selfserv_9709 with PID 5504 started at Mon Apr 25 17:03:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6052: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 5504 at Mon Apr 25 17:03:12 UTC 2016 kill -USR1 5504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5504 killed at Mon Apr 25 17:03:13 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:03:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5560 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5560 found at Mon Apr 25 17:03:13 UTC 2016 selfserv_9709 with PID 5560 started at Mon Apr 25 17:03:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6053: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 5560 at Mon Apr 25 17:03:14 UTC 2016 kill -USR1 5560 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5560 killed at Mon Apr 25 17:03:15 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:03:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5616 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5616 found at Mon Apr 25 17:03:15 UTC 2016 selfserv_9709 with PID 5616 started at Mon Apr 25 17:03:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #6054: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 5616 at Mon Apr 25 17:03:16 UTC 2016 kill -USR1 5616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5616 killed at Mon Apr 25 17:03:17 UTC 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9709 starting at Mon Apr 25 17:03:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:17 UTC 2016 selfserv_9709 with PID 5680 started at Mon Apr 25 17:03:17 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:18 UTC 2016 ssl.sh: #6055: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:19 UTC 2016 ssl.sh: #6056: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:20 UTC 2016 ssl.sh: #6057: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:21 UTC 2016 ssl.sh: #6058: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:22 UTC 2016 ssl.sh: #6059: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:23 UTC 2016 ssl.sh: #6060: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:24 UTC 2016 ssl.sh: #6061: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:25 UTC 2016 ssl.sh: #6062: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:26 UTC 2016 ssl.sh: #6063: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:27 UTC 2016 ssl.sh: #6064: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:28 UTC 2016 ssl.sh: #6065: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:29 UTC 2016 ssl.sh: #6066: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:30 UTC 2016 ssl.sh: #6067: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:31 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6068: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:32 UTC 2016 ssl.sh: #6069: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:33 UTC 2016 ssl.sh: #6070: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:34 UTC 2016 ssl.sh: #6071: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:34 UTC 2016 ssl.sh: #6072: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:35 UTC 2016 ssl.sh: #6073: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:36 UTC 2016 ssl.sh: #6074: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:37 UTC 2016 ssl.sh: #6075: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:38 UTC 2016 ssl.sh: #6076: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:39 UTC 2016 ssl.sh: #6077: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:40 UTC 2016 ssl.sh: #6078: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:41 UTC 2016 ssl.sh: #6079: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:42 UTC 2016 ssl.sh: #6080: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:43 UTC 2016 ssl.sh: #6081: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:44 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6082: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:45 UTC 2016 ssl.sh: #6083: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:46 UTC 2016 ssl.sh: #6084: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:47 UTC 2016 ssl.sh: #6085: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:48 UTC 2016 ssl.sh: #6086: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:48 UTC 2016 ssl.sh: #6087: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:49 UTC 2016 ssl.sh: #6088: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:50 UTC 2016 ssl.sh: #6089: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:51 UTC 2016 ssl.sh: #6090: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:52 UTC 2016 ssl.sh: #6091: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:53 UTC 2016 ssl.sh: #6092: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:54 UTC 2016 ssl.sh: #6093: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:55 UTC 2016 ssl.sh: #6094: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 5680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5680 found at Mon Apr 25 17:03:56 UTC 2016 ssl.sh: #6095: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 5680 at Mon Apr 25 17:03:56 UTC 2016 kill -USR1 5680 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5680 killed at Mon Apr 25 17:03:56 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:03:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:03:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:03:57 UTC 2016 selfserv_9709 with PID 7107 started at Mon Apr 25 17:03:57 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:03:58 UTC 2016 ssl.sh: #6096: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:03:59 UTC 2016 ssl.sh: #6097: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:03:59 UTC 2016 ssl.sh: #6098: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:00 UTC 2016 ssl.sh: #6099: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:01 UTC 2016 ssl.sh: #6100: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:02 UTC 2016 ssl.sh: #6101: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:03 UTC 2016 ssl.sh: #6102: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:04 UTC 2016 ssl.sh: #6103: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:04 UTC 2016 ssl.sh: #6104: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:05 UTC 2016 ssl.sh: #6105: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:06 UTC 2016 ssl.sh: #6106: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:07 UTC 2016 ssl.sh: #6107: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:08 UTC 2016 ssl.sh: #6108: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:09 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6109: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:10 UTC 2016 ssl.sh: #6110: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:10 UTC 2016 ssl.sh: #6111: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:11 UTC 2016 ssl.sh: #6112: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:12 UTC 2016 ssl.sh: #6113: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:13 UTC 2016 ssl.sh: #6114: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:14 UTC 2016 ssl.sh: #6115: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:14 UTC 2016 ssl.sh: #6116: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:15 UTC 2016 ssl.sh: #6117: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:16 UTC 2016 ssl.sh: #6118: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:17 UTC 2016 ssl.sh: #6119: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:18 UTC 2016 ssl.sh: #6120: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:19 UTC 2016 ssl.sh: #6121: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:19 UTC 2016 ssl.sh: #6122: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:20 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6123: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:21 UTC 2016 ssl.sh: #6124: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:22 UTC 2016 ssl.sh: #6125: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:23 UTC 2016 ssl.sh: #6126: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:24 UTC 2016 ssl.sh: #6127: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:24 UTC 2016 ssl.sh: #6128: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:25 UTC 2016 ssl.sh: #6129: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:26 UTC 2016 ssl.sh: #6130: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:27 UTC 2016 ssl.sh: #6131: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:28 UTC 2016 ssl.sh: #6132: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:28 UTC 2016 ssl.sh: #6133: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:29 UTC 2016 ssl.sh: #6134: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:30 UTC 2016 ssl.sh: #6135: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 7107 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7107 found at Mon Apr 25 17:04:31 UTC 2016 ssl.sh: #6136: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7107 at Mon Apr 25 17:04:31 UTC 2016 kill -USR1 7107 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7107 killed at Mon Apr 25 17:04:31 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:04:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:04:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:32 UTC 2016 selfserv_9709 with PID 8550 started at Mon Apr 25 17:04:32 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:33 UTC 2016 ssl.sh: #6137: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:34 UTC 2016 ssl.sh: #6138: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:35 UTC 2016 ssl.sh: #6139: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:36 UTC 2016 ssl.sh: #6140: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:37 UTC 2016 ssl.sh: #6141: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:38 UTC 2016 ssl.sh: #6142: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:39 UTC 2016 ssl.sh: #6143: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:40 UTC 2016 ssl.sh: #6144: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:41 UTC 2016 ssl.sh: #6145: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:42 UTC 2016 ssl.sh: #6146: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:43 UTC 2016 ssl.sh: #6147: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:45 UTC 2016 ssl.sh: #6148: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:46 UTC 2016 ssl.sh: #6149: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:47 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6150: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:48 UTC 2016 ssl.sh: #6151: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:49 UTC 2016 ssl.sh: #6152: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:49 UTC 2016 ssl.sh: #6153: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:50 UTC 2016 ssl.sh: #6154: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:51 UTC 2016 ssl.sh: #6155: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:52 UTC 2016 ssl.sh: #6156: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:53 UTC 2016 ssl.sh: #6157: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:54 UTC 2016 ssl.sh: #6158: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:55 UTC 2016 ssl.sh: #6159: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:56 UTC 2016 ssl.sh: #6160: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:57 UTC 2016 ssl.sh: #6161: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:58 UTC 2016 ssl.sh: #6162: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:04:59 UTC 2016 ssl.sh: #6163: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:00 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6164: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:01 UTC 2016 ssl.sh: #6165: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:02 UTC 2016 ssl.sh: #6166: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:03 UTC 2016 ssl.sh: #6167: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:04 UTC 2016 ssl.sh: #6168: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:05 UTC 2016 ssl.sh: #6169: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:06 UTC 2016 ssl.sh: #6170: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:07 UTC 2016 ssl.sh: #6171: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:08 UTC 2016 ssl.sh: #6172: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:09 UTC 2016 ssl.sh: #6173: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:10 UTC 2016 ssl.sh: #6174: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:11 UTC 2016 ssl.sh: #6175: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:12 UTC 2016 ssl.sh: #6176: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8550 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8550 found at Mon Apr 25 17:05:13 UTC 2016 ssl.sh: #6177: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 8550 at Mon Apr 25 17:05:13 UTC 2016 kill -USR1 8550 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8550 killed at Mon Apr 25 17:05:14 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:05:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:05:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:14 UTC 2016 selfserv_9709 with PID 9987 started at Mon Apr 25 17:05:14 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:15 UTC 2016 ssl.sh: #6178: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:16 UTC 2016 ssl.sh: #6179: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:17 UTC 2016 ssl.sh: #6180: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:18 UTC 2016 ssl.sh: #6181: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:18 UTC 2016 ssl.sh: #6182: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:19 UTC 2016 ssl.sh: #6183: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:20 UTC 2016 ssl.sh: #6184: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:21 UTC 2016 ssl.sh: #6185: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:22 UTC 2016 ssl.sh: #6186: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:23 UTC 2016 ssl.sh: #6187: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:24 UTC 2016 ssl.sh: #6188: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:25 UTC 2016 ssl.sh: #6189: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:26 UTC 2016 ssl.sh: #6190: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:27 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6191: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:28 UTC 2016 ssl.sh: #6192: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:29 UTC 2016 ssl.sh: #6193: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:30 UTC 2016 ssl.sh: #6194: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:30 UTC 2016 ssl.sh: #6195: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:31 UTC 2016 ssl.sh: #6196: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:32 UTC 2016 ssl.sh: #6197: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:33 UTC 2016 ssl.sh: #6198: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:34 UTC 2016 ssl.sh: #6199: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:35 UTC 2016 ssl.sh: #6200: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:36 UTC 2016 ssl.sh: #6201: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:37 UTC 2016 ssl.sh: #6202: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:38 UTC 2016 ssl.sh: #6203: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:38 UTC 2016 ssl.sh: #6204: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:39 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6205: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:40 UTC 2016 ssl.sh: #6206: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:41 UTC 2016 ssl.sh: #6207: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:42 UTC 2016 ssl.sh: #6208: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:43 UTC 2016 ssl.sh: #6209: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:44 UTC 2016 ssl.sh: #6210: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:45 UTC 2016 ssl.sh: #6211: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:45 UTC 2016 ssl.sh: #6212: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:46 UTC 2016 ssl.sh: #6213: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:47 UTC 2016 ssl.sh: #6214: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:48 UTC 2016 ssl.sh: #6215: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:49 UTC 2016 ssl.sh: #6216: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:50 UTC 2016 ssl.sh: #6217: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9987 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9987 found at Mon Apr 25 17:05:51 UTC 2016 ssl.sh: #6218: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 9987 at Mon Apr 25 17:05:51 UTC 2016 kill -USR1 9987 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9987 killed at Mon Apr 25 17:05:51 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:05:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:05:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11414 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11414 found at Mon Apr 25 17:05:52 UTC 2016 selfserv_9709 with PID 11414 started at Mon Apr 25 17:05:52 UTC 2016 trying to kill selfserv_9709 with PID 11414 at Mon Apr 25 17:05:52 UTC 2016 kill -USR1 11414 ./ssl.sh: line 186: 11414 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11414 killed at Mon Apr 25 17:05:52 UTC 2016 selfserv_9709 starting at Mon Apr 25 17:05:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:05:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:05:52 UTC 2016 selfserv_9709 with PID 11448 started at Mon Apr 25 17:05:52 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:05:54 UTC 2016 ssl.sh: #6219: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:05:55 UTC 2016 ssl.sh: #6220: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:05:56 UTC 2016 ssl.sh: #6221: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:05:57 UTC 2016 ssl.sh: #6222: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:05:58 UTC 2016 ssl.sh: #6223: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:05:59 UTC 2016 ssl.sh: #6224: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:00 UTC 2016 ssl.sh: #6225: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:02 UTC 2016 ssl.sh: #6226: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:03 UTC 2016 ssl.sh: #6227: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:04 UTC 2016 ssl.sh: #6228: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:05 UTC 2016 ssl.sh: #6229: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:06 UTC 2016 ssl.sh: #6230: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:07 UTC 2016 ssl.sh: #6231: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:08 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6232: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:10 UTC 2016 ssl.sh: #6233: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:11 UTC 2016 ssl.sh: #6234: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:12 UTC 2016 ssl.sh: #6235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:13 UTC 2016 ssl.sh: #6236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:14 UTC 2016 ssl.sh: #6237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:15 UTC 2016 ssl.sh: #6238: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:16 UTC 2016 ssl.sh: #6239: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:17 UTC 2016 ssl.sh: #6240: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:18 UTC 2016 ssl.sh: #6241: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:20 UTC 2016 ssl.sh: #6242: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:21 UTC 2016 ssl.sh: #6243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:22 UTC 2016 ssl.sh: #6244: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:23 UTC 2016 ssl.sh: #6245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:24 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6246: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:25 UTC 2016 ssl.sh: #6247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:26 UTC 2016 ssl.sh: #6248: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:27 UTC 2016 ssl.sh: #6249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:28 UTC 2016 ssl.sh: #6250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:30 UTC 2016 ssl.sh: #6251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:31 UTC 2016 ssl.sh: #6252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:32 UTC 2016 ssl.sh: #6253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:33 UTC 2016 ssl.sh: #6254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:34 UTC 2016 ssl.sh: #6255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:35 UTC 2016 ssl.sh: #6256: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:36 UTC 2016 ssl.sh: #6257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:37 UTC 2016 ssl.sh: #6258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11448 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11448 found at Mon Apr 25 17:06:39 UTC 2016 ssl.sh: #6259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11448 at Mon Apr 25 17:06:39 UTC 2016 kill -USR1 11448 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11448 killed at Mon Apr 25 17:06:39 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:06:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:06:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:39 UTC 2016 selfserv_9709 with PID 12890 started at Mon Apr 25 17:06:39 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:41 UTC 2016 ssl.sh: #6260: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:42 UTC 2016 ssl.sh: #6261: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:43 UTC 2016 ssl.sh: #6262: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:44 UTC 2016 ssl.sh: #6263: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:45 UTC 2016 ssl.sh: #6264: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:46 UTC 2016 ssl.sh: #6265: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:47 UTC 2016 ssl.sh: #6266: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:49 UTC 2016 ssl.sh: #6267: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:50 UTC 2016 ssl.sh: #6268: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:51 UTC 2016 ssl.sh: #6269: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:52 UTC 2016 ssl.sh: #6270: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:53 UTC 2016 ssl.sh: #6271: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:54 UTC 2016 ssl.sh: #6272: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:55 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6273: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:57 UTC 2016 ssl.sh: #6274: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:58 UTC 2016 ssl.sh: #6275: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:06:59 UTC 2016 ssl.sh: #6276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:00 UTC 2016 ssl.sh: #6277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:01 UTC 2016 ssl.sh: #6278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:02 UTC 2016 ssl.sh: #6279: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:03 UTC 2016 ssl.sh: #6280: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:04 UTC 2016 ssl.sh: #6281: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:05 UTC 2016 ssl.sh: #6282: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:07 UTC 2016 ssl.sh: #6283: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:08 UTC 2016 ssl.sh: #6284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:09 UTC 2016 ssl.sh: #6285: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:10 UTC 2016 ssl.sh: #6286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:11 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6287: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:12 UTC 2016 ssl.sh: #6288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:13 UTC 2016 ssl.sh: #6289: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:14 UTC 2016 ssl.sh: #6290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:15 UTC 2016 ssl.sh: #6291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:17 UTC 2016 ssl.sh: #6292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:18 UTC 2016 ssl.sh: #6293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:19 UTC 2016 ssl.sh: #6294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:20 UTC 2016 ssl.sh: #6295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:21 UTC 2016 ssl.sh: #6296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:22 UTC 2016 ssl.sh: #6297: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:23 UTC 2016 ssl.sh: #6298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:24 UTC 2016 ssl.sh: #6299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12890 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12890 found at Mon Apr 25 17:07:25 UTC 2016 ssl.sh: #6300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12890 at Mon Apr 25 17:07:26 UTC 2016 kill -USR1 12890 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12890 killed at Mon Apr 25 17:07:26 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:07:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:07:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:26 UTC 2016 selfserv_9709 with PID 14335 started at Mon Apr 25 17:07:26 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:27 UTC 2016 ssl.sh: #6301: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:28 UTC 2016 ssl.sh: #6302: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:29 UTC 2016 ssl.sh: #6303: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:30 UTC 2016 ssl.sh: #6304: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:31 UTC 2016 ssl.sh: #6305: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:32 UTC 2016 ssl.sh: #6306: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:33 UTC 2016 ssl.sh: #6307: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:34 UTC 2016 ssl.sh: #6308: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:35 UTC 2016 ssl.sh: #6309: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:36 UTC 2016 ssl.sh: #6310: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:37 UTC 2016 ssl.sh: #6311: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:38 UTC 2016 ssl.sh: #6312: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:39 UTC 2016 ssl.sh: #6313: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:41 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6314: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:42 UTC 2016 ssl.sh: #6315: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:43 UTC 2016 ssl.sh: #6316: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:43 UTC 2016 ssl.sh: #6317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:44 UTC 2016 ssl.sh: #6318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:45 UTC 2016 ssl.sh: #6319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:46 UTC 2016 ssl.sh: #6320: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:47 UTC 2016 ssl.sh: #6321: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:48 UTC 2016 ssl.sh: #6322: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:49 UTC 2016 ssl.sh: #6323: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:50 UTC 2016 ssl.sh: #6324: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:51 UTC 2016 ssl.sh: #6325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:52 UTC 2016 ssl.sh: #6326: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:53 UTC 2016 ssl.sh: #6327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:54 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6328: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:55 UTC 2016 ssl.sh: #6329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:56 UTC 2016 ssl.sh: #6330: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:57 UTC 2016 ssl.sh: #6331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:58 UTC 2016 ssl.sh: #6332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:07:59 UTC 2016 ssl.sh: #6333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:08:00 UTC 2016 ssl.sh: #6334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:08:01 UTC 2016 ssl.sh: #6335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:08:02 UTC 2016 ssl.sh: #6336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:08:03 UTC 2016 ssl.sh: #6337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:08:04 UTC 2016 ssl.sh: #6338: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:08:05 UTC 2016 ssl.sh: #6339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:08:06 UTC 2016 ssl.sh: #6340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14335 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14335 found at Mon Apr 25 17:08:07 UTC 2016 ssl.sh: #6341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14335 at Mon Apr 25 17:08:07 UTC 2016 kill -USR1 14335 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14335 killed at Mon Apr 25 17:08:08 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:08:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:08:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:08 UTC 2016 selfserv_9709 with PID 15772 started at Mon Apr 25 17:08:08 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:09 UTC 2016 ssl.sh: #6342: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:11 UTC 2016 ssl.sh: #6343: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:12 UTC 2016 ssl.sh: #6344: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:13 UTC 2016 ssl.sh: #6345: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:14 UTC 2016 ssl.sh: #6346: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:15 UTC 2016 ssl.sh: #6347: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:17 UTC 2016 ssl.sh: #6348: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:18 UTC 2016 ssl.sh: #6349: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:19 UTC 2016 ssl.sh: #6350: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:20 UTC 2016 ssl.sh: #6351: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:22 UTC 2016 ssl.sh: #6352: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:23 UTC 2016 ssl.sh: #6353: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:24 UTC 2016 ssl.sh: #6354: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:25 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6355: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:26 UTC 2016 ssl.sh: #6356: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:28 UTC 2016 ssl.sh: #6357: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:29 UTC 2016 ssl.sh: #6358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:30 UTC 2016 ssl.sh: #6359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:31 UTC 2016 ssl.sh: #6360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:32 UTC 2016 ssl.sh: #6361: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:33 UTC 2016 ssl.sh: #6362: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:34 UTC 2016 ssl.sh: #6363: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:36 UTC 2016 ssl.sh: #6364: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:37 UTC 2016 ssl.sh: #6365: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:38 UTC 2016 ssl.sh: #6366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:39 UTC 2016 ssl.sh: #6367: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:41 UTC 2016 ssl.sh: #6368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:42 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6369: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:43 UTC 2016 ssl.sh: #6370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:44 UTC 2016 ssl.sh: #6371: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:45 UTC 2016 ssl.sh: #6372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:46 UTC 2016 ssl.sh: #6373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:47 UTC 2016 ssl.sh: #6374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:49 UTC 2016 ssl.sh: #6375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:50 UTC 2016 ssl.sh: #6376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:51 UTC 2016 ssl.sh: #6377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:52 UTC 2016 ssl.sh: #6378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:53 UTC 2016 ssl.sh: #6379: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:54 UTC 2016 ssl.sh: #6380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:56 UTC 2016 ssl.sh: #6381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15772 found at Mon Apr 25 17:08:57 UTC 2016 ssl.sh: #6382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15772 at Mon Apr 25 17:08:57 UTC 2016 kill -USR1 15772 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15772 killed at Mon Apr 25 17:08:57 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:08:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:08:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:08:58 UTC 2016 selfserv_9709 with PID 17199 started at Mon Apr 25 17:08:58 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:08:59 UTC 2016 ssl.sh: #6383: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:00 UTC 2016 ssl.sh: #6384: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:01 UTC 2016 ssl.sh: #6385: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:03 UTC 2016 ssl.sh: #6386: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:04 UTC 2016 ssl.sh: #6387: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:05 UTC 2016 ssl.sh: #6388: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:06 UTC 2016 ssl.sh: #6389: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:07 UTC 2016 ssl.sh: #6390: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:09 UTC 2016 ssl.sh: #6391: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:10 UTC 2016 ssl.sh: #6392: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:11 UTC 2016 ssl.sh: #6393: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:12 UTC 2016 ssl.sh: #6394: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:14 UTC 2016 ssl.sh: #6395: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:15 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6396: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:16 UTC 2016 ssl.sh: #6397: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:17 UTC 2016 ssl.sh: #6398: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:18 UTC 2016 ssl.sh: #6399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:19 UTC 2016 ssl.sh: #6400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:21 UTC 2016 ssl.sh: #6401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:22 UTC 2016 ssl.sh: #6402: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:23 UTC 2016 ssl.sh: #6403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:24 UTC 2016 ssl.sh: #6404: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:25 UTC 2016 ssl.sh: #6405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:26 UTC 2016 ssl.sh: #6406: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:28 UTC 2016 ssl.sh: #6407: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:29 UTC 2016 ssl.sh: #6408: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:30 UTC 2016 ssl.sh: #6409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:31 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6410: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:33 UTC 2016 ssl.sh: #6411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:34 UTC 2016 ssl.sh: #6412: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:35 UTC 2016 ssl.sh: #6413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:36 UTC 2016 ssl.sh: #6414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:37 UTC 2016 ssl.sh: #6415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:38 UTC 2016 ssl.sh: #6416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:39 UTC 2016 ssl.sh: #6417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:41 UTC 2016 ssl.sh: #6418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:42 UTC 2016 ssl.sh: #6419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:43 UTC 2016 ssl.sh: #6420: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:44 UTC 2016 ssl.sh: #6421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:45 UTC 2016 ssl.sh: #6422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17199 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17199 found at Mon Apr 25 17:09:46 UTC 2016 ssl.sh: #6423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 17199 at Mon Apr 25 17:09:46 UTC 2016 kill -USR1 17199 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17199 killed at Mon Apr 25 17:09:47 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:09:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:09:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:47 UTC 2016 selfserv_9709 with PID 18641 started at Mon Apr 25 17:09:47 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:49 UTC 2016 ssl.sh: #6424: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:50 UTC 2016 ssl.sh: #6425: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:51 UTC 2016 ssl.sh: #6426: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:52 UTC 2016 ssl.sh: #6427: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:53 UTC 2016 ssl.sh: #6428: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:54 UTC 2016 ssl.sh: #6429: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:55 UTC 2016 ssl.sh: #6430: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:56 UTC 2016 ssl.sh: #6431: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:57 UTC 2016 ssl.sh: #6432: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:58 UTC 2016 ssl.sh: #6433: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:09:59 UTC 2016 ssl.sh: #6434: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:00 UTC 2016 ssl.sh: #6435: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:02 UTC 2016 ssl.sh: #6436: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:03 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6437: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:04 UTC 2016 ssl.sh: #6438: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:05 UTC 2016 ssl.sh: #6439: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:06 UTC 2016 ssl.sh: #6440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:07 UTC 2016 ssl.sh: #6441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:08 UTC 2016 ssl.sh: #6442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:09 UTC 2016 ssl.sh: #6443: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:10 UTC 2016 ssl.sh: #6444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:11 UTC 2016 ssl.sh: #6445: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:12 UTC 2016 ssl.sh: #6446: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:13 UTC 2016 ssl.sh: #6447: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:14 UTC 2016 ssl.sh: #6448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:15 UTC 2016 ssl.sh: #6449: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:16 UTC 2016 ssl.sh: #6450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:18 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6451: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:19 UTC 2016 ssl.sh: #6452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:20 UTC 2016 ssl.sh: #6453: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:21 UTC 2016 ssl.sh: #6454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:22 UTC 2016 ssl.sh: #6455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:23 UTC 2016 ssl.sh: #6456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:24 UTC 2016 ssl.sh: #6457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:25 UTC 2016 ssl.sh: #6458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:26 UTC 2016 ssl.sh: #6459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:27 UTC 2016 ssl.sh: #6460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:28 UTC 2016 ssl.sh: #6461: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:29 UTC 2016 ssl.sh: #6462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:30 UTC 2016 ssl.sh: #6463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18641 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18641 found at Mon Apr 25 17:10:31 UTC 2016 ssl.sh: #6464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 18641 at Mon Apr 25 17:10:31 UTC 2016 kill -USR1 18641 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 18641 killed at Mon Apr 25 17:10:31 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:10:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:10:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20083 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20083 found at Mon Apr 25 17:10:32 UTC 2016 selfserv_9709 with PID 20083 started at Mon Apr 25 17:10:32 UTC 2016 trying to kill selfserv_9709 with PID 20083 at Mon Apr 25 17:10:32 UTC 2016 kill -USR1 20083 ./ssl.sh: line 186: 20083 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20083 killed at Mon Apr 25 17:10:32 UTC 2016 selfserv_9709 starting at Mon Apr 25 17:10:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:10:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:33 UTC 2016 selfserv_9709 with PID 20117 started at Mon Apr 25 17:10:33 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:34 UTC 2016 ssl.sh: #6465: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:35 UTC 2016 ssl.sh: #6466: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:36 UTC 2016 ssl.sh: #6467: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:37 UTC 2016 ssl.sh: #6468: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:39 UTC 2016 ssl.sh: #6469: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:40 UTC 2016 ssl.sh: #6470: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:41 UTC 2016 ssl.sh: #6471: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:42 UTC 2016 ssl.sh: #6472: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:43 UTC 2016 ssl.sh: #6473: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:44 UTC 2016 ssl.sh: #6474: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:45 UTC 2016 ssl.sh: #6475: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:47 UTC 2016 ssl.sh: #6476: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:48 UTC 2016 ssl.sh: #6477: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:49 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6478: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:50 UTC 2016 ssl.sh: #6479: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:51 UTC 2016 ssl.sh: #6480: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:52 UTC 2016 ssl.sh: #6481: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:53 UTC 2016 ssl.sh: #6482: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:54 UTC 2016 ssl.sh: #6483: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:55 UTC 2016 ssl.sh: #6484: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:57 UTC 2016 ssl.sh: #6485: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:58 UTC 2016 ssl.sh: #6486: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:10:59 UTC 2016 ssl.sh: #6487: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:00 UTC 2016 ssl.sh: #6488: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:01 UTC 2016 ssl.sh: #6489: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:02 UTC 2016 ssl.sh: #6490: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:03 UTC 2016 ssl.sh: #6491: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:05 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6492: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:06 UTC 2016 ssl.sh: #6493: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:07 UTC 2016 ssl.sh: #6494: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:08 UTC 2016 ssl.sh: #6495: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:09 UTC 2016 ssl.sh: #6496: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:10 UTC 2016 ssl.sh: #6497: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:11 UTC 2016 ssl.sh: #6498: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:12 UTC 2016 ssl.sh: #6499: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:13 UTC 2016 ssl.sh: #6500: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:14 UTC 2016 ssl.sh: #6501: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:16 UTC 2016 ssl.sh: #6502: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:17 UTC 2016 ssl.sh: #6503: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:18 UTC 2016 ssl.sh: #6504: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20117 found at Mon Apr 25 17:11:19 UTC 2016 ssl.sh: #6505: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20117 at Mon Apr 25 17:11:19 UTC 2016 kill -USR1 20117 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20117 killed at Mon Apr 25 17:11:19 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:11:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:11:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:20 UTC 2016 selfserv_9709 with PID 21559 started at Mon Apr 25 17:11:20 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:21 UTC 2016 ssl.sh: #6506: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:22 UTC 2016 ssl.sh: #6507: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:23 UTC 2016 ssl.sh: #6508: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:24 UTC 2016 ssl.sh: #6509: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:26 UTC 2016 ssl.sh: #6510: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:27 UTC 2016 ssl.sh: #6511: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:28 UTC 2016 ssl.sh: #6512: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:29 UTC 2016 ssl.sh: #6513: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:30 UTC 2016 ssl.sh: #6514: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:31 UTC 2016 ssl.sh: #6515: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:33 UTC 2016 ssl.sh: #6516: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:34 UTC 2016 ssl.sh: #6517: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:35 UTC 2016 ssl.sh: #6518: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:36 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6519: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:37 UTC 2016 ssl.sh: #6520: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:38 UTC 2016 ssl.sh: #6521: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:39 UTC 2016 ssl.sh: #6522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:40 UTC 2016 ssl.sh: #6523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:41 UTC 2016 ssl.sh: #6524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:43 UTC 2016 ssl.sh: #6525: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:44 UTC 2016 ssl.sh: #6526: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:45 UTC 2016 ssl.sh: #6527: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:46 UTC 2016 ssl.sh: #6528: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:47 UTC 2016 ssl.sh: #6529: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:48 UTC 2016 ssl.sh: #6530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:49 UTC 2016 ssl.sh: #6531: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:51 UTC 2016 ssl.sh: #6532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:52 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6533: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:53 UTC 2016 ssl.sh: #6534: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:54 UTC 2016 ssl.sh: #6535: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:55 UTC 2016 ssl.sh: #6536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:56 UTC 2016 ssl.sh: #6537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:57 UTC 2016 ssl.sh: #6538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:58 UTC 2016 ssl.sh: #6539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:11:59 UTC 2016 ssl.sh: #6540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:12:00 UTC 2016 ssl.sh: #6541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:12:02 UTC 2016 ssl.sh: #6542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:12:03 UTC 2016 ssl.sh: #6543: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:12:04 UTC 2016 ssl.sh: #6544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:12:05 UTC 2016 ssl.sh: #6545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21559 found at Mon Apr 25 17:12:06 UTC 2016 ssl.sh: #6546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 21559 at Mon Apr 25 17:12:06 UTC 2016 kill -USR1 21559 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21559 killed at Mon Apr 25 17:12:07 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:12:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:12:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:07 UTC 2016 selfserv_9709 with PID 23006 started at Mon Apr 25 17:12:07 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:08 UTC 2016 ssl.sh: #6547: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:09 UTC 2016 ssl.sh: #6548: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:10 UTC 2016 ssl.sh: #6549: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:11 UTC 2016 ssl.sh: #6550: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:12 UTC 2016 ssl.sh: #6551: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:13 UTC 2016 ssl.sh: #6552: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:14 UTC 2016 ssl.sh: #6553: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:15 UTC 2016 ssl.sh: #6554: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:16 UTC 2016 ssl.sh: #6555: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:17 UTC 2016 ssl.sh: #6556: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:18 UTC 2016 ssl.sh: #6557: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:19 UTC 2016 ssl.sh: #6558: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:20 UTC 2016 ssl.sh: #6559: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:21 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6560: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:22 UTC 2016 ssl.sh: #6561: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:23 UTC 2016 ssl.sh: #6562: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:24 UTC 2016 ssl.sh: #6563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:25 UTC 2016 ssl.sh: #6564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:26 UTC 2016 ssl.sh: #6565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:27 UTC 2016 ssl.sh: #6566: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:28 UTC 2016 ssl.sh: #6567: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:29 UTC 2016 ssl.sh: #6568: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:30 UTC 2016 ssl.sh: #6569: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:31 UTC 2016 ssl.sh: #6570: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:32 UTC 2016 ssl.sh: #6571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:33 UTC 2016 ssl.sh: #6572: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:34 UTC 2016 ssl.sh: #6573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 106 bytes tstclnt: Writing 106 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:35 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6574: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:36 UTC 2016 ssl.sh: #6575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:37 UTC 2016 ssl.sh: #6576: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:38 UTC 2016 ssl.sh: #6577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:39 UTC 2016 ssl.sh: #6578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:40 UTC 2016 ssl.sh: #6579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:41 UTC 2016 ssl.sh: #6580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:42 UTC 2016 ssl.sh: #6581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:43 UTC 2016 ssl.sh: #6582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:44 UTC 2016 ssl.sh: #6583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:45 UTC 2016 ssl.sh: #6584: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:46 UTC 2016 ssl.sh: #6585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:47 UTC 2016 ssl.sh: #6586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23006 found at Mon Apr 25 17:12:48 UTC 2016 ssl.sh: #6587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 23006 at Mon Apr 25 17:12:48 UTC 2016 kill -USR1 23006 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23006 killed at Mon Apr 25 17:12:48 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:12:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:12:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:12:49 UTC 2016 selfserv_9709 with PID 24434 started at Mon Apr 25 17:12:49 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:12:50 UTC 2016 ssl.sh: #6588: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:12:51 UTC 2016 ssl.sh: #6589: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:12:53 UTC 2016 ssl.sh: #6590: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:12:54 UTC 2016 ssl.sh: #6591: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:12:55 UTC 2016 ssl.sh: #6592: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:12:56 UTC 2016 ssl.sh: #6593: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:12:57 UTC 2016 ssl.sh: #6594: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:12:59 UTC 2016 ssl.sh: #6595: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:00 UTC 2016 ssl.sh: #6596: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:01 UTC 2016 ssl.sh: #6597: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:02 UTC 2016 ssl.sh: #6598: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:04 UTC 2016 ssl.sh: #6599: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:05 UTC 2016 ssl.sh: #6600: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:06 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6601: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:07 UTC 2016 ssl.sh: #6602: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:08 UTC 2016 ssl.sh: #6603: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:10 UTC 2016 ssl.sh: #6604: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:11 UTC 2016 ssl.sh: #6605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:12 UTC 2016 ssl.sh: #6606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:13 UTC 2016 ssl.sh: #6607: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:14 UTC 2016 ssl.sh: #6608: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:15 UTC 2016 ssl.sh: #6609: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:16 UTC 2016 ssl.sh: #6610: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:18 UTC 2016 ssl.sh: #6611: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:19 UTC 2016 ssl.sh: #6612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:20 UTC 2016 ssl.sh: #6613: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:21 UTC 2016 ssl.sh: #6614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:23 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6615: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:24 UTC 2016 ssl.sh: #6616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:25 UTC 2016 ssl.sh: #6617: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:26 UTC 2016 ssl.sh: #6618: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:27 UTC 2016 ssl.sh: #6619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:28 UTC 2016 ssl.sh: #6620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:29 UTC 2016 ssl.sh: #6621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:31 UTC 2016 ssl.sh: #6622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:32 UTC 2016 ssl.sh: #6623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:33 UTC 2016 ssl.sh: #6624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:34 UTC 2016 ssl.sh: #6625: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:35 UTC 2016 ssl.sh: #6626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:36 UTC 2016 ssl.sh: #6627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24434 found at Mon Apr 25 17:13:38 UTC 2016 ssl.sh: #6628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24434 at Mon Apr 25 17:13:38 UTC 2016 kill -USR1 24434 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24434 killed at Mon Apr 25 17:13:38 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:13:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:13:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:39 UTC 2016 selfserv_9709 with PID 25877 started at Mon Apr 25 17:13:39 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:40 UTC 2016 ssl.sh: #6629: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:41 UTC 2016 ssl.sh: #6630: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:42 UTC 2016 ssl.sh: #6631: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:43 UTC 2016 ssl.sh: #6632: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:45 UTC 2016 ssl.sh: #6633: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:46 UTC 2016 ssl.sh: #6634: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:47 UTC 2016 ssl.sh: #6635: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:48 UTC 2016 ssl.sh: #6636: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:50 UTC 2016 ssl.sh: #6637: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:51 UTC 2016 ssl.sh: #6638: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:52 UTC 2016 ssl.sh: #6639: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:53 UTC 2016 ssl.sh: #6640: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:55 UTC 2016 ssl.sh: #6641: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:56 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6642: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:57 UTC 2016 ssl.sh: #6643: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:58 UTC 2016 ssl.sh: #6644: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:13:59 UTC 2016 ssl.sh: #6645: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:00 UTC 2016 ssl.sh: #6646: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:02 UTC 2016 ssl.sh: #6647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:03 UTC 2016 ssl.sh: #6648: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:04 UTC 2016 ssl.sh: #6649: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:05 UTC 2016 ssl.sh: #6650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:06 UTC 2016 ssl.sh: #6651: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:07 UTC 2016 ssl.sh: #6652: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:09 UTC 2016 ssl.sh: #6653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:10 UTC 2016 ssl.sh: #6654: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:11 UTC 2016 ssl.sh: #6655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:12 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6656: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:13 UTC 2016 ssl.sh: #6657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:15 UTC 2016 ssl.sh: #6658: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:16 UTC 2016 ssl.sh: #6659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:17 UTC 2016 ssl.sh: #6660: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:18 UTC 2016 ssl.sh: #6661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:19 UTC 2016 ssl.sh: #6662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:20 UTC 2016 ssl.sh: #6663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:21 UTC 2016 ssl.sh: #6664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:23 UTC 2016 ssl.sh: #6665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:24 UTC 2016 ssl.sh: #6666: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:25 UTC 2016 ssl.sh: #6667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:26 UTC 2016 ssl.sh: #6668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 25877 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25877 found at Mon Apr 25 17:14:27 UTC 2016 ssl.sh: #6669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25877 at Mon Apr 25 17:14:27 UTC 2016 kill -USR1 25877 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25877 killed at Mon Apr 25 17:14:28 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:14:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:14:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:28 UTC 2016 selfserv_9709 with PID 27318 started at Mon Apr 25 17:14:28 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:29 UTC 2016 ssl.sh: #6670: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:30 UTC 2016 ssl.sh: #6671: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:31 UTC 2016 ssl.sh: #6672: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:33 UTC 2016 ssl.sh: #6673: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:34 UTC 2016 ssl.sh: #6674: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:35 UTC 2016 ssl.sh: #6675: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:36 UTC 2016 ssl.sh: #6676: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:37 UTC 2016 ssl.sh: #6677: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:38 UTC 2016 ssl.sh: #6678: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:39 UTC 2016 ssl.sh: #6679: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:40 UTC 2016 ssl.sh: #6680: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:41 UTC 2016 ssl.sh: #6681: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:42 UTC 2016 ssl.sh: #6682: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:44 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6683: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:45 UTC 2016 ssl.sh: #6684: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:46 UTC 2016 ssl.sh: #6685: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:47 UTC 2016 ssl.sh: #6686: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:48 UTC 2016 ssl.sh: #6687: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:49 UTC 2016 ssl.sh: #6688: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:50 UTC 2016 ssl.sh: #6689: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:51 UTC 2016 ssl.sh: #6690: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:52 UTC 2016 ssl.sh: #6691: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:53 UTC 2016 ssl.sh: #6692: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:54 UTC 2016 ssl.sh: #6693: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:55 UTC 2016 ssl.sh: #6694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:56 UTC 2016 ssl.sh: #6695: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:57 UTC 2016 ssl.sh: #6696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:58 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #6697: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:14:59 UTC 2016 ssl.sh: #6698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:00 UTC 2016 ssl.sh: #6699: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:01 UTC 2016 ssl.sh: #6700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:02 UTC 2016 ssl.sh: #6701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:03 UTC 2016 ssl.sh: #6702: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:04 UTC 2016 ssl.sh: #6703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:06 UTC 2016 ssl.sh: #6704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:07 UTC 2016 ssl.sh: #6705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:08 UTC 2016 ssl.sh: #6706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:09 UTC 2016 ssl.sh: #6707: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:10 UTC 2016 ssl.sh: #6708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:11 UTC 2016 ssl.sh: #6709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27318 found at Mon Apr 25 17:15:12 UTC 2016 ssl.sh: #6710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 27318 at Mon Apr 25 17:15:12 UTC 2016 kill -USR1 27318 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27318 killed at Mon Apr 25 17:15:12 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:15:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:15:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28760 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28760 found at Mon Apr 25 17:15:13 UTC 2016 selfserv_9709 with PID 28760 started at Mon Apr 25 17:15:13 UTC 2016 trying to kill selfserv_9709 with PID 28760 at Mon Apr 25 17:15:13 UTC 2016 kill -USR1 28760 ./ssl.sh: line 186: 28760 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28760 killed at Mon Apr 25 17:15:13 UTC 2016 ssl.sh: SSL Cipher Coverage - server bypass/client bypass - with ECC =============================== selfserv_9709 starting at Mon Apr 25 17:15:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:15:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28801 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:14 UTC 2016 selfserv_9709 with PID 28801 started at Mon Apr 25 17:15:14 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6711: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6712: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6713: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6714: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6715: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6716: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6717: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6718: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6719: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6720: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6721: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6722: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6723: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6724: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6725: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6726: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6727: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6728: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6729: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6730: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6731: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6732: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6733: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6734: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6735: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6736: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6737: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6738: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6739: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6740: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6741: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6742: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6743: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6744: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6745: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6746: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6747: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6748: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6749: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6750: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6751: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6752: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6753: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6754: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6755: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6756: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6757: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6758: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6759: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6760: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6761: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6762: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6763: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6764: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6765: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6766: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6767: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6768: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6769: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6770: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6771: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6772: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6773: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6774: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6775: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6776: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6777: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28801 >/dev/null 2>/dev/null selfserv_9709 with PID 28801 found at Mon Apr 25 17:15:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6778: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 28801 at Mon Apr 25 17:16:00 UTC 2016 kill -USR1 28801 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28801 killed at Mon Apr 25 17:16:00 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:16:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30704 >/dev/null 2>/dev/null selfserv_9709 with PID 30704 found at Mon Apr 25 17:16:01 UTC 2016 selfserv_9709 with PID 30704 started at Mon Apr 25 17:16:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6779: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 30704 >/dev/null 2>/dev/null selfserv_9709 with PID 30704 found at Mon Apr 25 17:16:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6780: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30704 >/dev/null 2>/dev/null selfserv_9709 with PID 30704 found at Mon Apr 25 17:16:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6781: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30704 >/dev/null 2>/dev/null selfserv_9709 with PID 30704 found at Mon Apr 25 17:16:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6782: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30704 >/dev/null 2>/dev/null selfserv_9709 with PID 30704 found at Mon Apr 25 17:16:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6783: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 30704 at Mon Apr 25 17:16:05 UTC 2016 kill -USR1 30704 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30704 killed at Mon Apr 25 17:16:05 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:16:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:05 UTC 2016 selfserv_9709 with PID 30867 started at Mon Apr 25 17:16:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6784: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6785: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6786: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6787: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6788: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6789: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6790: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6791: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6792: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6793: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6794: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6795: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6796: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6797: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 30867 >/dev/null 2>/dev/null selfserv_9709 with PID 30867 found at Mon Apr 25 17:16:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6798: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 30867 at Mon Apr 25 17:16:16 UTC 2016 kill -USR1 30867 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30867 killed at Mon Apr 25 17:16:17 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:16:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31253 >/dev/null 2>/dev/null selfserv_9709 with PID 31253 found at Mon Apr 25 17:16:17 UTC 2016 selfserv_9709 with PID 31253 started at Mon Apr 25 17:16:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6799: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 31253 >/dev/null 2>/dev/null selfserv_9709 with PID 31253 found at Mon Apr 25 17:16:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6800: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31253 >/dev/null 2>/dev/null selfserv_9709 with PID 31253 found at Mon Apr 25 17:16:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6801: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31253 >/dev/null 2>/dev/null selfserv_9709 with PID 31253 found at Mon Apr 25 17:16:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6802: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31253 >/dev/null 2>/dev/null selfserv_9709 with PID 31253 found at Mon Apr 25 17:16:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6803: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 31253 at Mon Apr 25 17:16:21 UTC 2016 kill -USR1 31253 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31253 killed at Mon Apr 25 17:16:21 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:16:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:22 UTC 2016 selfserv_9709 with PID 31401 started at Mon Apr 25 17:16:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6804: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6805: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6806: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6807: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6808: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6809: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6810: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6811: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6812: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6813: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6814: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6815: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6816: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6817: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31401 >/dev/null 2>/dev/null selfserv_9709 with PID 31401 found at Mon Apr 25 17:16:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6818: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 31401 at Mon Apr 25 17:16:33 UTC 2016 kill -USR1 31401 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31401 killed at Mon Apr 25 17:16:33 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:16:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31789 >/dev/null 2>/dev/null selfserv_9709 with PID 31789 found at Mon Apr 25 17:16:33 UTC 2016 selfserv_9709 with PID 31789 started at Mon Apr 25 17:16:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6819: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 31789 >/dev/null 2>/dev/null selfserv_9709 with PID 31789 found at Mon Apr 25 17:16:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6820: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31789 >/dev/null 2>/dev/null selfserv_9709 with PID 31789 found at Mon Apr 25 17:16:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6821: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31789 >/dev/null 2>/dev/null selfserv_9709 with PID 31789 found at Mon Apr 25 17:16:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6822: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31789 >/dev/null 2>/dev/null selfserv_9709 with PID 31789 found at Mon Apr 25 17:16:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6823: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 31789 at Mon Apr 25 17:16:37 UTC 2016 kill -USR1 31789 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31789 killed at Mon Apr 25 17:16:38 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:16:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:38 UTC 2016 selfserv_9709 with PID 31938 started at Mon Apr 25 17:16:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6824: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6825: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6826: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6827: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6828: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6829: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6830: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6831: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6832: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6833: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6834: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6835: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 31938 >/dev/null 2>/dev/null selfserv_9709 with PID 31938 found at Mon Apr 25 17:16:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6836: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 31938 at Mon Apr 25 17:16:47 UTC 2016 kill -USR1 31938 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 31938 killed at Mon Apr 25 17:16:48 UTC 2016 ssl.sh: SSL Client Authentication - server bypass/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:16:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32321 >/dev/null 2>/dev/null selfserv_9709 with PID 32321 found at Mon Apr 25 17:16:48 UTC 2016 selfserv_9709 with PID 32321 started at Mon Apr 25 17:16:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6837: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32321 at Mon Apr 25 17:16:49 UTC 2016 kill -USR1 32321 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32321 killed at Mon Apr 25 17:16:50 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:16:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32378 >/dev/null 2>/dev/null selfserv_9709 with PID 32378 found at Mon Apr 25 17:16:50 UTC 2016 selfserv_9709 with PID 32378 started at Mon Apr 25 17:16:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6838: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32378 at Mon Apr 25 17:16:51 UTC 2016 kill -USR1 32378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32378 killed at Mon Apr 25 17:16:52 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:16:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32435 >/dev/null 2>/dev/null selfserv_9709 with PID 32435 found at Mon Apr 25 17:16:52 UTC 2016 selfserv_9709 with PID 32435 started at Mon Apr 25 17:16:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6839: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32435 at Mon Apr 25 17:16:53 UTC 2016 kill -USR1 32435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32435 killed at Mon Apr 25 17:16:54 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:16:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32492 >/dev/null 2>/dev/null selfserv_9709 with PID 32492 found at Mon Apr 25 17:16:54 UTC 2016 selfserv_9709 with PID 32492 started at Mon Apr 25 17:16:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6840: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32492 at Mon Apr 25 17:16:55 UTC 2016 kill -USR1 32492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32492 killed at Mon Apr 25 17:16:56 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:16:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32550 >/dev/null 2>/dev/null selfserv_9709 with PID 32550 found at Mon Apr 25 17:16:56 UTC 2016 selfserv_9709 with PID 32550 started at Mon Apr 25 17:16:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6841: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32550 at Mon Apr 25 17:16:57 UTC 2016 kill -USR1 32550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32550 killed at Mon Apr 25 17:16:57 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:16:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:16:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32607 >/dev/null 2>/dev/null selfserv_9709 with PID 32607 found at Mon Apr 25 17:16:58 UTC 2016 selfserv_9709 with PID 32607 started at Mon Apr 25 17:16:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6842: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32607 at Mon Apr 25 17:16:59 UTC 2016 kill -USR1 32607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32607 killed at Mon Apr 25 17:16:59 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32664 >/dev/null 2>/dev/null selfserv_9709 with PID 32664 found at Mon Apr 25 17:17:00 UTC 2016 selfserv_9709 with PID 32664 started at Mon Apr 25 17:17:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6843: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32664 at Mon Apr 25 17:17:01 UTC 2016 kill -USR1 32664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32664 killed at Mon Apr 25 17:17:01 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32721 >/dev/null 2>/dev/null selfserv_9709 with PID 32721 found at Mon Apr 25 17:17:02 UTC 2016 selfserv_9709 with PID 32721 started at Mon Apr 25 17:17:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6844: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 32721 at Mon Apr 25 17:17:02 UTC 2016 kill -USR1 32721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32721 killed at Mon Apr 25 17:17:03 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 324 >/dev/null 2>/dev/null selfserv_9709 with PID 324 found at Mon Apr 25 17:17:03 UTC 2016 selfserv_9709 with PID 324 started at Mon Apr 25 17:17:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6845: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 324 at Mon Apr 25 17:17:04 UTC 2016 kill -USR1 324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 324 killed at Mon Apr 25 17:17:05 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 383 >/dev/null 2>/dev/null selfserv_9709 with PID 383 found at Mon Apr 25 17:17:05 UTC 2016 selfserv_9709 with PID 383 started at Mon Apr 25 17:17:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6846: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 383 at Mon Apr 25 17:17:06 UTC 2016 kill -USR1 383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 383 killed at Mon Apr 25 17:17:06 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 442 >/dev/null 2>/dev/null selfserv_9709 with PID 442 found at Mon Apr 25 17:17:07 UTC 2016 selfserv_9709 with PID 442 started at Mon Apr 25 17:17:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6847: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 442 at Mon Apr 25 17:17:08 UTC 2016 kill -USR1 442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 442 killed at Mon Apr 25 17:17:08 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 499 >/dev/null 2>/dev/null selfserv_9709 with PID 499 found at Mon Apr 25 17:17:09 UTC 2016 selfserv_9709 with PID 499 started at Mon Apr 25 17:17:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6848: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 499 at Mon Apr 25 17:17:09 UTC 2016 kill -USR1 499 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 499 killed at Mon Apr 25 17:17:10 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 556 >/dev/null 2>/dev/null selfserv_9709 with PID 556 found at Mon Apr 25 17:17:10 UTC 2016 selfserv_9709 with PID 556 started at Mon Apr 25 17:17:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6849: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 556 at Mon Apr 25 17:17:11 UTC 2016 kill -USR1 556 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 556 killed at Mon Apr 25 17:17:12 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 613 >/dev/null 2>/dev/null selfserv_9709 with PID 613 found at Mon Apr 25 17:17:12 UTC 2016 selfserv_9709 with PID 613 started at Mon Apr 25 17:17:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6850: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 613 at Mon Apr 25 17:17:14 UTC 2016 kill -USR1 613 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 613 killed at Mon Apr 25 17:17:14 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 670 >/dev/null 2>/dev/null selfserv_9709 with PID 670 found at Mon Apr 25 17:17:14 UTC 2016 selfserv_9709 with PID 670 started at Mon Apr 25 17:17:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6851: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 670 at Mon Apr 25 17:17:16 UTC 2016 kill -USR1 670 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 670 killed at Mon Apr 25 17:17:16 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 728 >/dev/null 2>/dev/null selfserv_9709 with PID 728 found at Mon Apr 25 17:17:17 UTC 2016 selfserv_9709 with PID 728 started at Mon Apr 25 17:17:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6852: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 728 at Mon Apr 25 17:17:18 UTC 2016 kill -USR1 728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 728 killed at Mon Apr 25 17:17:18 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 785 >/dev/null 2>/dev/null selfserv_9709 with PID 785 found at Mon Apr 25 17:17:19 UTC 2016 selfserv_9709 with PID 785 started at Mon Apr 25 17:17:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6853: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 785 at Mon Apr 25 17:17:20 UTC 2016 kill -USR1 785 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 785 killed at Mon Apr 25 17:17:20 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 842 >/dev/null 2>/dev/null selfserv_9709 with PID 842 found at Mon Apr 25 17:17:21 UTC 2016 selfserv_9709 with PID 842 started at Mon Apr 25 17:17:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6854: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 842 at Mon Apr 25 17:17:22 UTC 2016 kill -USR1 842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 842 killed at Mon Apr 25 17:17:23 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 899 >/dev/null 2>/dev/null selfserv_9709 with PID 899 found at Mon Apr 25 17:17:23 UTC 2016 selfserv_9709 with PID 899 started at Mon Apr 25 17:17:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6855: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 899 at Mon Apr 25 17:17:24 UTC 2016 kill -USR1 899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 899 killed at Mon Apr 25 17:17:25 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 956 >/dev/null 2>/dev/null selfserv_9709 with PID 956 found at Mon Apr 25 17:17:25 UTC 2016 selfserv_9709 with PID 956 started at Mon Apr 25 17:17:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6856: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 956 at Mon Apr 25 17:17:27 UTC 2016 kill -USR1 956 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 956 killed at Mon Apr 25 17:17:27 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1032 >/dev/null 2>/dev/null selfserv_9709 with PID 1032 found at Mon Apr 25 17:17:27 UTC 2016 selfserv_9709 with PID 1032 started at Mon Apr 25 17:17:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6857: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1032 at Mon Apr 25 17:17:29 UTC 2016 kill -USR1 1032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1032 killed at Mon Apr 25 17:17:29 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1090 >/dev/null 2>/dev/null selfserv_9709 with PID 1090 found at Mon Apr 25 17:17:30 UTC 2016 selfserv_9709 with PID 1090 started at Mon Apr 25 17:17:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6858: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1090 at Mon Apr 25 17:17:31 UTC 2016 kill -USR1 1090 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1090 killed at Mon Apr 25 17:17:31 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1148 >/dev/null 2>/dev/null selfserv_9709 with PID 1148 found at Mon Apr 25 17:17:32 UTC 2016 selfserv_9709 with PID 1148 started at Mon Apr 25 17:17:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6859: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1148 at Mon Apr 25 17:17:33 UTC 2016 kill -USR1 1148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1148 killed at Mon Apr 25 17:17:33 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1205 >/dev/null 2>/dev/null selfserv_9709 with PID 1205 found at Mon Apr 25 17:17:34 UTC 2016 selfserv_9709 with PID 1205 started at Mon Apr 25 17:17:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6860: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1205 at Mon Apr 25 17:17:35 UTC 2016 kill -USR1 1205 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1205 killed at Mon Apr 25 17:17:36 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1262 >/dev/null 2>/dev/null selfserv_9709 with PID 1262 found at Mon Apr 25 17:17:36 UTC 2016 selfserv_9709 with PID 1262 started at Mon Apr 25 17:17:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6861: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1262 at Mon Apr 25 17:17:37 UTC 2016 kill -USR1 1262 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1262 killed at Mon Apr 25 17:17:37 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1320 >/dev/null 2>/dev/null selfserv_9709 with PID 1320 found at Mon Apr 25 17:17:38 UTC 2016 selfserv_9709 with PID 1320 started at Mon Apr 25 17:17:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6862: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1320 at Mon Apr 25 17:17:39 UTC 2016 kill -USR1 1320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1320 killed at Mon Apr 25 17:17:39 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1377 >/dev/null 2>/dev/null selfserv_9709 with PID 1377 found at Mon Apr 25 17:17:40 UTC 2016 selfserv_9709 with PID 1377 started at Mon Apr 25 17:17:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6863: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1377 at Mon Apr 25 17:17:41 UTC 2016 kill -USR1 1377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1377 killed at Mon Apr 25 17:17:41 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1434 >/dev/null 2>/dev/null selfserv_9709 with PID 1434 found at Mon Apr 25 17:17:42 UTC 2016 selfserv_9709 with PID 1434 started at Mon Apr 25 17:17:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6864: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1434 at Mon Apr 25 17:17:43 UTC 2016 kill -USR1 1434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1434 killed at Mon Apr 25 17:17:43 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1491 >/dev/null 2>/dev/null selfserv_9709 with PID 1491 found at Mon Apr 25 17:17:44 UTC 2016 selfserv_9709 with PID 1491 started at Mon Apr 25 17:17:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6865: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1491 at Mon Apr 25 17:17:44 UTC 2016 kill -USR1 1491 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1491 killed at Mon Apr 25 17:17:45 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1549 >/dev/null 2>/dev/null selfserv_9709 with PID 1549 found at Mon Apr 25 17:17:45 UTC 2016 selfserv_9709 with PID 1549 started at Mon Apr 25 17:17:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6866: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1549 at Mon Apr 25 17:17:46 UTC 2016 kill -USR1 1549 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1549 killed at Mon Apr 25 17:17:47 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1624 >/dev/null 2>/dev/null selfserv_9709 with PID 1624 found at Mon Apr 25 17:17:47 UTC 2016 selfserv_9709 with PID 1624 started at Mon Apr 25 17:17:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6867: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1624 at Mon Apr 25 17:17:48 UTC 2016 kill -USR1 1624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1624 killed at Mon Apr 25 17:17:49 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1683 >/dev/null 2>/dev/null selfserv_9709 with PID 1683 found at Mon Apr 25 17:17:49 UTC 2016 selfserv_9709 with PID 1683 started at Mon Apr 25 17:17:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6868: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1683 at Mon Apr 25 17:17:51 UTC 2016 kill -USR1 1683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1683 killed at Mon Apr 25 17:17:51 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1740 >/dev/null 2>/dev/null selfserv_9709 with PID 1740 found at Mon Apr 25 17:17:52 UTC 2016 selfserv_9709 with PID 1740 started at Mon Apr 25 17:17:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6869: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1740 at Mon Apr 25 17:17:53 UTC 2016 kill -USR1 1740 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1740 killed at Mon Apr 25 17:17:53 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1797 >/dev/null 2>/dev/null selfserv_9709 with PID 1797 found at Mon Apr 25 17:17:53 UTC 2016 selfserv_9709 with PID 1797 started at Mon Apr 25 17:17:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6870: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1797 at Mon Apr 25 17:17:55 UTC 2016 kill -USR1 1797 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1797 killed at Mon Apr 25 17:17:55 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1854 >/dev/null 2>/dev/null selfserv_9709 with PID 1854 found at Mon Apr 25 17:17:56 UTC 2016 selfserv_9709 with PID 1854 started at Mon Apr 25 17:17:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6871: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1854 at Mon Apr 25 17:17:56 UTC 2016 kill -USR1 1854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1854 killed at Mon Apr 25 17:17:57 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:17:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1912 >/dev/null 2>/dev/null selfserv_9709 with PID 1912 found at Mon Apr 25 17:17:57 UTC 2016 selfserv_9709 with PID 1912 started at Mon Apr 25 17:17:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6872: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 1912 at Mon Apr 25 17:17:58 UTC 2016 kill -USR1 1912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1912 killed at Mon Apr 25 17:17:59 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:17:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:17:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1969 >/dev/null 2>/dev/null selfserv_9709 with PID 1969 found at Mon Apr 25 17:17:59 UTC 2016 selfserv_9709 with PID 1969 started at Mon Apr 25 17:17:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #6873: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1969 at Mon Apr 25 17:18:00 UTC 2016 kill -USR1 1969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1969 killed at Mon Apr 25 17:18:00 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:18:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2030 >/dev/null 2>/dev/null selfserv_9709 with PID 2030 found at Mon Apr 25 17:18:01 UTC 2016 selfserv_9709 with PID 2030 started at Mon Apr 25 17:18:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6874: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2030 at Mon Apr 25 17:18:02 UTC 2016 kill -USR1 2030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2030 killed at Mon Apr 25 17:18:02 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:18:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2102 >/dev/null 2>/dev/null selfserv_9709 with PID 2102 found at Mon Apr 25 17:18:03 UTC 2016 selfserv_9709 with PID 2102 started at Mon Apr 25 17:18:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6875: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2102 at Mon Apr 25 17:18:04 UTC 2016 kill -USR1 2102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2102 killed at Mon Apr 25 17:18:05 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:18:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2159 >/dev/null 2>/dev/null selfserv_9709 with PID 2159 found at Mon Apr 25 17:18:05 UTC 2016 selfserv_9709 with PID 2159 started at Mon Apr 25 17:18:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6876: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2159 at Mon Apr 25 17:18:07 UTC 2016 kill -USR1 2159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2159 killed at Mon Apr 25 17:18:07 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:18:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2217 >/dev/null 2>/dev/null selfserv_9709 with PID 2217 found at Mon Apr 25 17:18:07 UTC 2016 selfserv_9709 with PID 2217 started at Mon Apr 25 17:18:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6877: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 2217 at Mon Apr 25 17:18:09 UTC 2016 kill -USR1 2217 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2217 killed at Mon Apr 25 17:18:09 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:18:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2274 >/dev/null 2>/dev/null selfserv_9709 with PID 2274 found at Mon Apr 25 17:18:09 UTC 2016 selfserv_9709 with PID 2274 started at Mon Apr 25 17:18:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6878: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2274 at Mon Apr 25 17:18:11 UTC 2016 kill -USR1 2274 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2274 killed at Mon Apr 25 17:18:11 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:18:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2331 >/dev/null 2>/dev/null selfserv_9709 with PID 2331 found at Mon Apr 25 17:18:12 UTC 2016 selfserv_9709 with PID 2331 started at Mon Apr 25 17:18:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6879: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2331 at Mon Apr 25 17:18:13 UTC 2016 kill -USR1 2331 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2331 killed at Mon Apr 25 17:18:13 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:18:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2388 >/dev/null 2>/dev/null selfserv_9709 with PID 2388 found at Mon Apr 25 17:18:14 UTC 2016 selfserv_9709 with PID 2388 started at Mon Apr 25 17:18:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6880: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2388 at Mon Apr 25 17:18:16 UTC 2016 kill -USR1 2388 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2388 killed at Mon Apr 25 17:18:16 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:18:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2445 >/dev/null 2>/dev/null selfserv_9709 with PID 2445 found at Mon Apr 25 17:18:16 UTC 2016 selfserv_9709 with PID 2445 started at Mon Apr 25 17:18:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w bogus -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6881: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 2445 at Mon Apr 25 17:18:18 UTC 2016 kill -USR1 2445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2445 killed at Mon Apr 25 17:18:18 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:18:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2503 >/dev/null 2>/dev/null selfserv_9709 with PID 2503 found at Mon Apr 25 17:18:18 UTC 2016 selfserv_9709 with PID 2503 started at Mon Apr 25 17:18:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:tls1.0 -w nss -n TestUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6882: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2503 at Mon Apr 25 17:18:20 UTC 2016 kill -USR1 2503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2503 killed at Mon Apr 25 17:18:20 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:18:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2560 >/dev/null 2>/dev/null selfserv_9709 with PID 2560 found at Mon Apr 25 17:18:21 UTC 2016 selfserv_9709 with PID 2560 started at Mon Apr 25 17:18:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6883: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2560 at Mon Apr 25 17:18:22 UTC 2016 kill -USR1 2560 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2560 killed at Mon Apr 25 17:18:22 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:18:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2617 >/dev/null 2>/dev/null selfserv_9709 with PID 2617 found at Mon Apr 25 17:18:23 UTC 2016 selfserv_9709 with PID 2617 started at Mon Apr 25 17:18:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6884: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2617 at Mon Apr 25 17:18:24 UTC 2016 kill -USR1 2617 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2617 killed at Mon Apr 25 17:18:24 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:18:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2674 >/dev/null 2>/dev/null selfserv_9709 with PID 2674 found at Mon Apr 25 17:18:25 UTC 2016 selfserv_9709 with PID 2674 started at Mon Apr 25 17:18:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #6885: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 2674 at Mon Apr 25 17:18:26 UTC 2016 kill -USR1 2674 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2674 killed at Mon Apr 25 17:18:26 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:18:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2731 >/dev/null 2>/dev/null selfserv_9709 with PID 2731 found at Mon Apr 25 17:18:27 UTC 2016 selfserv_9709 with PID 2731 started at Mon Apr 25 17:18:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -n TestUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6886: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2731 at Mon Apr 25 17:18:28 UTC 2016 kill -USR1 2731 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2731 killed at Mon Apr 25 17:18:28 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 17:18:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2812 >/dev/null 2>/dev/null selfserv_9709 with PID 2812 found at Mon Apr 25 17:18:29 UTC 2016 selfserv_9709 with PID 2812 started at Mon Apr 25 17:18:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6887: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2812 at Mon Apr 25 17:18:30 UTC 2016 kill -USR1 2812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2812 killed at Mon Apr 25 17:18:30 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 17:18:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2875 >/dev/null 2>/dev/null selfserv_9709 with PID 2875 found at Mon Apr 25 17:18:31 UTC 2016 selfserv_9709 with PID 2875 started at Mon Apr 25 17:18:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6888: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 2875 at Mon Apr 25 17:18:31 UTC 2016 kill -USR1 2875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2875 killed at Mon Apr 25 17:18:32 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 17:18:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2940 >/dev/null 2>/dev/null selfserv_9709 with PID 2940 found at Mon Apr 25 17:18:32 UTC 2016 selfserv_9709 with PID 2940 started at Mon Apr 25 17:18:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #6889: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 2940 at Mon Apr 25 17:18:33 UTC 2016 kill -USR1 2940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2940 killed at Mon Apr 25 17:18:34 UTC 2016 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 17:18:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3019 >/dev/null 2>/dev/null selfserv_9709 with PID 3019 found at Mon Apr 25 17:18:34 UTC 2016 selfserv_9709 with PID 3019 started at Mon Apr 25 17:18:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6890: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 3019 at Mon Apr 25 17:18:35 UTC 2016 kill -USR1 3019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3019 killed at Mon Apr 25 17:18:35 UTC 2016 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9709 starting at Mon Apr 25 17:18:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3095 >/dev/null 2>/dev/null selfserv_9709 with PID 3095 found at Mon Apr 25 17:18:36 UTC 2016 selfserv_9709 with PID 3095 started at Mon Apr 25 17:18:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3:ssl3 -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #6891: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 3095 at Mon Apr 25 17:18:36 UTC 2016 kill -USR1 3095 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3095 killed at Mon Apr 25 17:18:37 UTC 2016 ssl.sh: TLS Server hello response without SNI ---- selfserv_9709 starting at Mon Apr 25 17:18:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3166 >/dev/null 2>/dev/null selfserv_9709 with PID 3166 found at Mon Apr 25 17:18:37 UTC 2016 selfserv_9709 with PID 3166 started at Mon Apr 25 17:18:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6892: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 3166 at Mon Apr 25 17:18:38 UTC 2016 kill -USR1 3166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3166 killed at Mon Apr 25 17:18:39 UTC 2016 ssl.sh: TLS Server hello response with SNI ---- selfserv_9709 starting at Mon Apr 25 17:18:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3230 >/dev/null 2>/dev/null selfserv_9709 with PID 3230 found at Mon Apr 25 17:18:39 UTC 2016 selfserv_9709 with PID 3230 started at Mon Apr 25 17:18:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6893: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 3230 at Mon Apr 25 17:18:40 UTC 2016 kill -USR1 3230 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3230 killed at Mon Apr 25 17:18:40 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9709 starting at Mon Apr 25 17:18:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3293 >/dev/null 2>/dev/null selfserv_9709 with PID 3293 found at Mon Apr 25 17:18:41 UTC 2016 selfserv_9709 with PID 3293 started at Mon Apr 25 17:18:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #6894: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 3293 at Mon Apr 25 17:18:42 UTC 2016 kill -USR1 3293 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3293 killed at Mon Apr 25 17:18:42 UTC 2016 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9709 starting at Mon Apr 25 17:18:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3356 >/dev/null 2>/dev/null selfserv_9709 with PID 3356 found at Mon Apr 25 17:18:43 UTC 2016 selfserv_9709 with PID 3356 started at Mon Apr 25 17:18:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #6895: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 3356 at Mon Apr 25 17:18:43 UTC 2016 kill -USR1 3356 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3356 killed at Mon Apr 25 17:18:44 UTC 2016 ssl.sh: TLS Server response with alert ---- selfserv_9709 starting at Mon Apr 25 17:18:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3423 >/dev/null 2>/dev/null selfserv_9709 with PID 3423 found at Mon Apr 25 17:18:44 UTC 2016 selfserv_9709 with PID 3423 started at Mon Apr 25 17:18:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -V ssl3: -c v -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #6896: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 3423 at Mon Apr 25 17:18:45 UTC 2016 kill -USR1 3423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3423 killed at Mon Apr 25 17:18:45 UTC 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9709 starting at Mon Apr 25 17:18:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3472 >/dev/null 2>/dev/null selfserv_9709 with PID 3472 found at Mon Apr 25 17:18:46 UTC 2016 selfserv_9709 with PID 3472 started at Mon Apr 25 17:18:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 0 ssl.sh: #6897: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 3472 at Mon Apr 25 17:18:47 UTC 2016 kill -USR1 3472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3472 killed at Mon Apr 25 17:18:47 UTC 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9709 starting at Mon Apr 25 17:18:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3521 >/dev/null 2>/dev/null selfserv_9709 with PID 3521 found at Mon Apr 25 17:18:48 UTC 2016 selfserv_9709 with PID 3521 started at Mon Apr 25 17:18:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 3 ssl.sh: #6898: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9709 with PID 3521 at Mon Apr 25 17:18:49 UTC 2016 kill -USR1 3521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3521 killed at Mon Apr 25 17:18:49 UTC 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9709 starting at Mon Apr 25 17:18:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3570 >/dev/null 2>/dev/null selfserv_9709 with PID 3570 found at Mon Apr 25 17:18:49 UTC 2016 selfserv_9709 with PID 3570 started at Mon Apr 25 17:18:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #6899: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 3570 at Mon Apr 25 17:18:50 UTC 2016 kill -USR1 3570 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3570 killed at Mon Apr 25 17:18:51 UTC 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9709 starting at Mon Apr 25 17:18:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3619 >/dev/null 2>/dev/null selfserv_9709 with PID 3619 found at Mon Apr 25 17:18:51 UTC 2016 selfserv_9709 with PID 3619 started at Mon Apr 25 17:18:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #6900: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 3619 at Mon Apr 25 17:18:52 UTC 2016 kill -USR1 3619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3619 killed at Mon Apr 25 17:18:52 UTC 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9709 starting at Mon Apr 25 17:18:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3668 >/dev/null 2>/dev/null selfserv_9709 with PID 3668 found at Mon Apr 25 17:18:53 UTC 2016 selfserv_9709 with PID 3668 started at Mon Apr 25 17:18:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #6901: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 3668 at Mon Apr 25 17:18:53 UTC 2016 kill -USR1 3668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3668 killed at Mon Apr 25 17:18:54 UTC 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9709 starting at Mon Apr 25 17:18:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3717 >/dev/null 2>/dev/null selfserv_9709 with PID 3717 found at Mon Apr 25 17:18:54 UTC 2016 selfserv_9709 with PID 3717 started at Mon Apr 25 17:18:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #6902: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 3717 at Mon Apr 25 17:18:55 UTC 2016 kill -USR1 3717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3717 killed at Mon Apr 25 17:18:55 UTC 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9709 starting at Mon Apr 25 17:18:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3769 >/dev/null 2>/dev/null selfserv_9709 with PID 3769 found at Mon Apr 25 17:18:56 UTC 2016 selfserv_9709 with PID 3769 started at Mon Apr 25 17:18:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #6903: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 3769 at Mon Apr 25 17:18:57 UTC 2016 kill -USR1 3769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3769 killed at Mon Apr 25 17:18:57 UTC 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9709 starting at Mon Apr 25 17:18:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:18:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 3818 >/dev/null 2>/dev/null selfserv_9709 with PID 3818 found at Mon Apr 25 17:18:58 UTC 2016 selfserv_9709 with PID 3818 started at Mon Apr 25 17:18:58 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Mon Apr 25 17:18:58 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 17:20:21 UTC 2016 ssl.sh: #6904: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 3818 at Mon Apr 25 17:20:21 UTC 2016 kill -USR1 3818 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 3818 killed at Mon Apr 25 17:20:22 UTC 2016 ssl.sh: SSL Stress Test - server bypass/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 17:20:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4003 >/dev/null 2>/dev/null selfserv_9709 with PID 4003 found at Mon Apr 25 17:20:23 UTC 2016 selfserv_9709 with PID 4003 started at Mon Apr 25 17:20:23 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:20:24 UTC 2016 ssl.sh: #6905: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4003 at Mon Apr 25 17:20:24 UTC 2016 kill -USR1 4003 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4003 killed at Mon Apr 25 17:20:24 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 17:20:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4079 >/dev/null 2>/dev/null selfserv_9709 with PID 4079 found at Mon Apr 25 17:20:25 UTC 2016 selfserv_9709 with PID 4079 started at Mon Apr 25 17:20:25 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:20:26 UTC 2016 ssl.sh: #6906: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4079 at Mon Apr 25 17:20:27 UTC 2016 kill -USR1 4079 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4079 killed at Mon Apr 25 17:20:27 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 17:20:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4158 >/dev/null 2>/dev/null selfserv_9709 with PID 4158 found at Mon Apr 25 17:20:27 UTC 2016 selfserv_9709 with PID 4158 started at Mon Apr 25 17:20:27 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:20:29 UTC 2016 ssl.sh: #6907: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4158 at Mon Apr 25 17:20:29 UTC 2016 kill -USR1 4158 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4158 killed at Mon Apr 25 17:20:29 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 17:20:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4234 >/dev/null 2>/dev/null selfserv_9709 with PID 4234 found at Mon Apr 25 17:20:30 UTC 2016 selfserv_9709 with PID 4234 started at Mon Apr 25 17:20:30 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:30 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:20:31 UTC 2016 ssl.sh: #6908: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4234 at Mon Apr 25 17:20:32 UTC 2016 kill -USR1 4234 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4234 killed at Mon Apr 25 17:20:32 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 17:20:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4310 >/dev/null 2>/dev/null selfserv_9709 with PID 4310 found at Mon Apr 25 17:20:32 UTC 2016 selfserv_9709 with PID 4310 started at Mon Apr 25 17:20:32 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:20:34 UTC 2016 ssl.sh: #6909: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4310 at Mon Apr 25 17:20:34 UTC 2016 kill -USR1 4310 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4310 killed at Mon Apr 25 17:20:35 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 17:20:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4386 >/dev/null 2>/dev/null selfserv_9709 with PID 4386 found at Mon Apr 25 17:20:35 UTC 2016 selfserv_9709 with PID 4386 started at Mon Apr 25 17:20:35 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:20:37 UTC 2016 ssl.sh: #6910: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4386 at Mon Apr 25 17:20:37 UTC 2016 kill -USR1 4386 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4386 killed at Mon Apr 25 17:20:38 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 17:20:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4462 >/dev/null 2>/dev/null selfserv_9709 with PID 4462 found at Mon Apr 25 17:20:38 UTC 2016 selfserv_9709 with PID 4462 started at Mon Apr 25 17:20:38 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:38 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:20:40 UTC 2016 ssl.sh: #6911: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4462 at Mon Apr 25 17:20:40 UTC 2016 kill -USR1 4462 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4462 killed at Mon Apr 25 17:20:40 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9709 starting at Mon Apr 25 17:20:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4544 >/dev/null 2>/dev/null selfserv_9709 with PID 4544 found at Mon Apr 25 17:20:41 UTC 2016 selfserv_9709 with PID 4544 started at Mon Apr 25 17:20:41 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:41 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:20:43 UTC 2016 ssl.sh: #6912: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4544 at Mon Apr 25 17:20:43 UTC 2016 kill -USR1 4544 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4544 killed at Mon Apr 25 17:20:43 UTC 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:20:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4649 >/dev/null 2>/dev/null selfserv_9709 with PID 4649 found at Mon Apr 25 17:20:44 UTC 2016 selfserv_9709 with PID 4649 started at Mon Apr 25 17:20:44 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:44 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:20:48 UTC 2016 ssl.sh: #6913: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4649 at Mon Apr 25 17:20:48 UTC 2016 kill -USR1 4649 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4649 killed at Mon Apr 25 17:20:48 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:20:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4724 >/dev/null 2>/dev/null selfserv_9709 with PID 4724 found at Mon Apr 25 17:20:49 UTC 2016 selfserv_9709 with PID 4724 started at Mon Apr 25 17:20:49 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 100 -C c -V ssl3: -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:20:52 UTC 2016 ssl.sh: #6914: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4724 at Mon Apr 25 17:20:53 UTC 2016 kill -USR1 4724 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4724 killed at Mon Apr 25 17:20:53 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:20:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4799 >/dev/null 2>/dev/null selfserv_9709 with PID 4799 found at Mon Apr 25 17:20:53 UTC 2016 selfserv_9709 with PID 4799 started at Mon Apr 25 17:20:53 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:53 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:20:54 UTC 2016 ssl.sh: #6915: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4799 at Mon Apr 25 17:20:54 UTC 2016 kill -USR1 4799 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4799 killed at Mon Apr 25 17:20:55 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:20:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4875 >/dev/null 2>/dev/null selfserv_9709 with PID 4875 found at Mon Apr 25 17:20:55 UTC 2016 selfserv_9709 with PID 4875 started at Mon Apr 25 17:20:55 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:20:56 UTC 2016 ssl.sh: #6916: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4875 at Mon Apr 25 17:20:56 UTC 2016 kill -USR1 4875 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4875 killed at Mon Apr 25 17:20:57 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 17:20:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4951 >/dev/null 2>/dev/null selfserv_9709 with PID 4951 found at Mon Apr 25 17:20:57 UTC 2016 selfserv_9709 with PID 4951 started at Mon Apr 25 17:20:57 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:20:58 UTC 2016 ssl.sh: #6917: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 4951 at Mon Apr 25 17:20:58 UTC 2016 kill -USR1 4951 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4951 killed at Mon Apr 25 17:20:58 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:20:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:20:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5027 >/dev/null 2>/dev/null selfserv_9709 with PID 5027 found at Mon Apr 25 17:20:59 UTC 2016 selfserv_9709 with PID 5027 started at Mon Apr 25 17:20:59 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 17:20:59 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:21:00 UTC 2016 ssl.sh: #6918: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5027 at Mon Apr 25 17:21:00 UTC 2016 kill -USR1 5027 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5027 killed at Mon Apr 25 17:21:00 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 17:21:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5103 >/dev/null 2>/dev/null selfserv_9709 with PID 5103 found at Mon Apr 25 17:21:01 UTC 2016 selfserv_9709 with PID 5103 started at Mon Apr 25 17:21:01 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:21:02 UTC 2016 ssl.sh: #6919: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5103 at Mon Apr 25 17:21:02 UTC 2016 kill -USR1 5103 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5103 killed at Mon Apr 25 17:21:02 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9709 starting at Mon Apr 25 17:21:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5200 >/dev/null 2>/dev/null selfserv_9709 with PID 5200 found at Mon Apr 25 17:21:03 UTC 2016 selfserv_9709 with PID 5200 started at Mon Apr 25 17:21:03 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:21:05 UTC 2016 ssl.sh: #6920: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5200 at Mon Apr 25 17:21:05 UTC 2016 kill -USR1 5200 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5200 killed at Mon Apr 25 17:21:05 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9709 starting at Mon Apr 25 17:21:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5282 >/dev/null 2>/dev/null selfserv_9709 with PID 5282 found at Mon Apr 25 17:21:06 UTC 2016 selfserv_9709 with PID 5282 started at Mon Apr 25 17:21:06 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:21:08 UTC 2016 ssl.sh: #6921: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5282 at Mon Apr 25 17:21:08 UTC 2016 kill -USR1 5282 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5282 killed at Mon Apr 25 17:21:08 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:21:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5379 >/dev/null 2>/dev/null selfserv_9709 with PID 5379 found at Mon Apr 25 17:21:09 UTC 2016 selfserv_9709 with PID 5379 started at Mon Apr 25 17:21:09 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:21:13 UTC 2016 ssl.sh: #6922: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5379 at Mon Apr 25 17:21:13 UTC 2016 kill -USR1 5379 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5379 killed at Mon Apr 25 17:21:14 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:21:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5454 >/dev/null 2>/dev/null selfserv_9709 with PID 5454 found at Mon Apr 25 17:21:14 UTC 2016 selfserv_9709 with PID 5454 started at Mon Apr 25 17:21:14 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:21:18 UTC 2016 ssl.sh: #6923: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5454 at Mon Apr 25 17:21:18 UTC 2016 kill -USR1 5454 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5454 killed at Mon Apr 25 17:21:19 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:21:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5529 >/dev/null 2>/dev/null selfserv_9709 with PID 5529 found at Mon Apr 25 17:21:19 UTC 2016 selfserv_9709 with PID 5529 started at Mon Apr 25 17:21:19 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:21:24 UTC 2016 ssl.sh: #6924: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5529 at Mon Apr 25 17:21:24 UTC 2016 kill -USR1 5529 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5529 killed at Mon Apr 25 17:21:24 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:21:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5605 >/dev/null 2>/dev/null selfserv_9709 with PID 5605 found at Mon Apr 25 17:21:25 UTC 2016 selfserv_9709 with PID 5605 started at Mon Apr 25 17:21:25 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:21:31 UTC 2016 ssl.sh: #6925: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5605 at Mon Apr 25 17:21:31 UTC 2016 kill -USR1 5605 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5605 killed at Mon Apr 25 17:21:32 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:21:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5683 >/dev/null 2>/dev/null selfserv_9709 with PID 5683 found at Mon Apr 25 17:21:32 UTC 2016 selfserv_9709 with PID 5683 started at Mon Apr 25 17:21:32 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:21:38 UTC 2016 ssl.sh: #6926: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5683 at Mon Apr 25 17:21:38 UTC 2016 kill -USR1 5683 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5683 killed at Mon Apr 25 17:21:39 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 17:21:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5758 >/dev/null 2>/dev/null selfserv_9709 with PID 5758 found at Mon Apr 25 17:21:39 UTC 2016 selfserv_9709 with PID 5758 started at Mon Apr 25 17:21:39 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:21:41 UTC 2016 ssl.sh: #6927: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5758 at Mon Apr 25 17:21:41 UTC 2016 kill -USR1 5758 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5758 killed at Mon Apr 25 17:21:41 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 17:21:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5834 >/dev/null 2>/dev/null selfserv_9709 with PID 5834 found at Mon Apr 25 17:21:42 UTC 2016 selfserv_9709 with PID 5834 started at Mon Apr 25 17:21:42 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:21:44 UTC 2016 ssl.sh: #6928: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5834 at Mon Apr 25 17:21:44 UTC 2016 kill -USR1 5834 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5834 killed at Mon Apr 25 17:21:44 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 17:21:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5911 >/dev/null 2>/dev/null selfserv_9709 with PID 5911 found at Mon Apr 25 17:21:45 UTC 2016 selfserv_9709 with PID 5911 started at Mon Apr 25 17:21:45 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:21:46 UTC 2016 ssl.sh: #6929: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5911 at Mon Apr 25 17:21:46 UTC 2016 kill -USR1 5911 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5911 killed at Mon Apr 25 17:21:47 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 17:21:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5987 >/dev/null 2>/dev/null selfserv_9709 with PID 5987 found at Mon Apr 25 17:21:47 UTC 2016 selfserv_9709 with PID 5987 started at Mon Apr 25 17:21:47 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:21:49 UTC 2016 ssl.sh: #6930: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 5987 at Mon Apr 25 17:21:49 UTC 2016 kill -USR1 5987 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5987 killed at Mon Apr 25 17:21:49 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 17:21:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6063 >/dev/null 2>/dev/null selfserv_9709 with PID 6063 found at Mon Apr 25 17:21:50 UTC 2016 selfserv_9709 with PID 6063 started at Mon Apr 25 17:21:50 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:50 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:21:51 UTC 2016 ssl.sh: #6931: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6063 at Mon Apr 25 17:21:51 UTC 2016 kill -USR1 6063 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6063 killed at Mon Apr 25 17:21:51 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:21:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6160 >/dev/null 2>/dev/null selfserv_9709 with PID 6160 found at Mon Apr 25 17:21:52 UTC 2016 selfserv_9709 with PID 6160 started at Mon Apr 25 17:21:52 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 17:21:54 UTC 2016 ssl.sh: #6932: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6160 at Mon Apr 25 17:21:54 UTC 2016 kill -USR1 6160 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6160 killed at Mon Apr 25 17:21:54 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:21:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6235 >/dev/null 2>/dev/null selfserv_9709 with PID 6235 found at Mon Apr 25 17:21:55 UTC 2016 selfserv_9709 with PID 6235 started at Mon Apr 25 17:21:55 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:21:56 UTC 2016 ssl.sh: #6933: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6235 at Mon Apr 25 17:21:56 UTC 2016 kill -USR1 6235 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6235 killed at Mon Apr 25 17:21:56 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:21:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6311 >/dev/null 2>/dev/null selfserv_9709 with PID 6311 found at Mon Apr 25 17:21:57 UTC 2016 selfserv_9709 with PID 6311 started at Mon Apr 25 17:21:57 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 17:21:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 17:21:59 UTC 2016 ssl.sh: #6934: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6311 at Mon Apr 25 17:21:59 UTC 2016 kill -USR1 6311 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6311 killed at Mon Apr 25 17:21:59 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:21:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:21:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6386 >/dev/null 2>/dev/null selfserv_9709 with PID 6386 found at Mon Apr 25 17:22:00 UTC 2016 selfserv_9709 with PID 6386 started at Mon Apr 25 17:22:00 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 17:22:00 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 17:22:01 UTC 2016 ssl.sh: #6935: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6386 at Mon Apr 25 17:22:02 UTC 2016 kill -USR1 6386 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6386 killed at Mon Apr 25 17:22:02 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 17:22:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:22:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6476 >/dev/null 2>/dev/null selfserv_9709 with PID 6476 found at Mon Apr 25 17:22:02 UTC 2016 selfserv_9709 with PID 6476 started at Mon Apr 25 17:22:02 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 17:22:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:22:03 UTC 2016 ssl.sh: #6936: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6476 at Mon Apr 25 17:22:04 UTC 2016 kill -USR1 6476 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6476 killed at Mon Apr 25 17:22:04 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:22:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:22:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6553 >/dev/null 2>/dev/null selfserv_9709 with PID 6553 found at Mon Apr 25 17:22:04 UTC 2016 selfserv_9709 with PID 6553 started at Mon Apr 25 17:22:04 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:22:05 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:22:06 UTC 2016 ssl.sh: #6937: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6553 at Mon Apr 25 17:22:06 UTC 2016 kill -USR1 6553 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6553 killed at Mon Apr 25 17:22:06 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:22:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:22:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6650 >/dev/null 2>/dev/null selfserv_9709 with PID 6650 found at Mon Apr 25 17:22:07 UTC 2016 selfserv_9709 with PID 6650 started at Mon Apr 25 17:22:07 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:22:07 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:22:12 UTC 2016 ssl.sh: #6938: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6650 at Mon Apr 25 17:22:12 UTC 2016 kill -USR1 6650 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6650 killed at Mon Apr 25 17:22:12 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 17:22:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:22:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6725 >/dev/null 2>/dev/null selfserv_9709 with PID 6725 found at Mon Apr 25 17:22:13 UTC 2016 selfserv_9709 with PID 6725 started at Mon Apr 25 17:22:13 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 17:22:13 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:22:15 UTC 2016 ssl.sh: #6939: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6725 at Mon Apr 25 17:22:15 UTC 2016 kill -USR1 6725 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6725 killed at Mon Apr 25 17:22:15 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:22:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:22:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6801 >/dev/null 2>/dev/null selfserv_9709 with PID 6801 found at Mon Apr 25 17:22:16 UTC 2016 selfserv_9709 with PID 6801 started at Mon Apr 25 17:22:16 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:22:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:22:21 UTC 2016 ssl.sh: #6940: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6801 at Mon Apr 25 17:22:21 UTC 2016 kill -USR1 6801 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6801 killed at Mon Apr 25 17:22:21 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:22:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:22:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6876 >/dev/null 2>/dev/null selfserv_9709 with PID 6876 found at Mon Apr 25 17:22:22 UTC 2016 selfserv_9709 with PID 6876 started at Mon Apr 25 17:22:22 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:22:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:22:28 UTC 2016 ssl.sh: #6941: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6876 at Mon Apr 25 17:22:28 UTC 2016 kill -USR1 6876 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6876 killed at Mon Apr 25 17:22:28 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:22:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:22:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 6969 >/dev/null 2>/dev/null selfserv_9709 with PID 6969 found at Mon Apr 25 17:22:29 UTC 2016 selfserv_9709 with PID 6969 started at Mon Apr 25 17:22:29 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:22:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 17:23:22 UTC 2016 ssl.sh: #6942: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 6969 at Mon Apr 25 17:23:22 UTC 2016 kill -USR1 6969 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 6969 killed at Mon Apr 25 17:23:22 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 17:23:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:23:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7073 >/dev/null 2>/dev/null selfserv_9709 with PID 7073 found at Mon Apr 25 17:23:23 UTC 2016 selfserv_9709 with PID 7073 started at Mon Apr 25 17:23:23 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:23:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 17:24:15 UTC 2016 ssl.sh: #6943: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7073 at Mon Apr 25 17:24:15 UTC 2016 kill -USR1 7073 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7073 killed at Mon Apr 25 17:24:16 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:24:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:24:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7169 >/dev/null 2>/dev/null selfserv_9709 with PID 7169 found at Mon Apr 25 17:24:16 UTC 2016 selfserv_9709 with PID 7169 started at Mon Apr 25 17:24:16 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:24:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:24:22 UTC 2016 ssl.sh: #6944: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7169 at Mon Apr 25 17:24:22 UTC 2016 kill -USR1 7169 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7169 killed at Mon Apr 25 17:24:22 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:24:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:24:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7244 >/dev/null 2>/dev/null selfserv_9709 with PID 7244 found at Mon Apr 25 17:24:23 UTC 2016 selfserv_9709 with PID 7244 started at Mon Apr 25 17:24:23 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:24:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:24:28 UTC 2016 ssl.sh: #6945: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7244 at Mon Apr 25 17:24:28 UTC 2016 kill -USR1 7244 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7244 killed at Mon Apr 25 17:24:29 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:24:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:24:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7344 >/dev/null 2>/dev/null selfserv_9709 with PID 7344 found at Mon Apr 25 17:24:29 UTC 2016 selfserv_9709 with PID 7344 started at Mon Apr 25 17:24:30 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 17:24:30 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:24:37 UTC 2016 ssl.sh: #6946: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7344 at Mon Apr 25 17:24:37 UTC 2016 kill -USR1 7344 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7344 killed at Mon Apr 25 17:24:38 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:24:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:24:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7419 >/dev/null 2>/dev/null selfserv_9709 with PID 7419 found at Mon Apr 25 17:24:38 UTC 2016 selfserv_9709 with PID 7419 started at Mon Apr 25 17:24:38 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 17:24:38 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:24:40 UTC 2016 ssl.sh: #6947: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7419 at Mon Apr 25 17:24:40 UTC 2016 kill -USR1 7419 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7419 killed at Mon Apr 25 17:24:41 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:24:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:24:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7509 >/dev/null 2>/dev/null selfserv_9709 with PID 7509 found at Mon Apr 25 17:24:41 UTC 2016 selfserv_9709 with PID 7509 started at Mon Apr 25 17:24:41 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 17:24:41 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 17:25:51 UTC 2016 ssl.sh: #6948: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7509 at Mon Apr 25 17:25:51 UTC 2016 kill -USR1 7509 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7509 killed at Mon Apr 25 17:25:52 UTC 2016 ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass - with ECC =============================== selfserv_9709 starting at Mon Apr 25 17:25:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:25:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:52 UTC 2016 selfserv_9709 with PID 7591 started at Mon Apr 25 17:25:52 UTC 2016 exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,1,0) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6949: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6950: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6951: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6952: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6953: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6954: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6955: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6956: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6957: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:ssl3 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6958: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:25:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6959: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6960: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6961: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6962: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6963: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6964: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6965: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6966: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6967: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6968: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6969: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6970: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6971: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6972: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6973: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6974: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6975: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6976: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6977: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6978: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6979: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6980: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6981: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c c -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6982: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c d -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6983: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c e -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6984: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c i -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6985: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c j -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6986: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c k -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6987: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) exp/ssl2 test skipped: (NSS_NO_SSL2,EXP,SSL2)=(1,0,1) ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c n -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6988: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c v -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6989: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c y -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6990: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c z -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6991: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6992: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6993: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6994: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6995: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6996: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6997: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6998: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #6999: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7000: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7001: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7002: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7003: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7004: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7005: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7006: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7007: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7008: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7009: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7010: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7011: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7012: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7013: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7014: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7015: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 7591 >/dev/null 2>/dev/null selfserv_9709 with PID 7591 found at Mon Apr 25 17:26:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7016: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 7591 at Mon Apr 25 17:26:40 UTC 2016 kill -USR1 7591 selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7591 killed at Mon Apr 25 17:26:40 UTC 2016 ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:26:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:26:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9505 >/dev/null 2>/dev/null selfserv_9709 with PID 9505 found at Mon Apr 25 17:26:41 UTC 2016 selfserv_9709 with PID 9505 started at Mon Apr 25 17:26:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7017: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9505 >/dev/null 2>/dev/null selfserv_9709 with PID 9505 found at Mon Apr 25 17:26:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7018: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9505 >/dev/null 2>/dev/null selfserv_9709 with PID 9505 found at Mon Apr 25 17:26:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7019: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9505 >/dev/null 2>/dev/null selfserv_9709 with PID 9505 found at Mon Apr 25 17:26:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7020: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9505 >/dev/null 2>/dev/null selfserv_9709 with PID 9505 found at Mon Apr 25 17:26:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7021: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 9505 at Mon Apr 25 17:26:44 UTC 2016 kill -USR1 9505 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9505 killed at Mon Apr 25 17:26:44 UTC 2016 ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:26:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:26:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:45 UTC 2016 selfserv_9709 with PID 9653 started at Mon Apr 25 17:26:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7022: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7023: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7024: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7025: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.0 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7026: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7027: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7028: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7029: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7030: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7031: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7032: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7033: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7034: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7035: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 9653 >/dev/null 2>/dev/null selfserv_9709 with PID 9653 found at Mon Apr 25 17:26:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7036: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 9653 at Mon Apr 25 17:26:56 UTC 2016 kill -USR1 9653 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9653 killed at Mon Apr 25 17:26:57 UTC 2016 ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:26:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:26:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10039 >/dev/null 2>/dev/null selfserv_9709 with PID 10039 found at Mon Apr 25 17:26:57 UTC 2016 selfserv_9709 with PID 10039 started at Mon Apr 25 17:26:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7037: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10039 >/dev/null 2>/dev/null selfserv_9709 with PID 10039 found at Mon Apr 25 17:26:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7038: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10039 >/dev/null 2>/dev/null selfserv_9709 with PID 10039 found at Mon Apr 25 17:26:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7039: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10039 >/dev/null 2>/dev/null selfserv_9709 with PID 10039 found at Mon Apr 25 17:26:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7040: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10039 >/dev/null 2>/dev/null selfserv_9709 with PID 10039 found at Mon Apr 25 17:27:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7041: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 10039 at Mon Apr 25 17:27:00 UTC 2016 kill -USR1 10039 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10039 killed at Mon Apr 25 17:27:01 UTC 2016 ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:27:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:01 UTC 2016 selfserv_9709 with PID 10188 started at Mon Apr 25 17:27:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7042: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7043: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7044: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7045: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.1 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7046: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C001 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7047: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C002 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7048: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C003 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7049: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C004 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7050: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C005 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7051: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C006 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7052: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C007 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7053: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C008 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7054: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C009 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7055: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10188 >/dev/null 2>/dev/null selfserv_9709 with PID 10188 found at Mon Apr 25 17:27:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00A -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7056: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 10188 at Mon Apr 25 17:27:12 UTC 2016 kill -USR1 10188 selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10188 killed at Mon Apr 25 17:27:13 UTC 2016 ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:27:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10588 >/dev/null 2>/dev/null selfserv_9709 with PID 10588 found at Mon Apr 25 17:27:13 UTC 2016 selfserv_9709 with PID 10588 started at Mon Apr 25 17:27:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7057: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10588 >/dev/null 2>/dev/null selfserv_9709 with PID 10588 found at Mon Apr 25 17:27:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7058: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10588 >/dev/null 2>/dev/null selfserv_9709 with PID 10588 found at Mon Apr 25 17:27:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00D -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7059: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10588 >/dev/null 2>/dev/null selfserv_9709 with PID 10588 found at Mon Apr 25 17:27:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00E -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7060: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10588 >/dev/null 2>/dev/null selfserv_9709 with PID 10588 found at Mon Apr 25 17:27:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C00F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7061: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- trying to kill selfserv_9709 with PID 10588 at Mon Apr 25 17:27:16 UTC 2016 kill -USR1 10588 selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10588 killed at Mon Apr 25 17:27:17 UTC 2016 ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ---- selfserv_9709 starting at Mon Apr 25 17:27:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3cdefgijklmnvyz -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:17 UTC 2016 selfserv_9709 with PID 10736 started at Mon Apr 25 17:27:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C010 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7062: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C011 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7063: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C012 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7064: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C013 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7065: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C014 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7066: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C023 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7067: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C024 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7068: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C027 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7069: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C028 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7070: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02B -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7071: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02C -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7072: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C02F -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7073: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 ---------------------------- kill -0 10736 >/dev/null 2>/dev/null selfserv_9709 with PID 10736 found at Mon Apr 25 17:27:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -c :C030 -V ssl3:tls1.2 -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7074: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10736 at Mon Apr 25 17:27:26 UTC 2016 kill -USR1 10736 selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10736 killed at Mon Apr 25 17:27:27 UTC 2016 ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11119 >/dev/null 2>/dev/null selfserv_9709 with PID 11119 found at Mon Apr 25 17:27:27 UTC 2016 selfserv_9709 with PID 11119 started at Mon Apr 25 17:27:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7075: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11119 at Mon Apr 25 17:27:28 UTC 2016 kill -USR1 11119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11119 killed at Mon Apr 25 17:27:29 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:27:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11179 >/dev/null 2>/dev/null selfserv_9709 with PID 11179 found at Mon Apr 25 17:27:29 UTC 2016 selfserv_9709 with PID 11179 started at Mon Apr 25 17:27:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7076: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11179 at Mon Apr 25 17:27:30 UTC 2016 kill -USR1 11179 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11179 killed at Mon Apr 25 17:27:31 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11236 >/dev/null 2>/dev/null selfserv_9709 with PID 11236 found at Mon Apr 25 17:27:31 UTC 2016 selfserv_9709 with PID 11236 started at Mon Apr 25 17:27:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7077: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11236 at Mon Apr 25 17:27:32 UTC 2016 kill -USR1 11236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11236 killed at Mon Apr 25 17:27:32 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11294 >/dev/null 2>/dev/null selfserv_9709 with PID 11294 found at Mon Apr 25 17:27:33 UTC 2016 selfserv_9709 with PID 11294 started at Mon Apr 25 17:27:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #7078: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11294 at Mon Apr 25 17:27:34 UTC 2016 kill -USR1 11294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11294 killed at Mon Apr 25 17:27:34 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:27:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11351 >/dev/null 2>/dev/null selfserv_9709 with PID 11351 found at Mon Apr 25 17:27:35 UTC 2016 selfserv_9709 with PID 11351 started at Mon Apr 25 17:27:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #7079: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11351 at Mon Apr 25 17:27:36 UTC 2016 kill -USR1 11351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11351 killed at Mon Apr 25 17:27:36 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11408 >/dev/null 2>/dev/null selfserv_9709 with PID 11408 found at Mon Apr 25 17:27:37 UTC 2016 selfserv_9709 with PID 11408 started at Mon Apr 25 17:27:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7080: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11408 at Mon Apr 25 17:27:38 UTC 2016 kill -USR1 11408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11408 killed at Mon Apr 25 17:27:38 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11465 >/dev/null 2>/dev/null selfserv_9709 with PID 11465 found at Mon Apr 25 17:27:38 UTC 2016 selfserv_9709 with PID 11465 started at Mon Apr 25 17:27:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7081: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11465 at Mon Apr 25 17:27:39 UTC 2016 kill -USR1 11465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11465 killed at Mon Apr 25 17:27:40 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:27:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11522 >/dev/null 2>/dev/null selfserv_9709 with PID 11522 found at Mon Apr 25 17:27:40 UTC 2016 selfserv_9709 with PID 11522 started at Mon Apr 25 17:27:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7082: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11522 at Mon Apr 25 17:27:41 UTC 2016 kill -USR1 11522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11522 killed at Mon Apr 25 17:27:41 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11579 >/dev/null 2>/dev/null selfserv_9709 with PID 11579 found at Mon Apr 25 17:27:42 UTC 2016 selfserv_9709 with PID 11579 started at Mon Apr 25 17:27:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7083: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11579 at Mon Apr 25 17:27:43 UTC 2016 kill -USR1 11579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11579 killed at Mon Apr 25 17:27:43 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11636 >/dev/null 2>/dev/null selfserv_9709 with PID 11636 found at Mon Apr 25 17:27:44 UTC 2016 selfserv_9709 with PID 11636 started at Mon Apr 25 17:27:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #7084: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11636 at Mon Apr 25 17:27:45 UTC 2016 kill -USR1 11636 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11636 killed at Mon Apr 25 17:27:45 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:27:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11693 >/dev/null 2>/dev/null selfserv_9709 with PID 11693 found at Mon Apr 25 17:27:46 UTC 2016 selfserv_9709 with PID 11693 started at Mon Apr 25 17:27:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #7085: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11693 at Mon Apr 25 17:27:46 UTC 2016 kill -USR1 11693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11693 killed at Mon Apr 25 17:27:47 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11751 >/dev/null 2>/dev/null selfserv_9709 with PID 11751 found at Mon Apr 25 17:27:47 UTC 2016 selfserv_9709 with PID 11751 started at Mon Apr 25 17:27:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7086: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11751 at Mon Apr 25 17:27:48 UTC 2016 kill -USR1 11751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11751 killed at Mon Apr 25 17:27:49 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11808 >/dev/null 2>/dev/null selfserv_9709 with PID 11808 found at Mon Apr 25 17:27:49 UTC 2016 selfserv_9709 with PID 11808 started at Mon Apr 25 17:27:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7087: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11808 at Mon Apr 25 17:27:50 UTC 2016 kill -USR1 11808 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11808 killed at Mon Apr 25 17:27:50 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:27:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11865 >/dev/null 2>/dev/null selfserv_9709 with PID 11865 found at Mon Apr 25 17:27:51 UTC 2016 selfserv_9709 with PID 11865 started at Mon Apr 25 17:27:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7088: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11865 at Mon Apr 25 17:27:52 UTC 2016 kill -USR1 11865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11865 killed at Mon Apr 25 17:27:52 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11922 >/dev/null 2>/dev/null selfserv_9709 with PID 11922 found at Mon Apr 25 17:27:53 UTC 2016 selfserv_9709 with PID 11922 started at Mon Apr 25 17:27:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7089: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11922 at Mon Apr 25 17:27:54 UTC 2016 kill -USR1 11922 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11922 killed at Mon Apr 25 17:27:54 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11980 >/dev/null 2>/dev/null selfserv_9709 with PID 11980 found at Mon Apr 25 17:27:55 UTC 2016 selfserv_9709 with PID 11980 started at Mon Apr 25 17:27:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #7090: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11980 at Mon Apr 25 17:27:56 UTC 2016 kill -USR1 11980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11980 killed at Mon Apr 25 17:27:56 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:27:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12037 >/dev/null 2>/dev/null selfserv_9709 with PID 12037 found at Mon Apr 25 17:27:56 UTC 2016 selfserv_9709 with PID 12037 started at Mon Apr 25 17:27:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #7091: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12037 at Mon Apr 25 17:27:58 UTC 2016 kill -USR1 12037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12037 killed at Mon Apr 25 17:27:58 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:27:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:27:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12095 >/dev/null 2>/dev/null selfserv_9709 with PID 12095 found at Mon Apr 25 17:27:58 UTC 2016 selfserv_9709 with PID 12095 started at Mon Apr 25 17:27:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7092: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12095 at Mon Apr 25 17:28:00 UTC 2016 kill -USR1 12095 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12095 killed at Mon Apr 25 17:28:00 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12152 >/dev/null 2>/dev/null selfserv_9709 with PID 12152 found at Mon Apr 25 17:28:01 UTC 2016 selfserv_9709 with PID 12152 started at Mon Apr 25 17:28:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7093: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12152 at Mon Apr 25 17:28:02 UTC 2016 kill -USR1 12152 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12152 killed at Mon Apr 25 17:28:02 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12222 >/dev/null 2>/dev/null selfserv_9709 with PID 12222 found at Mon Apr 25 17:28:03 UTC 2016 selfserv_9709 with PID 12222 started at Mon Apr 25 17:28:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7094: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12222 at Mon Apr 25 17:28:03 UTC 2016 kill -USR1 12222 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12222 killed at Mon Apr 25 17:28:04 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12279 >/dev/null 2>/dev/null selfserv_9709 with PID 12279 found at Mon Apr 25 17:28:04 UTC 2016 selfserv_9709 with PID 12279 started at Mon Apr 25 17:28:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7095: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12279 at Mon Apr 25 17:28:05 UTC 2016 kill -USR1 12279 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12279 killed at Mon Apr 25 17:28:06 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12336 >/dev/null 2>/dev/null selfserv_9709 with PID 12336 found at Mon Apr 25 17:28:06 UTC 2016 selfserv_9709 with PID 12336 started at Mon Apr 25 17:28:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #7096: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12336 at Mon Apr 25 17:28:07 UTC 2016 kill -USR1 12336 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12336 killed at Mon Apr 25 17:28:08 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12393 >/dev/null 2>/dev/null selfserv_9709 with PID 12393 found at Mon Apr 25 17:28:08 UTC 2016 selfserv_9709 with PID 12393 started at Mon Apr 25 17:28:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #7097: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12393 at Mon Apr 25 17:28:09 UTC 2016 kill -USR1 12393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12393 killed at Mon Apr 25 17:28:10 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12450 >/dev/null 2>/dev/null selfserv_9709 with PID 12450 found at Mon Apr 25 17:28:10 UTC 2016 selfserv_9709 with PID 12450 started at Mon Apr 25 17:28:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7098: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12450 at Mon Apr 25 17:28:11 UTC 2016 kill -USR1 12450 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12450 killed at Mon Apr 25 17:28:11 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12507 >/dev/null 2>/dev/null selfserv_9709 with PID 12507 found at Mon Apr 25 17:28:12 UTC 2016 selfserv_9709 with PID 12507 started at Mon Apr 25 17:28:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7099: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12507 at Mon Apr 25 17:28:13 UTC 2016 kill -USR1 12507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12507 killed at Mon Apr 25 17:28:13 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12565 >/dev/null 2>/dev/null selfserv_9709 with PID 12565 found at Mon Apr 25 17:28:14 UTC 2016 selfserv_9709 with PID 12565 started at Mon Apr 25 17:28:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7100: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12565 at Mon Apr 25 17:28:15 UTC 2016 kill -USR1 12565 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12565 killed at Mon Apr 25 17:28:15 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12622 >/dev/null 2>/dev/null selfserv_9709 with PID 12622 found at Mon Apr 25 17:28:16 UTC 2016 selfserv_9709 with PID 12622 started at Mon Apr 25 17:28:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7101: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12622 at Mon Apr 25 17:28:17 UTC 2016 kill -USR1 12622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12622 killed at Mon Apr 25 17:28:17 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12679 >/dev/null 2>/dev/null selfserv_9709 with PID 12679 found at Mon Apr 25 17:28:18 UTC 2016 selfserv_9709 with PID 12679 started at Mon Apr 25 17:28:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #7102: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12679 at Mon Apr 25 17:28:19 UTC 2016 kill -USR1 12679 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12679 killed at Mon Apr 25 17:28:19 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12736 >/dev/null 2>/dev/null selfserv_9709 with PID 12736 found at Mon Apr 25 17:28:20 UTC 2016 selfserv_9709 with PID 12736 started at Mon Apr 25 17:28:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #7103: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12736 at Mon Apr 25 17:28:20 UTC 2016 kill -USR1 12736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12736 killed at Mon Apr 25 17:28:21 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12793 >/dev/null 2>/dev/null selfserv_9709 with PID 12793 found at Mon Apr 25 17:28:21 UTC 2016 selfserv_9709 with PID 12793 started at Mon Apr 25 17:28:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7104: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12793 at Mon Apr 25 17:28:22 UTC 2016 kill -USR1 12793 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12793 killed at Mon Apr 25 17:28:23 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12865 >/dev/null 2>/dev/null selfserv_9709 with PID 12865 found at Mon Apr 25 17:28:23 UTC 2016 selfserv_9709 with PID 12865 started at Mon Apr 25 17:28:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7105: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12865 at Mon Apr 25 17:28:24 UTC 2016 kill -USR1 12865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12865 killed at Mon Apr 25 17:28:25 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12922 >/dev/null 2>/dev/null selfserv_9709 with PID 12922 found at Mon Apr 25 17:28:25 UTC 2016 selfserv_9709 with PID 12922 started at Mon Apr 25 17:28:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7106: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12922 at Mon Apr 25 17:28:26 UTC 2016 kill -USR1 12922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12922 killed at Mon Apr 25 17:28:27 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12979 >/dev/null 2>/dev/null selfserv_9709 with PID 12979 found at Mon Apr 25 17:28:27 UTC 2016 selfserv_9709 with PID 12979 started at Mon Apr 25 17:28:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #7107: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12979 at Mon Apr 25 17:28:28 UTC 2016 kill -USR1 12979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12979 killed at Mon Apr 25 17:28:29 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13039 >/dev/null 2>/dev/null selfserv_9709 with PID 13039 found at Mon Apr 25 17:28:29 UTC 2016 selfserv_9709 with PID 13039 started at Mon Apr 25 17:28:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7108: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13039 at Mon Apr 25 17:28:30 UTC 2016 kill -USR1 13039 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13039 killed at Mon Apr 25 17:28:31 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13096 >/dev/null 2>/dev/null selfserv_9709 with PID 13096 found at Mon Apr 25 17:28:31 UTC 2016 selfserv_9709 with PID 13096 started at Mon Apr 25 17:28:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7109: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13096 at Mon Apr 25 17:28:32 UTC 2016 kill -USR1 13096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13096 killed at Mon Apr 25 17:28:32 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13153 >/dev/null 2>/dev/null selfserv_9709 with PID 13153 found at Mon Apr 25 17:28:33 UTC 2016 selfserv_9709 with PID 13153 started at Mon Apr 25 17:28:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7110: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13153 at Mon Apr 25 17:28:34 UTC 2016 kill -USR1 13153 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13153 killed at Mon Apr 25 17:28:34 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13211 >/dev/null 2>/dev/null selfserv_9709 with PID 13211 found at Mon Apr 25 17:28:35 UTC 2016 selfserv_9709 with PID 13211 started at Mon Apr 25 17:28:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #7111: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13211 at Mon Apr 25 17:28:36 UTC 2016 kill -USR1 13211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13211 killed at Mon Apr 25 17:28:36 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13268 >/dev/null 2>/dev/null selfserv_9709 with PID 13268 found at Mon Apr 25 17:28:37 UTC 2016 selfserv_9709 with PID 13268 started at Mon Apr 25 17:28:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7112: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13268 at Mon Apr 25 17:28:38 UTC 2016 kill -USR1 13268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13268 killed at Mon Apr 25 17:28:38 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13325 >/dev/null 2>/dev/null selfserv_9709 with PID 13325 found at Mon Apr 25 17:28:39 UTC 2016 selfserv_9709 with PID 13325 started at Mon Apr 25 17:28:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7113: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13325 at Mon Apr 25 17:28:40 UTC 2016 kill -USR1 13325 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13325 killed at Mon Apr 25 17:28:40 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13382 >/dev/null 2>/dev/null selfserv_9709 with PID 13382 found at Mon Apr 25 17:28:41 UTC 2016 selfserv_9709 with PID 13382 started at Mon Apr 25 17:28:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7114: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13382 at Mon Apr 25 17:28:42 UTC 2016 kill -USR1 13382 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13382 killed at Mon Apr 25 17:28:42 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13439 >/dev/null 2>/dev/null selfserv_9709 with PID 13439 found at Mon Apr 25 17:28:43 UTC 2016 selfserv_9709 with PID 13439 started at Mon Apr 25 17:28:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #7115: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13439 at Mon Apr 25 17:28:44 UTC 2016 kill -USR1 13439 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13439 killed at Mon Apr 25 17:28:44 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13496 >/dev/null 2>/dev/null selfserv_9709 with PID 13496 found at Mon Apr 25 17:28:45 UTC 2016 selfserv_9709 with PID 13496 started at Mon Apr 25 17:28:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3: -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7116: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13496 at Mon Apr 25 17:28:46 UTC 2016 kill -USR1 13496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13496 killed at Mon Apr 25 17:28:46 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13553 >/dev/null 2>/dev/null selfserv_9709 with PID 13553 found at Mon Apr 25 17:28:47 UTC 2016 selfserv_9709 with PID 13553 started at Mon Apr 25 17:28:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7117: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13553 at Mon Apr 25 17:28:48 UTC 2016 kill -USR1 13553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13553 killed at Mon Apr 25 17:28:48 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13610 >/dev/null 2>/dev/null selfserv_9709 with PID 13610 found at Mon Apr 25 17:28:48 UTC 2016 selfserv_9709 with PID 13610 started at Mon Apr 25 17:28:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7118: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13610 at Mon Apr 25 17:28:50 UTC 2016 kill -USR1 13610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13610 killed at Mon Apr 25 17:28:50 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13667 >/dev/null 2>/dev/null selfserv_9709 with PID 13667 found at Mon Apr 25 17:28:51 UTC 2016 selfserv_9709 with PID 13667 started at Mon Apr 25 17:28:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #7119: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13667 at Mon Apr 25 17:28:52 UTC 2016 kill -USR1 13667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13667 killed at Mon Apr 25 17:28:52 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13724 >/dev/null 2>/dev/null selfserv_9709 with PID 13724 found at Mon Apr 25 17:28:52 UTC 2016 selfserv_9709 with PID 13724 started at Mon Apr 25 17:28:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7120: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13724 at Mon Apr 25 17:28:54 UTC 2016 kill -USR1 13724 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13724 killed at Mon Apr 25 17:28:54 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13781 >/dev/null 2>/dev/null selfserv_9709 with PID 13781 found at Mon Apr 25 17:28:55 UTC 2016 selfserv_9709 with PID 13781 started at Mon Apr 25 17:28:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7121: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13781 at Mon Apr 25 17:28:56 UTC 2016 kill -USR1 13781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13781 killed at Mon Apr 25 17:28:56 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:28:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13839 >/dev/null 2>/dev/null selfserv_9709 with PID 13839 found at Mon Apr 25 17:28:56 UTC 2016 selfserv_9709 with PID 13839 started at Mon Apr 25 17:28:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7122: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13839 at Mon Apr 25 17:28:58 UTC 2016 kill -USR1 13839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13839 killed at Mon Apr 25 17:28:58 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 17:28:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:28:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13896 >/dev/null 2>/dev/null selfserv_9709 with PID 13896 found at Mon Apr 25 17:28:59 UTC 2016 selfserv_9709 with PID 13896 started at Mon Apr 25 17:28:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #7123: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13896 at Mon Apr 25 17:29:00 UTC 2016 kill -USR1 13896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13896 killed at Mon Apr 25 17:29:00 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:29:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13953 >/dev/null 2>/dev/null selfserv_9709 with PID 13953 found at Mon Apr 25 17:29:00 UTC 2016 selfserv_9709 with PID 13953 started at Mon Apr 25 17:29:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #7124: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13953 at Mon Apr 25 17:29:02 UTC 2016 kill -USR1 13953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13953 killed at Mon Apr 25 17:29:02 UTC 2016 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 17:29:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14137 >/dev/null 2>/dev/null selfserv_9709 with PID 14137 found at Mon Apr 25 17:29:03 UTC 2016 selfserv_9709 with PID 14137 started at Mon Apr 25 17:29:03 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:29:04 UTC 2016 ssl.sh: #7125: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14137 at Mon Apr 25 17:29:05 UTC 2016 kill -USR1 14137 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14137 killed at Mon Apr 25 17:29:05 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 17:29:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14213 >/dev/null 2>/dev/null selfserv_9709 with PID 14213 found at Mon Apr 25 17:29:05 UTC 2016 selfserv_9709 with PID 14213 started at Mon Apr 25 17:29:05 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:29:07 UTC 2016 ssl.sh: #7126: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14213 at Mon Apr 25 17:29:07 UTC 2016 kill -USR1 14213 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14213 killed at Mon Apr 25 17:29:07 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 17:29:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14289 >/dev/null 2>/dev/null selfserv_9709 with PID 14289 found at Mon Apr 25 17:29:08 UTC 2016 selfserv_9709 with PID 14289 started at Mon Apr 25 17:29:08 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:29:09 UTC 2016 ssl.sh: #7127: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14289 at Mon Apr 25 17:29:09 UTC 2016 kill -USR1 14289 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14289 killed at Mon Apr 25 17:29:10 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 17:29:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14365 >/dev/null 2>/dev/null selfserv_9709 with PID 14365 found at Mon Apr 25 17:29:10 UTC 2016 selfserv_9709 with PID 14365 started at Mon Apr 25 17:29:10 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:29:12 UTC 2016 ssl.sh: #7128: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14365 at Mon Apr 25 17:29:12 UTC 2016 kill -USR1 14365 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14365 killed at Mon Apr 25 17:29:12 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 17:29:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14441 >/dev/null 2>/dev/null selfserv_9709 with PID 14441 found at Mon Apr 25 17:29:13 UTC 2016 selfserv_9709 with PID 14441 started at Mon Apr 25 17:29:13 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:13 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:29:15 UTC 2016 ssl.sh: #7129: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14441 at Mon Apr 25 17:29:15 UTC 2016 kill -USR1 14441 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14441 killed at Mon Apr 25 17:29:15 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 17:29:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14518 >/dev/null 2>/dev/null selfserv_9709 with PID 14518 found at Mon Apr 25 17:29:16 UTC 2016 selfserv_9709 with PID 14518 started at Mon Apr 25 17:29:16 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:29:18 UTC 2016 ssl.sh: #7130: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14518 at Mon Apr 25 17:29:18 UTC 2016 kill -USR1 14518 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14518 killed at Mon Apr 25 17:29:18 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 17:29:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14594 >/dev/null 2>/dev/null selfserv_9709 with PID 14594 found at Mon Apr 25 17:29:19 UTC 2016 selfserv_9709 with PID 14594 started at Mon Apr 25 17:29:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:29:21 UTC 2016 ssl.sh: #7131: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14594 at Mon Apr 25 17:29:21 UTC 2016 kill -USR1 14594 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14594 killed at Mon Apr 25 17:29:21 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:29:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14699 >/dev/null 2>/dev/null selfserv_9709 with PID 14699 found at Mon Apr 25 17:29:22 UTC 2016 selfserv_9709 with PID 14699 started at Mon Apr 25 17:29:22 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:29:26 UTC 2016 ssl.sh: #7132: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14699 at Mon Apr 25 17:29:26 UTC 2016 kill -USR1 14699 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14699 killed at Mon Apr 25 17:29:26 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:29:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14774 >/dev/null 2>/dev/null selfserv_9709 with PID 14774 found at Mon Apr 25 17:29:27 UTC 2016 selfserv_9709 with PID 14774 started at Mon Apr 25 17:29:27 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3: -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:29:31 UTC 2016 ssl.sh: #7133: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14774 at Mon Apr 25 17:29:31 UTC 2016 kill -USR1 14774 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14774 killed at Mon Apr 25 17:29:31 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:29:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14852 >/dev/null 2>/dev/null selfserv_9709 with PID 14852 found at Mon Apr 25 17:29:32 UTC 2016 selfserv_9709 with PID 14852 started at Mon Apr 25 17:29:32 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:29:33 UTC 2016 ssl.sh: #7134: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14852 at Mon Apr 25 17:29:33 UTC 2016 kill -USR1 14852 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14852 killed at Mon Apr 25 17:29:33 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:29:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14928 >/dev/null 2>/dev/null selfserv_9709 with PID 14928 found at Mon Apr 25 17:29:34 UTC 2016 selfserv_9709 with PID 14928 started at Mon Apr 25 17:29:34 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:34 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:29:35 UTC 2016 ssl.sh: #7135: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14928 at Mon Apr 25 17:29:35 UTC 2016 kill -USR1 14928 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14928 killed at Mon Apr 25 17:29:35 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 17:29:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15004 >/dev/null 2>/dev/null selfserv_9709 with PID 15004 found at Mon Apr 25 17:29:36 UTC 2016 selfserv_9709 with PID 15004 started at Mon Apr 25 17:29:36 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:29:37 UTC 2016 ssl.sh: #7136: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15004 at Mon Apr 25 17:29:37 UTC 2016 kill -USR1 15004 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15004 killed at Mon Apr 25 17:29:37 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:29:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15081 >/dev/null 2>/dev/null selfserv_9709 with PID 15081 found at Mon Apr 25 17:29:38 UTC 2016 selfserv_9709 with PID 15081 started at Mon Apr 25 17:29:38 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:38 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:29:38 UTC 2016 ssl.sh: #7137: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15081 at Mon Apr 25 17:29:39 UTC 2016 kill -USR1 15081 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15081 killed at Mon Apr 25 17:29:39 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 17:29:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15157 >/dev/null 2>/dev/null selfserv_9709 with PID 15157 found at Mon Apr 25 17:29:39 UTC 2016 selfserv_9709 with PID 15157 started at Mon Apr 25 17:29:39 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:29:40 UTC 2016 ssl.sh: #7138: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15157 at Mon Apr 25 17:29:40 UTC 2016 kill -USR1 15157 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15157 killed at Mon Apr 25 17:29:41 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:29:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15262 >/dev/null 2>/dev/null selfserv_9709 with PID 15262 found at Mon Apr 25 17:29:41 UTC 2016 selfserv_9709 with PID 15262 started at Mon Apr 25 17:29:41 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:41 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:29:44 UTC 2016 ssl.sh: #7139: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15262 at Mon Apr 25 17:29:44 UTC 2016 kill -USR1 15262 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15262 killed at Mon Apr 25 17:29:44 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:29:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15337 >/dev/null 2>/dev/null selfserv_9709 with PID 15337 found at Mon Apr 25 17:29:45 UTC 2016 selfserv_9709 with PID 15337 started at Mon Apr 25 17:29:45 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:45 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:29:47 UTC 2016 ssl.sh: #7140: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15337 at Mon Apr 25 17:29:48 UTC 2016 kill -USR1 15337 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15337 killed at Mon Apr 25 17:29:48 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:29:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15412 >/dev/null 2>/dev/null selfserv_9709 with PID 15412 found at Mon Apr 25 17:29:48 UTC 2016 selfserv_9709 with PID 15412 started at Mon Apr 25 17:29:48 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:48 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:29:51 UTC 2016 ssl.sh: #7141: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15412 at Mon Apr 25 17:29:51 UTC 2016 kill -USR1 15412 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15412 killed at Mon Apr 25 17:29:52 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:29:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15487 >/dev/null 2>/dev/null selfserv_9709 with PID 15487 found at Mon Apr 25 17:29:52 UTC 2016 selfserv_9709 with PID 15487 started at Mon Apr 25 17:29:52 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:29:54 UTC 2016 ssl.sh: #7142: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15487 at Mon Apr 25 17:29:54 UTC 2016 kill -USR1 15487 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15487 killed at Mon Apr 25 17:29:55 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:29:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15562 >/dev/null 2>/dev/null selfserv_9709 with PID 15562 found at Mon Apr 25 17:29:55 UTC 2016 selfserv_9709 with PID 15562 started at Mon Apr 25 17:29:55 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:29:57 UTC 2016 ssl.sh: #7143: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15562 at Mon Apr 25 17:29:57 UTC 2016 kill -USR1 15562 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15562 killed at Mon Apr 25 17:29:57 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 17:29:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:29:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15638 >/dev/null 2>/dev/null selfserv_9709 with PID 15638 found at Mon Apr 25 17:29:58 UTC 2016 selfserv_9709 with PID 15638 started at Mon Apr 25 17:29:58 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 17:29:58 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:30:00 UTC 2016 ssl.sh: #7144: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15638 at Mon Apr 25 17:30:00 UTC 2016 kill -USR1 15638 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15638 killed at Mon Apr 25 17:30:00 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 17:30:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15714 >/dev/null 2>/dev/null selfserv_9709 with PID 15714 found at Mon Apr 25 17:30:00 UTC 2016 selfserv_9709 with PID 15714 started at Mon Apr 25 17:30:01 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:30:02 UTC 2016 ssl.sh: #7145: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15714 at Mon Apr 25 17:30:02 UTC 2016 kill -USR1 15714 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15714 killed at Mon Apr 25 17:30:03 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 17:30:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15803 >/dev/null 2>/dev/null selfserv_9709 with PID 15803 found at Mon Apr 25 17:30:03 UTC 2016 selfserv_9709 with PID 15803 started at Mon Apr 25 17:30:03 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:30:05 UTC 2016 ssl.sh: #7146: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15803 at Mon Apr 25 17:30:05 UTC 2016 kill -USR1 15803 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15803 killed at Mon Apr 25 17:30:05 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 17:30:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15879 >/dev/null 2>/dev/null selfserv_9709 with PID 15879 found at Mon Apr 25 17:30:06 UTC 2016 selfserv_9709 with PID 15879 started at Mon Apr 25 17:30:06 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 17:30:08 UTC 2016 ssl.sh: #7147: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15879 at Mon Apr 25 17:30:08 UTC 2016 kill -USR1 15879 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15879 killed at Mon Apr 25 17:30:08 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 17:30:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15955 >/dev/null 2>/dev/null selfserv_9709 with PID 15955 found at Mon Apr 25 17:30:09 UTC 2016 selfserv_9709 with PID 15955 started at Mon Apr 25 17:30:09 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:30:10 UTC 2016 ssl.sh: #7148: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 15955 at Mon Apr 25 17:30:10 UTC 2016 kill -USR1 15955 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15955 killed at Mon Apr 25 17:30:10 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:30:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16052 >/dev/null 2>/dev/null selfserv_9709 with PID 16052 found at Mon Apr 25 17:30:11 UTC 2016 selfserv_9709 with PID 16052 started at Mon Apr 25 17:30:11 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:11 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 17:30:13 UTC 2016 ssl.sh: #7149: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16052 at Mon Apr 25 17:30:13 UTC 2016 kill -USR1 16052 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16052 killed at Mon Apr 25 17:30:13 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:30:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16127 >/dev/null 2>/dev/null selfserv_9709 with PID 16127 found at Mon Apr 25 17:30:14 UTC 2016 selfserv_9709 with PID 16127 started at Mon Apr 25 17:30:14 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:30:15 UTC 2016 ssl.sh: #7150: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16127 at Mon Apr 25 17:30:15 UTC 2016 kill -USR1 16127 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16127 killed at Mon Apr 25 17:30:15 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:30:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16203 >/dev/null 2>/dev/null selfserv_9709 with PID 16203 found at Mon Apr 25 17:30:16 UTC 2016 selfserv_9709 with PID 16203 started at Mon Apr 25 17:30:16 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 17:30:18 UTC 2016 ssl.sh: #7151: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16203 at Mon Apr 25 17:30:18 UTC 2016 kill -USR1 16203 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16203 killed at Mon Apr 25 17:30:18 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:30:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16279 >/dev/null 2>/dev/null selfserv_9709 with PID 16279 found at Mon Apr 25 17:30:19 UTC 2016 selfserv_9709 with PID 16279 started at Mon Apr 25 17:30:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 17:30:20 UTC 2016 ssl.sh: #7152: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16279 at Mon Apr 25 17:30:20 UTC 2016 kill -USR1 16279 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16279 killed at Mon Apr 25 17:30:20 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 17:30:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16354 >/dev/null 2>/dev/null selfserv_9709 with PID 16354 found at Mon Apr 25 17:30:21 UTC 2016 selfserv_9709 with PID 16354 started at Mon Apr 25 17:30:21 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:21 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:30:22 UTC 2016 ssl.sh: #7153: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16354 at Mon Apr 25 17:30:22 UTC 2016 kill -USR1 16354 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16354 killed at Mon Apr 25 17:30:22 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:30:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16430 >/dev/null 2>/dev/null selfserv_9709 with PID 16430 found at Mon Apr 25 17:30:23 UTC 2016 selfserv_9709 with PID 16430 started at Mon Apr 25 17:30:23 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 17:30:24 UTC 2016 ssl.sh: #7154: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16430 at Mon Apr 25 17:30:24 UTC 2016 kill -USR1 16430 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16430 killed at Mon Apr 25 17:30:24 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:30:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16527 >/dev/null 2>/dev/null selfserv_9709 with PID 16527 found at Mon Apr 25 17:30:25 UTC 2016 selfserv_9709 with PID 16527 started at Mon Apr 25 17:30:25 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:30:30 UTC 2016 ssl.sh: #7155: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16527 at Mon Apr 25 17:30:30 UTC 2016 kill -USR1 16527 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16527 killed at Mon Apr 25 17:30:31 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 17:30:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16605 >/dev/null 2>/dev/null selfserv_9709 with PID 16605 found at Mon Apr 25 17:30:31 UTC 2016 selfserv_9709 with PID 16605 started at Mon Apr 25 17:30:31 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:31 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:30:33 UTC 2016 ssl.sh: #7156: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16605 at Mon Apr 25 17:30:33 UTC 2016 kill -USR1 16605 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16605 killed at Mon Apr 25 17:30:34 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:30:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16681 >/dev/null 2>/dev/null selfserv_9709 with PID 16681 found at Mon Apr 25 17:30:34 UTC 2016 selfserv_9709 with PID 16681 started at Mon Apr 25 17:30:34 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:34 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:30:40 UTC 2016 ssl.sh: #7157: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16681 at Mon Apr 25 17:30:40 UTC 2016 kill -USR1 16681 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16681 killed at Mon Apr 25 17:30:40 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:30:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16757 >/dev/null 2>/dev/null selfserv_9709 with PID 16757 found at Mon Apr 25 17:30:41 UTC 2016 selfserv_9709 with PID 16757 started at Mon Apr 25 17:30:41 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:41 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:30:47 UTC 2016 ssl.sh: #7158: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16757 at Mon Apr 25 17:30:47 UTC 2016 kill -USR1 16757 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16757 killed at Mon Apr 25 17:30:47 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:30:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:30:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16846 >/dev/null 2>/dev/null selfserv_9709 with PID 16846 found at Mon Apr 25 17:30:48 UTC 2016 selfserv_9709 with PID 16846 started at Mon Apr 25 17:30:48 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:30:48 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 17:31:41 UTC 2016 ssl.sh: #7159: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16846 at Mon Apr 25 17:31:41 UTC 2016 kill -USR1 16846 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16846 killed at Mon Apr 25 17:31:41 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 17:31:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:31:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16958 >/dev/null 2>/dev/null selfserv_9709 with PID 16958 found at Mon Apr 25 17:31:42 UTC 2016 selfserv_9709 with PID 16958 started at Mon Apr 25 17:31:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:31:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 17:32:35 UTC 2016 ssl.sh: #7160: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 16958 at Mon Apr 25 17:32:35 UTC 2016 kill -USR1 16958 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16958 killed at Mon Apr 25 17:32:35 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:32:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:32:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17051 >/dev/null 2>/dev/null selfserv_9709 with PID 17051 found at Mon Apr 25 17:32:36 UTC 2016 selfserv_9709 with PID 17051 started at Mon Apr 25 17:32:36 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:32:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:32:41 UTC 2016 ssl.sh: #7161: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17051 at Mon Apr 25 17:32:42 UTC 2016 kill -USR1 17051 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17051 killed at Mon Apr 25 17:32:42 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 17:32:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:32:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17127 >/dev/null 2>/dev/null selfserv_9709 with PID 17127 found at Mon Apr 25 17:32:42 UTC 2016 selfserv_9709 with PID 17127 started at Mon Apr 25 17:32:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 17:32:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:32:48 UTC 2016 ssl.sh: #7162: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17127 at Mon Apr 25 17:32:48 UTC 2016 kill -USR1 17127 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17127 killed at Mon Apr 25 17:32:48 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:32:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:32:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17223 >/dev/null 2>/dev/null selfserv_9709 with PID 17223 found at Mon Apr 25 17:32:49 UTC 2016 selfserv_9709 with PID 17223 started at Mon Apr 25 17:32:49 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 17:32:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 17:32:57 UTC 2016 ssl.sh: #7163: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17223 at Mon Apr 25 17:32:57 UTC 2016 kill -USR1 17223 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17223 killed at Mon Apr 25 17:32:58 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 17:32:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:32:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17298 >/dev/null 2>/dev/null selfserv_9709 with PID 17298 found at Mon Apr 25 17:32:58 UTC 2016 selfserv_9709 with PID 17298 started at Mon Apr 25 17:32:58 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 17:32:58 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 17:33:00 UTC 2016 ssl.sh: #7164: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17298 at Mon Apr 25 17:33:00 UTC 2016 kill -USR1 17298 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17298 killed at Mon Apr 25 17:33:01 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 17:33:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 17:33:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17399 >/dev/null 2>/dev/null selfserv_9709 with PID 17399 found at Mon Apr 25 17:33:01 UTC 2016 selfserv_9709 with PID 17399 started at Mon Apr 25 17:33:01 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 17:33:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 17:34:12 UTC 2016 ssl.sh: #7165: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 17399 at Mon Apr 25 17:34:13 UTC 2016 kill -USR1 17399 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17399 killed at Mon Apr 25 17:34:13 UTC 2016 TIMESTAMP ssl END: Mon Apr 25 17:34:13 UTC 2016 Checking if ocsp should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Running tests for ocsp TIMESTAMP ocsp BEGIN: Mon Apr 25 17:34:13 UTC 2016 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Mon Apr 25 17:34:13 UTC 2016 Checking if merge should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Checking if pkits should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Running tests for pkits TIMESTAMP pkits BEGIN: Mon Apr 25 17:34:13 UTC 2016 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Mon Apr 25 17:34:13 UTC 2016 Checking if chains should be skipped based on skip list [cipher dbtests sdr crmf smime merge multinit] Running tests for chains TIMESTAMP chains BEGIN: Mon Apr 25 17:34:13 UTC 2016 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #7166: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173414 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7167: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #7168: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #7169: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #7170: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7171: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7172: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7173: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #7174: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #7175: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7176: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7177: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7178: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #7179: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #7180: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7181: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7182: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7183: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #7184: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #7185: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7186: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7187: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7188: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #7189: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7190: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7191: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7192: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #7193: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7194: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7195: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7196: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #7197: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7198: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7199: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7200: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #7201: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7202: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7203: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7204: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #7205: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7206: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7207: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7208: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #7209: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7210: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7211: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7212: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #7213: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7214: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7215: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7216: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #7217: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7218: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7219: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7220: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #7221: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7222: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7223: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7224: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #7225: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7226: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7227: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7228: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160425173653Z nextupdate=20170425173653Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Apr 25 17:36:53 2016 Next Update: Tue Apr 25 17:36:53 2017 CRL Extensions: chains.sh: #7229: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160425173654Z addcert 2 20160425173654Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Apr 25 17:36:54 2016 Next Update: Tue Apr 25 17:36:53 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 17:36:54 2016 CRL Extensions: chains.sh: #7230: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160425173655Z nextupdate=20170425173655Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Apr 25 17:36:55 2016 Next Update: Tue Apr 25 17:36:55 2017 CRL Extensions: chains.sh: #7231: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160425173656Z addcert 2 20160425173656Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Apr 25 17:36:56 2016 Next Update: Tue Apr 25 17:36:55 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 17:36:56 2016 CRL Extensions: chains.sh: #7232: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160425173657Z addcert 4 20160425173657Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Apr 25 17:36:57 2016 Next Update: Tue Apr 25 17:36:55 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 17:36:56 2016 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Mon Apr 25 17:36:57 2016 CRL Extensions: chains.sh: #7233: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160425173658Z nextupdate=20170425173658Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Apr 25 17:36:58 2016 Next Update: Tue Apr 25 17:36:58 2017 CRL Extensions: chains.sh: #7234: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160425173659Z addcert 2 20160425173659Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Apr 25 17:36:59 2016 Next Update: Tue Apr 25 17:36:58 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 17:36:59 2016 CRL Extensions: chains.sh: #7235: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160425173700Z addcert 3 20160425173700Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Apr 25 17:37:00 2016 Next Update: Tue Apr 25 17:36:58 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 17:36:59 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Apr 25 17:37:00 2016 CRL Extensions: chains.sh: #7236: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160425173701Z nextupdate=20170425173701Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Apr 25 17:37:01 2016 Next Update: Tue Apr 25 17:37:01 2017 CRL Extensions: chains.sh: #7237: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160425173702Z addcert 2 20160425173702Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Apr 25 17:37:02 2016 Next Update: Tue Apr 25 17:37:01 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 17:37:02 2016 CRL Extensions: chains.sh: #7238: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160425173703Z addcert 3 20160425173703Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Apr 25 17:37:03 2016 Next Update: Tue Apr 25 17:37:01 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 17:37:02 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Apr 25 17:37:03 2016 CRL Extensions: chains.sh: #7239: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #7240: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #7241: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #7242: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #7243: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #7244: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #7245: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #7246: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #7247: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #7248: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #7249: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #7250: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #7251: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #7252: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #7253: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #7254: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #7255: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #7256: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #7257: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #7258: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #7259: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #7260: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #7261: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #7262: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #7263: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Mon Apr 25 17:37:16 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 17:37:16 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 18949 >/dev/null 2>/dev/null httpserv with PID 18949 found at Mon Apr 25 17:37:17 UTC 2016 httpserv with PID 18949 started at Mon Apr 25 17:37:17 UTC 2016 tstclnt -h localhost.localdomain -p 9719 -q -t 20 chains.sh: #7264: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173414 (0x1957a1a6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Apr 25 17:34:26 2016 Not After : Sun Apr 25 17:34:26 2066 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:67:5d:a2:11:0b:b2:13:a1:48:0c:23:16:d5:76:65: 49:41:37:9b:25:24:d4:29:d5:ec:38:e2:17:99:7b:29: 44:53:04:21:42:cb:34:7f:ba:d9:5a:6e:52:56:a7:63: f5:5d:35:8e:0f:f3:49:15:59:8f:5e:f6:6f:2b:28:e4: e4:ff:3f:9a:40:59:12:5c:3a:60:41:fd:0c:05:d3:3e: e9:e9:c8:73:7a:5c:36:56:b5:a2:b3:48:51:aa:86:f1: ed:b3:73:56:57:4e:d9:1f:99:22:81:d9:51:ab:82:e9: 47:5e:43:d8:12:b5:f1:1f:ad:b0:9a:18:59:7e:5c:32: 24:6b:2e:8d:de:62:29:c6:8c:06:af:af:a4:da:d7:2a: ad:c4:cf:48:74:51:ca:63:05:33:d2:e5:2f:1f:90:52: 4c:ac:1e:9b:da:84:7e:c6:8d:57:47:d0:20:f0:89:df: c5:c1:d1:63:cc:7b:48:50:d0:ba:57:9d:87:aa:70:db: 34:d3:51:d7:a0:11:f0:04:2a:e1:5e:69:33:1f:59:fc: 66:d2:f3:1a:8c:56:24:3b:e1:8b:7b:1b:87:7c:26:91: 83:da:25:88:2d:72:a7:4b:79:03:14:8a:6f:d2:4a:55: dc:a8:3d:22:8a:d6:35:c5:ee:1b:69:57:9a:d2:1f:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:c3:49:fb:4f:0b:af:d2:db:9d:66:b6:82:3a:bb:c4: b4:ef:29:53:aa:12:b3:ba:79:d9:bf:0a:c4:3f:61:12: 2a:f0:d0:d9:b2:ac:79:73:6e:13:a2:ba:a9:87:9d:43: 3a:0d:7e:e5:9b:e9:28:53:0d:b4:d2:9e:7e:c3:1f:18: 34:49:ec:0a:06:e3:22:01:b5:e9:bb:e3:74:de:01:56: ca:48:6d:c2:1b:47:d5:29:27:09:81:df:da:62:50:68: 49:59:61:03:3a:89:05:1f:4c:83:ad:4c:97:4b:e1:56: 39:42:d2:6d:e1:ed:ad:0d:68:c5:c4:80:b9:f3:df:09: b5:5f:21:65:6f:a4:5d:ee:0c:43:e5:f1:b2:2f:b5:86: fc:b6:b0:a0:fe:2b:6f:4c:d0:c0:d6:3d:fb:86:fe:58: 8a:f2:f0:52:5b:98:7c:64:0f:b2:18:86:01:95:a9:eb: 3c:86:fe:12:ac:e6:c1:4c:4b:2c:c1:2f:04:c2:e1:51: 71:de:6e:c7:9f:4d:cb:b1:65:2b:42:be:5c:38:67:ef: d8:4c:42:ff:b2:13:3b:51:93:69:c1:45:0a:76:9e:fb: 4a:aa:69:66:28:31:d2:a4:5a:95:41:6c:70:31:c4:4d: 82:61:ad:85:29:7e:eb:8b:c9:1e:cd:ff:3b:cc:80:f9 Fingerprint (SHA-256): 8E:6E:96:09:3C:FA:90:CD:F6:8F:61:59:54:96:B4:16:06:86:9F:C6:C4:F4:B5:04:01:FF:85:F8:22:86:1A:B3 Fingerprint (SHA1): 88:F3:D9:94:99:0A:D4:64:27:FE:39:1D:4A:BD:95:C8:F7:42:D6:60 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #7265: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #7266: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #7267: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 18949 at Mon Apr 25 17:37:20 UTC 2016 kill -USR1 18949 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 18949 killed at Mon Apr 25 17:37:21 UTC 2016 httpserv starting at Mon Apr 25 17:37:21 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 17:37:21 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 19118 >/dev/null 2>/dev/null httpserv with PID 19118 found at Mon Apr 25 17:37:21 UTC 2016 httpserv with PID 19118 started at Mon Apr 25 17:37:21 UTC 2016 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7268: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7269: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7270: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -h localhost.localdomain -p 9719 -q -t 20 chains.sh: #7271: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173414 (0x1957a1a6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Apr 25 17:34:26 2016 Not After : Sun Apr 25 17:34:26 2066 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:67:5d:a2:11:0b:b2:13:a1:48:0c:23:16:d5:76:65: 49:41:37:9b:25:24:d4:29:d5:ec:38:e2:17:99:7b:29: 44:53:04:21:42:cb:34:7f:ba:d9:5a:6e:52:56:a7:63: f5:5d:35:8e:0f:f3:49:15:59:8f:5e:f6:6f:2b:28:e4: e4:ff:3f:9a:40:59:12:5c:3a:60:41:fd:0c:05:d3:3e: e9:e9:c8:73:7a:5c:36:56:b5:a2:b3:48:51:aa:86:f1: ed:b3:73:56:57:4e:d9:1f:99:22:81:d9:51:ab:82:e9: 47:5e:43:d8:12:b5:f1:1f:ad:b0:9a:18:59:7e:5c:32: 24:6b:2e:8d:de:62:29:c6:8c:06:af:af:a4:da:d7:2a: ad:c4:cf:48:74:51:ca:63:05:33:d2:e5:2f:1f:90:52: 4c:ac:1e:9b:da:84:7e:c6:8d:57:47:d0:20:f0:89:df: c5:c1:d1:63:cc:7b:48:50:d0:ba:57:9d:87:aa:70:db: 34:d3:51:d7:a0:11:f0:04:2a:e1:5e:69:33:1f:59:fc: 66:d2:f3:1a:8c:56:24:3b:e1:8b:7b:1b:87:7c:26:91: 83:da:25:88:2d:72:a7:4b:79:03:14:8a:6f:d2:4a:55: dc:a8:3d:22:8a:d6:35:c5:ee:1b:69:57:9a:d2:1f:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:c3:49:fb:4f:0b:af:d2:db:9d:66:b6:82:3a:bb:c4: b4:ef:29:53:aa:12:b3:ba:79:d9:bf:0a:c4:3f:61:12: 2a:f0:d0:d9:b2:ac:79:73:6e:13:a2:ba:a9:87:9d:43: 3a:0d:7e:e5:9b:e9:28:53:0d:b4:d2:9e:7e:c3:1f:18: 34:49:ec:0a:06:e3:22:01:b5:e9:bb:e3:74:de:01:56: ca:48:6d:c2:1b:47:d5:29:27:09:81:df:da:62:50:68: 49:59:61:03:3a:89:05:1f:4c:83:ad:4c:97:4b:e1:56: 39:42:d2:6d:e1:ed:ad:0d:68:c5:c4:80:b9:f3:df:09: b5:5f:21:65:6f:a4:5d:ee:0c:43:e5:f1:b2:2f:b5:86: fc:b6:b0:a0:fe:2b:6f:4c:d0:c0:d6:3d:fb:86:fe:58: 8a:f2:f0:52:5b:98:7c:64:0f:b2:18:86:01:95:a9:eb: 3c:86:fe:12:ac:e6:c1:4c:4b:2c:c1:2f:04:c2:e1:51: 71:de:6e:c7:9f:4d:cb:b1:65:2b:42:be:5c:38:67:ef: d8:4c:42:ff:b2:13:3b:51:93:69:c1:45:0a:76:9e:fb: 4a:aa:69:66:28:31:d2:a4:5a:95:41:6c:70:31:c4:4d: 82:61:ad:85:29:7e:eb:8b:c9:1e:cd:ff:3b:cc:80:f9 Fingerprint (SHA-256): 8E:6E:96:09:3C:FA:90:CD:F6:8F:61:59:54:96:B4:16:06:86:9F:C6:C4:F4:B5:04:01:FF:85:F8:22:86:1A:B3 Fingerprint (SHA1): 88:F3:D9:94:99:0A:D4:64:27:FE:39:1D:4A:BD:95:C8:F7:42:D6:60 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #7272: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #7273: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #7274: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 19118 at Mon Apr 25 17:37:27 UTC 2016 kill -USR1 19118 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 19118 killed at Mon Apr 25 17:37:27 UTC 2016 httpserv starting at Mon Apr 25 17:37:27 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 17:37:27 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 19365 >/dev/null 2>/dev/null httpserv with PID 19365 found at Mon Apr 25 17:37:28 UTC 2016 httpserv with PID 19365 started at Mon Apr 25 17:37:28 UTC 2016 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7275: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7276: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173415 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7277: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7278: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7279: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173416 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7280: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7281: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7282: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7283: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425173417 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7284: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7285: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425173418 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7286: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7287: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #7288: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7289: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7290: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 425173419 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7291: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7292: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7293: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #7294: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #7295: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173416 (0x1957a1a8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:37:41 2016 Not After : Sun Apr 25 17:37:41 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:d0:78:ee:fa:ad:e5:33:3e:f4:ee:02:c3:8b:01:bb: 3a:4b:be:77:7a:a2:e7:97:9d:d0:26:f0:73:27:77:f7: a4:58:b8:ac:2d:7a:76:d3:16:c7:b9:92:46:69:51:56: 06:e9:81:23:24:74:80:5b:ce:c9:86:52:42:12:0a:56: 56:a2:b8:ba:7f:a2:0e:6a:ac:70:5a:52:c2:15:e0:a5: 47:f7:b0:92:7c:d6:ec:48:be:ac:46:db:e4:fb:0f:92: c2:18:86:55:0d:df:53:1a:e6:cf:fd:5e:9a:11:fb:4c: c1:05:ec:24:ca:57:2f:70:5f:14:00:0a:02:66:72:25: b0:12:5c:38:49:1c:5f:23:39:9e:20:11:a8:a2:b3:46: d8:c1:01:29:3b:83:01:cc:ae:cd:62:3a:59:04:29:8a: 6f:68:4e:2d:ee:b3:8c:2e:fe:4a:13:b4:4c:06:db:a1: f5:9e:0f:c4:45:f8:dd:b1:a7:53:c5:24:5f:ad:d7:36: 8d:57:e1:71:e2:d4:d9:35:d3:40:21:b6:bb:a8:ca:d8: 1e:35:36:4e:76:7d:93:d9:f9:bd:78:6d:57:a3:24:30: 27:ca:4a:1b:2e:9f:05:e8:a4:f2:76:73:17:77:e3:10: e2:60:63:4f:fb:57:bd:33:35:34:3a:70:17:90:87:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:e2:cf:f5:f4:c0:af:26:de:5f:24:ee:46:83:40:01: 06:36:c8:c5:6e:9f:79:58:ed:ed:e4:d3:fd:11:9b:d3: d9:bc:7c:4b:16:4d:ce:0b:b9:27:ed:82:55:6d:50:30: 8e:77:12:aa:02:0e:c5:b1:94:4b:61:c6:66:74:80:c6: 39:3d:3b:03:f8:68:58:f4:63:d6:6b:71:05:bf:78:92: 91:c4:71:52:43:a9:e1:37:17:bd:d5:2f:03:a8:55:3e: fe:ca:d4:54:29:a6:1c:e3:57:83:a5:8e:a4:28:43:af: 48:87:1b:66:f3:6c:25:be:1c:19:e5:4e:c3:17:76:d4: b5:86:01:d7:26:6f:56:14:ed:85:4d:8b:a0:47:75:df: f1:66:da:9e:25:13:6d:a7:8c:67:0e:d3:34:3e:0d:7d: 34:f1:68:ad:f0:5b:68:ce:78:e3:84:d7:b2:d8:89:15: 4b:0a:23:0b:52:7c:d2:d7:44:05:34:6d:cc:34:81:14: 3b:21:c6:6b:ee:01:cb:1a:b7:7c:a3:73:d6:e9:6c:dd: fe:4d:5e:b4:d5:cf:cb:c6:59:c0:c7:0e:68:64:6c:56: 39:04:a3:2d:3e:3f:2a:32:96:6a:de:e4:08:75:24:05: 18:c4:58:bc:08:4f:24:ab:4e:23:45:d0:fb:71:41:5d Fingerprint (SHA-256): EC:03:42:C6:A3:8B:91:6C:E8:70:2C:67:49:26:03:54:92:21:52:B9:1A:86:2C:50:56:68:ED:6E:6D:76:1E:25 Fingerprint (SHA1): 0C:37:D8:1E:F0:9F:39:32:4D:5E:41:CC:30:72:47:77:93:C2:D0:82 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7296: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173415 (0x1957a1a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 17:37:34 2016 Not After : Sun Apr 25 17:37:34 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ed:f0:d8:ac:2f:c7:6b:0c:48:c2:11:c5:74:e6:d1: c4:0e:89:bf:01:86:90:b4:e2:94:cb:2a:ab:cc:7d:e5: 77:2a:97:aa:b5:1d:be:10:80:fe:10:dc:24:03:92:c9: 59:ba:a5:fd:75:08:2e:3c:c0:58:02:aa:fb:61:68:33: a6:90:cf:a0:1b:cb:93:f0:91:1d:7e:ba:a2:ff:6a:0f: 32:09:b7:cb:30:e2:bf:8f:72:35:33:b2:6f:ee:be:c1: b0:61:1d:d7:54:48:19:0c:33:c3:6c:26:5f:5b:c3:11: 88:3c:3b:50:23:d0:67:7b:ac:9e:99:d7:12:7e:e6:07: 46:18:30:cd:36:04:85:5b:ac:24:58:14:f0:9c:08:28: 53:c2:25:e8:8e:02:64:32:b1:f4:34:ec:fe:45:59:e6: da:48:84:ed:4b:ee:18:f1:c9:56:19:7e:dc:00:b6:cd: 71:6a:80:76:0e:0f:d6:7e:5b:fa:5b:68:14:b7:88:85: db:04:53:d9:74:38:54:02:35:98:af:f3:2c:65:f8:da: 61:45:f2:5c:18:ec:4f:a2:4c:f9:6c:f6:f8:b2:17:1f: 84:39:c2:12:b0:62:3e:52:6f:44:ca:60:3b:8a:5e:0b: c2:95:37:9d:1c:24:f6:ba:34:76:a8:92:84:3e:1f:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:dd:93:64:aa:9f:f0:54:17:69:a1:f1:4d:83:cc:ad: d8:4a:bf:b5:79:a8:01:f2:09:1e:a5:de:b8:25:f5:7e: 9c:99:74:75:53:e7:19:0a:1c:2e:95:e7:5e:5f:d9:1a: 2a:ab:ea:e4:22:f0:a0:8c:72:da:e2:33:a7:3a:dd:d8: 77:88:9d:71:67:2e:62:f9:dc:46:4e:09:55:68:3d:57: 92:66:bd:2a:df:03:b7:b1:f7:dc:e8:29:89:b7:01:21: 06:3d:2c:34:01:a6:07:57:d2:fc:4f:5d:4b:1b:aa:24: 74:a1:1e:95:d9:a0:9f:40:3e:a0:77:47:6b:c1:6b:1a: 6a:52:b2:0b:56:8d:bc:ec:8c:d1:84:37:e2:40:07:c4: 6d:95:92:f9:2a:55:04:51:45:03:62:48:20:0f:99:c7: bd:71:c8:c7:73:db:c6:51:52:49:ba:fd:cf:a2:ae:9b: 6d:b4:b8:a7:d7:89:1d:5f:dd:8a:dd:53:3f:c6:f0:f4: ce:e4:1d:ee:5b:ca:37:73:cc:60:82:61:ca:eb:97:5e: 32:56:c3:2d:99:a3:02:24:0f:a3:15:c9:7a:78:26:7b: 70:5c:bd:8a:45:9a:61:82:30:c1:2c:ef:77:c4:95:86: a6:3a:33:9c:be:13:c9:42:7c:bb:53:61:a0:e5:d6:b6 Fingerprint (SHA-256): 64:D0:D2:73:BB:C5:60:85:C2:1A:B5:30:F4:E3:7A:13:F4:8C:7E:CB:9D:0F:09:99:15:53:70:AB:B8:7E:DA:F0 Fingerprint (SHA1): 25:6F:FB:80:FA:BD:A0:40:DC:60:C5:60:D8:52:EA:4E:F9:6F:FB:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7297: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7298: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #7299: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #7300: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173415 (0x1957a1a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 17:37:34 2016 Not After : Sun Apr 25 17:37:34 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ed:f0:d8:ac:2f:c7:6b:0c:48:c2:11:c5:74:e6:d1: c4:0e:89:bf:01:86:90:b4:e2:94:cb:2a:ab:cc:7d:e5: 77:2a:97:aa:b5:1d:be:10:80:fe:10:dc:24:03:92:c9: 59:ba:a5:fd:75:08:2e:3c:c0:58:02:aa:fb:61:68:33: a6:90:cf:a0:1b:cb:93:f0:91:1d:7e:ba:a2:ff:6a:0f: 32:09:b7:cb:30:e2:bf:8f:72:35:33:b2:6f:ee:be:c1: b0:61:1d:d7:54:48:19:0c:33:c3:6c:26:5f:5b:c3:11: 88:3c:3b:50:23:d0:67:7b:ac:9e:99:d7:12:7e:e6:07: 46:18:30:cd:36:04:85:5b:ac:24:58:14:f0:9c:08:28: 53:c2:25:e8:8e:02:64:32:b1:f4:34:ec:fe:45:59:e6: da:48:84:ed:4b:ee:18:f1:c9:56:19:7e:dc:00:b6:cd: 71:6a:80:76:0e:0f:d6:7e:5b:fa:5b:68:14:b7:88:85: db:04:53:d9:74:38:54:02:35:98:af:f3:2c:65:f8:da: 61:45:f2:5c:18:ec:4f:a2:4c:f9:6c:f6:f8:b2:17:1f: 84:39:c2:12:b0:62:3e:52:6f:44:ca:60:3b:8a:5e:0b: c2:95:37:9d:1c:24:f6:ba:34:76:a8:92:84:3e:1f:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:dd:93:64:aa:9f:f0:54:17:69:a1:f1:4d:83:cc:ad: d8:4a:bf:b5:79:a8:01:f2:09:1e:a5:de:b8:25:f5:7e: 9c:99:74:75:53:e7:19:0a:1c:2e:95:e7:5e:5f:d9:1a: 2a:ab:ea:e4:22:f0:a0:8c:72:da:e2:33:a7:3a:dd:d8: 77:88:9d:71:67:2e:62:f9:dc:46:4e:09:55:68:3d:57: 92:66:bd:2a:df:03:b7:b1:f7:dc:e8:29:89:b7:01:21: 06:3d:2c:34:01:a6:07:57:d2:fc:4f:5d:4b:1b:aa:24: 74:a1:1e:95:d9:a0:9f:40:3e:a0:77:47:6b:c1:6b:1a: 6a:52:b2:0b:56:8d:bc:ec:8c:d1:84:37:e2:40:07:c4: 6d:95:92:f9:2a:55:04:51:45:03:62:48:20:0f:99:c7: bd:71:c8:c7:73:db:c6:51:52:49:ba:fd:cf:a2:ae:9b: 6d:b4:b8:a7:d7:89:1d:5f:dd:8a:dd:53:3f:c6:f0:f4: ce:e4:1d:ee:5b:ca:37:73:cc:60:82:61:ca:eb:97:5e: 32:56:c3:2d:99:a3:02:24:0f:a3:15:c9:7a:78:26:7b: 70:5c:bd:8a:45:9a:61:82:30:c1:2c:ef:77:c4:95:86: a6:3a:33:9c:be:13:c9:42:7c:bb:53:61:a0:e5:d6:b6 Fingerprint (SHA-256): 64:D0:D2:73:BB:C5:60:85:C2:1A:B5:30:F4:E3:7A:13:F4:8C:7E:CB:9D:0F:09:99:15:53:70:AB:B8:7E:DA:F0 Fingerprint (SHA1): 25:6F:FB:80:FA:BD:A0:40:DC:60:C5:60:D8:52:EA:4E:F9:6F:FB:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7301: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173416 (0x1957a1a8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:37:41 2016 Not After : Sun Apr 25 17:37:41 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:d0:78:ee:fa:ad:e5:33:3e:f4:ee:02:c3:8b:01:bb: 3a:4b:be:77:7a:a2:e7:97:9d:d0:26:f0:73:27:77:f7: a4:58:b8:ac:2d:7a:76:d3:16:c7:b9:92:46:69:51:56: 06:e9:81:23:24:74:80:5b:ce:c9:86:52:42:12:0a:56: 56:a2:b8:ba:7f:a2:0e:6a:ac:70:5a:52:c2:15:e0:a5: 47:f7:b0:92:7c:d6:ec:48:be:ac:46:db:e4:fb:0f:92: c2:18:86:55:0d:df:53:1a:e6:cf:fd:5e:9a:11:fb:4c: c1:05:ec:24:ca:57:2f:70:5f:14:00:0a:02:66:72:25: b0:12:5c:38:49:1c:5f:23:39:9e:20:11:a8:a2:b3:46: d8:c1:01:29:3b:83:01:cc:ae:cd:62:3a:59:04:29:8a: 6f:68:4e:2d:ee:b3:8c:2e:fe:4a:13:b4:4c:06:db:a1: f5:9e:0f:c4:45:f8:dd:b1:a7:53:c5:24:5f:ad:d7:36: 8d:57:e1:71:e2:d4:d9:35:d3:40:21:b6:bb:a8:ca:d8: 1e:35:36:4e:76:7d:93:d9:f9:bd:78:6d:57:a3:24:30: 27:ca:4a:1b:2e:9f:05:e8:a4:f2:76:73:17:77:e3:10: e2:60:63:4f:fb:57:bd:33:35:34:3a:70:17:90:87:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:e2:cf:f5:f4:c0:af:26:de:5f:24:ee:46:83:40:01: 06:36:c8:c5:6e:9f:79:58:ed:ed:e4:d3:fd:11:9b:d3: d9:bc:7c:4b:16:4d:ce:0b:b9:27:ed:82:55:6d:50:30: 8e:77:12:aa:02:0e:c5:b1:94:4b:61:c6:66:74:80:c6: 39:3d:3b:03:f8:68:58:f4:63:d6:6b:71:05:bf:78:92: 91:c4:71:52:43:a9:e1:37:17:bd:d5:2f:03:a8:55:3e: fe:ca:d4:54:29:a6:1c:e3:57:83:a5:8e:a4:28:43:af: 48:87:1b:66:f3:6c:25:be:1c:19:e5:4e:c3:17:76:d4: b5:86:01:d7:26:6f:56:14:ed:85:4d:8b:a0:47:75:df: f1:66:da:9e:25:13:6d:a7:8c:67:0e:d3:34:3e:0d:7d: 34:f1:68:ad:f0:5b:68:ce:78:e3:84:d7:b2:d8:89:15: 4b:0a:23:0b:52:7c:d2:d7:44:05:34:6d:cc:34:81:14: 3b:21:c6:6b:ee:01:cb:1a:b7:7c:a3:73:d6:e9:6c:dd: fe:4d:5e:b4:d5:cf:cb:c6:59:c0:c7:0e:68:64:6c:56: 39:04:a3:2d:3e:3f:2a:32:96:6a:de:e4:08:75:24:05: 18:c4:58:bc:08:4f:24:ab:4e:23:45:d0:fb:71:41:5d Fingerprint (SHA-256): EC:03:42:C6:A3:8B:91:6C:E8:70:2C:67:49:26:03:54:92:21:52:B9:1A:86:2C:50:56:68:ED:6E:6D:76:1E:25 Fingerprint (SHA1): 0C:37:D8:1E:F0:9F:39:32:4D:5E:41:CC:30:72:47:77:93:C2:D0:82 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7302: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #7303: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #7304: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7305: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7306: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7307: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173416 (0x1957a1a8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:37:41 2016 Not After : Sun Apr 25 17:37:41 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:d0:78:ee:fa:ad:e5:33:3e:f4:ee:02:c3:8b:01:bb: 3a:4b:be:77:7a:a2:e7:97:9d:d0:26:f0:73:27:77:f7: a4:58:b8:ac:2d:7a:76:d3:16:c7:b9:92:46:69:51:56: 06:e9:81:23:24:74:80:5b:ce:c9:86:52:42:12:0a:56: 56:a2:b8:ba:7f:a2:0e:6a:ac:70:5a:52:c2:15:e0:a5: 47:f7:b0:92:7c:d6:ec:48:be:ac:46:db:e4:fb:0f:92: c2:18:86:55:0d:df:53:1a:e6:cf:fd:5e:9a:11:fb:4c: c1:05:ec:24:ca:57:2f:70:5f:14:00:0a:02:66:72:25: b0:12:5c:38:49:1c:5f:23:39:9e:20:11:a8:a2:b3:46: d8:c1:01:29:3b:83:01:cc:ae:cd:62:3a:59:04:29:8a: 6f:68:4e:2d:ee:b3:8c:2e:fe:4a:13:b4:4c:06:db:a1: f5:9e:0f:c4:45:f8:dd:b1:a7:53:c5:24:5f:ad:d7:36: 8d:57:e1:71:e2:d4:d9:35:d3:40:21:b6:bb:a8:ca:d8: 1e:35:36:4e:76:7d:93:d9:f9:bd:78:6d:57:a3:24:30: 27:ca:4a:1b:2e:9f:05:e8:a4:f2:76:73:17:77:e3:10: e2:60:63:4f:fb:57:bd:33:35:34:3a:70:17:90:87:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:e2:cf:f5:f4:c0:af:26:de:5f:24:ee:46:83:40:01: 06:36:c8:c5:6e:9f:79:58:ed:ed:e4:d3:fd:11:9b:d3: d9:bc:7c:4b:16:4d:ce:0b:b9:27:ed:82:55:6d:50:30: 8e:77:12:aa:02:0e:c5:b1:94:4b:61:c6:66:74:80:c6: 39:3d:3b:03:f8:68:58:f4:63:d6:6b:71:05:bf:78:92: 91:c4:71:52:43:a9:e1:37:17:bd:d5:2f:03:a8:55:3e: fe:ca:d4:54:29:a6:1c:e3:57:83:a5:8e:a4:28:43:af: 48:87:1b:66:f3:6c:25:be:1c:19:e5:4e:c3:17:76:d4: b5:86:01:d7:26:6f:56:14:ed:85:4d:8b:a0:47:75:df: f1:66:da:9e:25:13:6d:a7:8c:67:0e:d3:34:3e:0d:7d: 34:f1:68:ad:f0:5b:68:ce:78:e3:84:d7:b2:d8:89:15: 4b:0a:23:0b:52:7c:d2:d7:44:05:34:6d:cc:34:81:14: 3b:21:c6:6b:ee:01:cb:1a:b7:7c:a3:73:d6:e9:6c:dd: fe:4d:5e:b4:d5:cf:cb:c6:59:c0:c7:0e:68:64:6c:56: 39:04:a3:2d:3e:3f:2a:32:96:6a:de:e4:08:75:24:05: 18:c4:58:bc:08:4f:24:ab:4e:23:45:d0:fb:71:41:5d Fingerprint (SHA-256): EC:03:42:C6:A3:8B:91:6C:E8:70:2C:67:49:26:03:54:92:21:52:B9:1A:86:2C:50:56:68:ED:6E:6D:76:1E:25 Fingerprint (SHA1): 0C:37:D8:1E:F0:9F:39:32:4D:5E:41:CC:30:72:47:77:93:C2:D0:82 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7308: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173416 (0x1957a1a8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:37:41 2016 Not After : Sun Apr 25 17:37:41 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:d0:78:ee:fa:ad:e5:33:3e:f4:ee:02:c3:8b:01:bb: 3a:4b:be:77:7a:a2:e7:97:9d:d0:26:f0:73:27:77:f7: a4:58:b8:ac:2d:7a:76:d3:16:c7:b9:92:46:69:51:56: 06:e9:81:23:24:74:80:5b:ce:c9:86:52:42:12:0a:56: 56:a2:b8:ba:7f:a2:0e:6a:ac:70:5a:52:c2:15:e0:a5: 47:f7:b0:92:7c:d6:ec:48:be:ac:46:db:e4:fb:0f:92: c2:18:86:55:0d:df:53:1a:e6:cf:fd:5e:9a:11:fb:4c: c1:05:ec:24:ca:57:2f:70:5f:14:00:0a:02:66:72:25: b0:12:5c:38:49:1c:5f:23:39:9e:20:11:a8:a2:b3:46: d8:c1:01:29:3b:83:01:cc:ae:cd:62:3a:59:04:29:8a: 6f:68:4e:2d:ee:b3:8c:2e:fe:4a:13:b4:4c:06:db:a1: f5:9e:0f:c4:45:f8:dd:b1:a7:53:c5:24:5f:ad:d7:36: 8d:57:e1:71:e2:d4:d9:35:d3:40:21:b6:bb:a8:ca:d8: 1e:35:36:4e:76:7d:93:d9:f9:bd:78:6d:57:a3:24:30: 27:ca:4a:1b:2e:9f:05:e8:a4:f2:76:73:17:77:e3:10: e2:60:63:4f:fb:57:bd:33:35:34:3a:70:17:90:87:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:e2:cf:f5:f4:c0:af:26:de:5f:24:ee:46:83:40:01: 06:36:c8:c5:6e:9f:79:58:ed:ed:e4:d3:fd:11:9b:d3: d9:bc:7c:4b:16:4d:ce:0b:b9:27:ed:82:55:6d:50:30: 8e:77:12:aa:02:0e:c5:b1:94:4b:61:c6:66:74:80:c6: 39:3d:3b:03:f8:68:58:f4:63:d6:6b:71:05:bf:78:92: 91:c4:71:52:43:a9:e1:37:17:bd:d5:2f:03:a8:55:3e: fe:ca:d4:54:29:a6:1c:e3:57:83:a5:8e:a4:28:43:af: 48:87:1b:66:f3:6c:25:be:1c:19:e5:4e:c3:17:76:d4: b5:86:01:d7:26:6f:56:14:ed:85:4d:8b:a0:47:75:df: f1:66:da:9e:25:13:6d:a7:8c:67:0e:d3:34:3e:0d:7d: 34:f1:68:ad:f0:5b:68:ce:78:e3:84:d7:b2:d8:89:15: 4b:0a:23:0b:52:7c:d2:d7:44:05:34:6d:cc:34:81:14: 3b:21:c6:6b:ee:01:cb:1a:b7:7c:a3:73:d6:e9:6c:dd: fe:4d:5e:b4:d5:cf:cb:c6:59:c0:c7:0e:68:64:6c:56: 39:04:a3:2d:3e:3f:2a:32:96:6a:de:e4:08:75:24:05: 18:c4:58:bc:08:4f:24:ab:4e:23:45:d0:fb:71:41:5d Fingerprint (SHA-256): EC:03:42:C6:A3:8B:91:6C:E8:70:2C:67:49:26:03:54:92:21:52:B9:1A:86:2C:50:56:68:ED:6E:6D:76:1E:25 Fingerprint (SHA1): 0C:37:D8:1E:F0:9F:39:32:4D:5E:41:CC:30:72:47:77:93:C2:D0:82 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7309: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #7310: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #7311: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7312: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #7313: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #7314: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173415 (0x1957a1a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 17:37:34 2016 Not After : Sun Apr 25 17:37:34 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ed:f0:d8:ac:2f:c7:6b:0c:48:c2:11:c5:74:e6:d1: c4:0e:89:bf:01:86:90:b4:e2:94:cb:2a:ab:cc:7d:e5: 77:2a:97:aa:b5:1d:be:10:80:fe:10:dc:24:03:92:c9: 59:ba:a5:fd:75:08:2e:3c:c0:58:02:aa:fb:61:68:33: a6:90:cf:a0:1b:cb:93:f0:91:1d:7e:ba:a2:ff:6a:0f: 32:09:b7:cb:30:e2:bf:8f:72:35:33:b2:6f:ee:be:c1: b0:61:1d:d7:54:48:19:0c:33:c3:6c:26:5f:5b:c3:11: 88:3c:3b:50:23:d0:67:7b:ac:9e:99:d7:12:7e:e6:07: 46:18:30:cd:36:04:85:5b:ac:24:58:14:f0:9c:08:28: 53:c2:25:e8:8e:02:64:32:b1:f4:34:ec:fe:45:59:e6: da:48:84:ed:4b:ee:18:f1:c9:56:19:7e:dc:00:b6:cd: 71:6a:80:76:0e:0f:d6:7e:5b:fa:5b:68:14:b7:88:85: db:04:53:d9:74:38:54:02:35:98:af:f3:2c:65:f8:da: 61:45:f2:5c:18:ec:4f:a2:4c:f9:6c:f6:f8:b2:17:1f: 84:39:c2:12:b0:62:3e:52:6f:44:ca:60:3b:8a:5e:0b: c2:95:37:9d:1c:24:f6:ba:34:76:a8:92:84:3e:1f:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:dd:93:64:aa:9f:f0:54:17:69:a1:f1:4d:83:cc:ad: d8:4a:bf:b5:79:a8:01:f2:09:1e:a5:de:b8:25:f5:7e: 9c:99:74:75:53:e7:19:0a:1c:2e:95:e7:5e:5f:d9:1a: 2a:ab:ea:e4:22:f0:a0:8c:72:da:e2:33:a7:3a:dd:d8: 77:88:9d:71:67:2e:62:f9:dc:46:4e:09:55:68:3d:57: 92:66:bd:2a:df:03:b7:b1:f7:dc:e8:29:89:b7:01:21: 06:3d:2c:34:01:a6:07:57:d2:fc:4f:5d:4b:1b:aa:24: 74:a1:1e:95:d9:a0:9f:40:3e:a0:77:47:6b:c1:6b:1a: 6a:52:b2:0b:56:8d:bc:ec:8c:d1:84:37:e2:40:07:c4: 6d:95:92:f9:2a:55:04:51:45:03:62:48:20:0f:99:c7: bd:71:c8:c7:73:db:c6:51:52:49:ba:fd:cf:a2:ae:9b: 6d:b4:b8:a7:d7:89:1d:5f:dd:8a:dd:53:3f:c6:f0:f4: ce:e4:1d:ee:5b:ca:37:73:cc:60:82:61:ca:eb:97:5e: 32:56:c3:2d:99:a3:02:24:0f:a3:15:c9:7a:78:26:7b: 70:5c:bd:8a:45:9a:61:82:30:c1:2c:ef:77:c4:95:86: a6:3a:33:9c:be:13:c9:42:7c:bb:53:61:a0:e5:d6:b6 Fingerprint (SHA-256): 64:D0:D2:73:BB:C5:60:85:C2:1A:B5:30:F4:E3:7A:13:F4:8C:7E:CB:9D:0F:09:99:15:53:70:AB:B8:7E:DA:F0 Fingerprint (SHA1): 25:6F:FB:80:FA:BD:A0:40:DC:60:C5:60:D8:52:EA:4E:F9:6F:FB:21 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7315: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173415 (0x1957a1a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 17:37:34 2016 Not After : Sun Apr 25 17:37:34 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ed:f0:d8:ac:2f:c7:6b:0c:48:c2:11:c5:74:e6:d1: c4:0e:89:bf:01:86:90:b4:e2:94:cb:2a:ab:cc:7d:e5: 77:2a:97:aa:b5:1d:be:10:80:fe:10:dc:24:03:92:c9: 59:ba:a5:fd:75:08:2e:3c:c0:58:02:aa:fb:61:68:33: a6:90:cf:a0:1b:cb:93:f0:91:1d:7e:ba:a2:ff:6a:0f: 32:09:b7:cb:30:e2:bf:8f:72:35:33:b2:6f:ee:be:c1: b0:61:1d:d7:54:48:19:0c:33:c3:6c:26:5f:5b:c3:11: 88:3c:3b:50:23:d0:67:7b:ac:9e:99:d7:12:7e:e6:07: 46:18:30:cd:36:04:85:5b:ac:24:58:14:f0:9c:08:28: 53:c2:25:e8:8e:02:64:32:b1:f4:34:ec:fe:45:59:e6: da:48:84:ed:4b:ee:18:f1:c9:56:19:7e:dc:00:b6:cd: 71:6a:80:76:0e:0f:d6:7e:5b:fa:5b:68:14:b7:88:85: db:04:53:d9:74:38:54:02:35:98:af:f3:2c:65:f8:da: 61:45:f2:5c:18:ec:4f:a2:4c:f9:6c:f6:f8:b2:17:1f: 84:39:c2:12:b0:62:3e:52:6f:44:ca:60:3b:8a:5e:0b: c2:95:37:9d:1c:24:f6:ba:34:76:a8:92:84:3e:1f:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:dd:93:64:aa:9f:f0:54:17:69:a1:f1:4d:83:cc:ad: d8:4a:bf:b5:79:a8:01:f2:09:1e:a5:de:b8:25:f5:7e: 9c:99:74:75:53:e7:19:0a:1c:2e:95:e7:5e:5f:d9:1a: 2a:ab:ea:e4:22:f0:a0:8c:72:da:e2:33:a7:3a:dd:d8: 77:88:9d:71:67:2e:62:f9:dc:46:4e:09:55:68:3d:57: 92:66:bd:2a:df:03:b7:b1:f7:dc:e8:29:89:b7:01:21: 06:3d:2c:34:01:a6:07:57:d2:fc:4f:5d:4b:1b:aa:24: 74:a1:1e:95:d9:a0:9f:40:3e:a0:77:47:6b:c1:6b:1a: 6a:52:b2:0b:56:8d:bc:ec:8c:d1:84:37:e2:40:07:c4: 6d:95:92:f9:2a:55:04:51:45:03:62:48:20:0f:99:c7: bd:71:c8:c7:73:db:c6:51:52:49:ba:fd:cf:a2:ae:9b: 6d:b4:b8:a7:d7:89:1d:5f:dd:8a:dd:53:3f:c6:f0:f4: ce:e4:1d:ee:5b:ca:37:73:cc:60:82:61:ca:eb:97:5e: 32:56:c3:2d:99:a3:02:24:0f:a3:15:c9:7a:78:26:7b: 70:5c:bd:8a:45:9a:61:82:30:c1:2c:ef:77:c4:95:86: a6:3a:33:9c:be:13:c9:42:7c:bb:53:61:a0:e5:d6:b6 Fingerprint (SHA-256): 64:D0:D2:73:BB:C5:60:85:C2:1A:B5:30:F4:E3:7A:13:F4:8C:7E:CB:9D:0F:09:99:15:53:70:AB:B8:7E:DA:F0 Fingerprint (SHA1): 25:6F:FB:80:FA:BD:A0:40:DC:60:C5:60:D8:52:EA:4E:F9:6F:FB:21 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7316: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #7317: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173420 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7318: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #7319: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #7320: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173421 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7321: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #7322: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #7323: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173422 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7324: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #7325: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #7326: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173423 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7327: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #7328: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #7329: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173424 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7330: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #7331: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #7332: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173425 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7333: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #7334: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #7335: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173426 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7336: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #7337: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #7338: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173427 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7339: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #7340: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #7341: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173428 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7342: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #7343: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #7344: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7345: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 425173429 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7346: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7347: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 425173430 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7348: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7349: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 425173431 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7350: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7351: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #7352: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #7353: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7354: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 425173432 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7355: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7356: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 425173433 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7357: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7358: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 425173434 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7359: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7360: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #7361: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #7362: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7363: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 425173435 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7364: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7365: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 425173436 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7366: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7367: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 425173437 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7368: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7369: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #7370: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #7371: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7372: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 425173438 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7373: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7374: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 425173439 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7375: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7376: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 425173440 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7377: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7378: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #7379: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7380: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7381: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 425173441 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7382: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7383: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7384: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7385: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173442 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7386: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7387: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173420 (0x1957a1ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Apr 25 17:38:16 2016 Not After : Sun Apr 25 17:38:16 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:18:c4:f0:2b:50:68:64:97:1b:92:b0:3e:75:6e:41: 28:c7:91:d2:3f:34:31:6c:e5:b1:e7:e6:a9:49:9c:7d: ad:37:d7:e2:89:cb:20:ee:09:5a:44:51:52:cf:4a:86: 92:e4:b5:68:1b:31:d7:8e:e7:05:f1:c3:79:65:93:8c: c7:86:72:f5:12:99:f7:cd:8c:f7:46:4e:1a:f6:4d:70: 57:ed:c0:34:eb:42:b5:b0:bd:42:61:96:29:2a:a4:a9: 45:17:1b:52:ad:96:73:64:40:47:68:90:f5:ac:9d:fd: be:90:aa:2c:06:c0:5a:8d:59:10:1c:6d:e9:d1:2d:a4: 1f:17:9d:0b:c4:37:e5:d0:e5:fb:ca:1c:a0:5d:a6:0f: 6c:d3:43:1a:40:9f:52:80:94:5a:02:ce:ad:03:f3:63: 7c:30:67:90:33:5d:d8:94:dd:f8:1a:16:a8:87:aa:16: 9d:97:f8:aa:a4:2d:84:a7:2d:a5:a8:93:0a:62:77:68: f8:a2:6a:f7:f4:39:d9:e1:ed:94:06:3d:e0:fb:02:22: 6b:9f:c8:c8:f3:8f:85:f0:c9:a7:0d:10:e0:64:9b:38: c5:7e:46:5c:7b:1a:4f:5f:85:e2:b1:ce:93:ef:5d:a2: de:cb:99:24:09:a0:b9:77:bd:48:c9:eb:37:83:c2:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:69:3e:91:e7:27:d2:9a:e2:86:ff:97:2e:3d:58:93: d5:be:bd:3c:46:f8:1f:b8:7c:18:5a:c4:84:b1:b4:e3: 6e:bb:e1:cd:3c:b3:04:de:18:d6:d5:4b:c3:f3:6b:ee: ec:34:96:13:00:1b:5c:a4:67:d5:c1:bd:80:c2:7d:21: fc:7a:4a:df:69:fd:a9:3a:4d:2f:45:85:e7:a0:8d:f4: df:77:54:24:8e:ee:4a:44:c9:42:64:07:ec:cb:c5:90: d7:f7:10:6e:be:c5:48:da:f0:37:81:d6:b9:05:ff:08: 80:bf:3b:fe:f8:c9:45:5d:3a:b0:6b:d4:c8:c8:bc:67: f9:af:33:e6:a5:b3:a5:2a:7b:c5:c6:0a:ed:b0:f8:a4: a7:7d:e9:7a:b7:d8:12:f6:68:e1:42:8a:21:bf:4e:b4: f3:fb:dd:ad:0a:81:d4:1a:f0:32:89:35:9b:63:f0:5d: 38:e6:dd:6c:5d:4c:87:40:7e:a4:a0:cd:52:2b:c4:55: b7:01:42:09:15:97:62:3e:fe:1b:9a:07:cd:54:50:c1: 85:22:30:fb:56:c4:d7:02:b0:98:69:ea:4b:75:fc:1d: b6:28:58:11:d1:ab:ba:0b:67:7e:82:1c:ca:3a:f0:ff: 0e:2a:b8:ef:a2:b3:02:f5:7d:8f:72:1e:10:b7:08:fe Fingerprint (SHA-256): E4:92:BE:3E:1E:B8:0A:6E:C7:B3:78:28:45:36:25:10:A8:61:38:53:31:56:CD:E9:14:01:9A:6C:CF:C9:6D:0E Fingerprint (SHA1): 93:0D:0A:D4:7F:0C:C8:E9:9D:1F:8E:AD:F2:B5:37:DC:85:B7:CF:49 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #7388: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173421 (0x1957a1ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Apr 25 17:38:39 2016 Not After : Sun Apr 25 17:38:39 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:80:bb:17:db:d2:65:f7:c2:05:7b:4e:80:fe:35:8a: 36:be:0b:ea:df:ec:bb:a7:a4:38:e0:c6:23:a2:6b:5c: 75:85:71:02:f9:fc:c4:3d:8e:54:ba:cf:2b:61:de:cc: 00:11:cc:a6:30:95:6d:f9:f2:23:22:57:7b:32:89:e6: 26:0a:49:bc:18:3b:26:a3:d8:4a:ca:c9:59:36:ea:1b: 93:64:33:4c:7e:0d:c2:e0:8e:cf:bb:64:f3:de:a5:b3: 2c:19:34:a2:fb:c4:e6:2d:8a:e8:4c:b3:30:b8:08:82: e3:f2:60:7e:f2:a4:76:84:83:c0:1f:ec:1a:d0:fb:12: a2:d4:25:e0:e8:67:59:0d:6c:d8:82:32:84:1b:f8:1a: c8:7f:ae:69:0b:89:13:f0:35:ac:a8:ca:30:d5:06:3c: e0:96:88:b0:ff:59:93:3c:a5:8d:2f:ed:6a:3d:4d:a4: 39:9a:ce:8b:68:34:e7:3c:d9:fc:8b:c3:53:d7:bf:4d: fb:16:c4:89:c1:1b:d6:fe:e1:1b:f5:0c:81:e0:e7:74: c4:2d:b0:60:64:0f:a3:b8:25:47:7e:98:4d:ae:79:70: 02:6a:a0:3e:53:78:17:69:94:ae:e7:9a:30:30:49:19: dd:92:85:4a:3b:d8:7a:80:f3:92:e5:8c:8d:7d:47:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:df:54:b7:73:91:c5:4d:cf:50:40:a3:34:70:6d:01: f2:92:02:94:2f:f2:55:92:c8:bb:c9:9c:81:ff:11:af: 43:c6:66:ba:4c:80:29:a8:6c:4f:1b:86:28:c0:6b:da: 2a:99:e0:54:49:8f:f1:d8:f4:73:1b:72:b8:28:6d:53: 5e:5a:8c:63:b3:8a:b6:d6:69:70:d1:b6:af:7a:89:7e: c9:69:d8:ac:d4:93:71:8d:9c:61:8d:77:21:d5:9e:e3: 2d:cd:62:7d:ef:e5:7d:7a:86:3c:6a:87:86:8f:a2:08: 4a:92:43:d5:18:d9:10:43:29:e9:9f:8e:5f:a5:a0:26: 9d:e4:d7:cc:44:76:32:be:06:04:6b:dc:f0:69:9c:2f: d7:89:5b:e8:d0:69:94:a4:26:8d:99:12:6d:50:14:2c: da:bd:ba:d8:56:8d:bd:01:af:b2:7e:ee:32:77:32:d7: 93:71:65:7a:a0:c3:8a:45:80:5e:f5:72:97:c5:98:57: 88:a2:42:d6:5b:e4:f9:d2:48:ff:2d:a6:45:66:99:60: 43:af:a4:55:aa:fa:4f:ab:da:27:26:8c:c4:eb:09:f4: 9c:32:6f:92:53:b0:29:8b:20:e3:66:42:36:a5:1c:1d: 23:d5:90:90:ba:db:42:62:1b:08:c4:0d:25:b3:3b:a1 Fingerprint (SHA-256): 09:92:59:76:86:8C:71:7D:68:F5:54:5C:15:7D:9D:0A:E7:74:D2:C6:49:AE:2F:EC:12:99:A2:8D:D0:FA:F3:2D Fingerprint (SHA1): C5:7E:BC:D3:4D:0F:C7:F4:CD:F0:0A:0E:FE:E4:6B:BC:CE:CE:31:E3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #7389: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173422 (0x1957a1ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Apr 25 17:38:50 2016 Not After : Sun Apr 25 17:38:50 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:c6:c0:52:b8:13:fd:6d:4c:85:c5:93:77:1d:77:fa: 70:5e:f4:44:a1:42:b7:1f:b9:03:df:5c:79:ab:65:84: 83:47:6e:ce:91:ea:71:de:d2:40:33:e5:41:6b:9d:bb: aa:7e:22:3d:20:82:91:79:e4:7e:07:78:ae:0b:80:01: 00:81:1d:c4:e9:03:74:33:d0:60:65:a1:d5:59:be:c3: 36:36:f7:7d:bb:d8:0e:fe:3d:b7:9d:f0:34:7d:f9:9b: 9a:6d:b0:1b:1d:14:8e:8f:ff:49:8e:c2:4e:9f:47:a0: fb:4d:e1:d5:f5:c2:55:be:32:d4:82:c5:6e:74:c9:35: d9:f3:28:95:a0:62:ac:e8:43:6f:01:0c:e1:70:89:82: 01:6c:99:e2:de:83:e3:d2:af:e6:43:3e:72:4c:56:ea: 2b:bb:a9:42:95:ba:ac:40:d2:ab:73:ab:29:03:57:00: 91:f8:cd:e4:69:0d:3a:ab:bd:63:c2:e3:e2:0f:5f:06: 2c:e5:34:05:a1:22:d3:5c:a4:1e:bf:3b:38:e7:ec:ba: 66:01:33:a0:3b:dc:49:44:47:7c:bf:de:e8:0a:b8:64: 7e:de:04:f9:e2:d2:63:c0:de:9a:75:ad:37:a8:7d:e3: 68:15:fe:cd:92:b7:b1:dc:23:50:df:42:be:16:5c:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:2f:51:ee:6d:b8:e0:fa:e1:3a:fe:46:0a:15:12:48: a5:73:22:31:90:ec:68:4d:2e:2f:3a:8e:67:4a:b8:bd: fa:81:ba:ec:da:db:71:6c:a3:b6:94:43:16:97:fd:56: 13:b2:5b:69:51:cc:32:da:67:cf:39:35:6b:50:b5:a8: 21:03:8a:64:9b:31:66:f9:36:77:73:44:b2:69:8a:e2: b7:7a:92:eb:0a:88:27:aa:a7:55:6f:92:53:d1:52:11: b4:8a:75:85:8a:de:df:0b:2a:98:f3:0a:d6:df:86:c7: a8:fc:6d:1d:a7:e3:2c:af:ad:38:9d:a0:93:ea:ab:f2: 1f:00:37:6b:cc:e6:7d:11:e9:9a:2a:86:d0:e9:31:fc: 0a:57:ad:9e:80:77:3d:90:f9:51:30:e7:0e:3a:37:2d: da:9b:59:ce:c8:b4:11:07:4a:08:78:86:9b:9f:0a:5a: 11:ba:4c:78:fc:7c:58:17:7d:4a:58:66:cf:27:88:fe: 81:5a:48:b7:5c:90:33:34:e4:fe:da:92:cd:ce:a4:2c: 82:90:31:f1:7e:1e:e4:24:c6:a7:62:25:20:66:60:84: 0d:ce:25:c8:b2:ce:59:a3:c8:8d:1d:a7:c1:56:44:47: 1d:f1:6d:cd:8e:58:fa:89:c1:bd:f8:97:30:b9:39:31 Fingerprint (SHA-256): FA:27:1C:C1:BE:4B:85:1D:AF:ED:6D:E1:D6:08:0E:C2:B3:66:D3:4F:52:13:BF:26:61:E3:65:07:0B:2D:80:2B Fingerprint (SHA1): 4E:B8:E3:83:67:3B:30:4D:14:63:81:57:37:FC:B2:3D:63:C4:42:1D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #7390: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173423 (0x1957a1af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Apr 25 17:39:23 2016 Not After : Sun Apr 25 17:39:23 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b5:c2:e0:54:e8:3b:19:e0:de:4a:d5:cb:ec:ee:68: 7c:5d:af:f4:3a:21:a9:06:44:d9:4c:7c:ed:55:8b:53: f6:4c:1b:5c:28:43:85:93:93:0e:fa:fb:67:84:22:68: ac:32:a6:3a:5a:f5:85:80:2d:28:57:35:7d:d7:88:20: 7e:89:ca:1b:ce:11:99:97:33:59:00:46:34:b8:7e:4c: 1c:4e:2d:52:9d:59:95:ee:71:93:d4:98:ac:1d:10:3c: c0:38:c7:a3:04:85:9f:f9:7d:f7:fc:88:ce:2f:ac:bf: 18:b1:8d:9f:c1:4d:ed:b1:d1:59:f5:10:f2:f4:da:bd: 65:6a:98:91:fc:2b:59:46:4a:d9:4c:67:f2:50:a2:1a: b7:3c:e4:3e:94:f8:cc:28:ac:93:bd:f3:6f:38:6d:b8: c8:6f:1d:b7:0a:2c:57:84:aa:f4:2a:9f:76:00:e1:e5: 83:21:7e:43:92:78:99:92:26:cb:98:21:76:c4:c2:f1: 3a:6c:f7:6b:64:b2:d5:48:a2:2c:70:ef:84:a2:59:4b: de:f2:3b:df:70:90:92:e2:72:75:e0:1d:38:79:c2:3a: a3:66:5c:29:46:5c:35:3b:e2:a8:cb:e6:a9:51:04:e7: 55:63:ee:e1:fe:c6:d3:bd:1f:9b:26:8c:4d:a8:7f:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:95:eb:ad:1e:d1:91:3d:49:19:fb:8f:cc:8c:85:33: 58:de:61:89:cf:7d:d3:cf:d1:b1:fb:e9:88:55:23:7b: 4a:44:85:9e:af:12:a8:04:b1:9d:15:ab:32:2b:b0:b2: 1e:41:fc:f4:bb:ab:60:9c:0a:cb:18:88:c5:81:1e:73: f0:f7:4b:9d:4e:0f:1b:1e:3e:16:a2:08:7a:ff:0a:59: f0:87:b8:88:b3:5e:aa:ec:da:7c:5a:43:ab:0a:5f:51: 8f:3d:34:b9:0d:c2:19:9c:0c:fe:31:cb:85:ed:20:08: bb:c8:f9:58:66:6a:30:dc:b0:70:13:32:25:13:15:e7: 94:ee:bb:57:a3:7e:5f:c0:1c:65:2b:e2:89:91:e3:2a: af:48:ea:9d:d3:97:ae:24:c7:d4:1d:2c:2f:81:8d:ec: 38:10:8d:98:eb:d2:87:93:a5:3b:3b:57:a6:f9:1d:23: cc:ff:84:a8:96:db:03:d6:3a:83:86:27:a6:d2:1d:e2: c1:95:18:c7:ec:0d:3b:aa:4c:3c:bb:17:86:db:f9:fc: 9d:62:ea:f6:d7:02:d6:48:40:e9:b5:b5:94:e2:da:80: e6:02:24:9b:85:c6:f5:59:36:19:2a:1c:9c:ea:57:c4: b4:f4:6a:12:cc:74:1d:0f:0a:64:60:2f:dd:5e:bc:d3 Fingerprint (SHA-256): AC:F2:E9:7A:6B:06:A5:EB:40:2B:22:1C:7D:91:12:5B:50:9B:71:B6:2E:BB:5D:7A:2A:47:53:CC:D2:9A:3E:CB Fingerprint (SHA1): 94:4F:AF:23:CE:A5:16:3F:78:30:E4:3C:89:34:C8:42:03:CF:E3:A6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #7391: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173424 (0x1957a1b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Apr 25 17:39:29 2016 Not After : Sun Apr 25 17:39:29 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:2e:bd:79:2a:9c:5a:71:ec:e0:ce:48:f5:6a:9b:b0: 58:4c:2b:c3:0e:41:06:07:90:ed:d9:13:2d:8d:41:da: b1:1c:65:9b:53:9f:24:88:7c:23:74:73:93:0b:a4:76: 30:e4:0a:bd:3a:f6:54:d1:4d:f1:c8:e3:68:37:08:91: d5:8c:b7:16:1f:b3:10:1d:72:21:cf:dc:69:de:c9:2c: f2:8d:30:11:5a:3a:54:0a:62:ab:63:19:25:ae:81:76: a5:f4:eb:f7:ab:9a:9a:c0:3b:ed:0b:9a:c5:c1:85:05: 10:d4:04:aa:59:a7:f6:f6:b9:ce:45:68:43:e3:6f:34: 30:5d:cd:55:f7:ee:d4:2b:2e:2d:62:0f:38:12:ed:60: 2d:84:14:98:fb:95:17:bf:6a:4d:95:a8:8e:3f:24:b9: 2f:42:97:ad:3d:ac:06:72:bf:3b:f3:dd:4b:e7:0d:a3: 15:f3:a2:49:50:37:9b:a1:42:0b:ce:4a:b6:ec:d0:8b: 89:7d:63:ca:80:79:7e:52:62:7c:ea:40:28:8a:e5:5d: e2:be:dd:f7:b8:bb:7b:22:5e:54:2a:43:c8:35:77:2e: fc:63:25:77:76:f7:a8:0f:e0:2f:9c:9c:34:15:da:f2: 98:51:e5:eb:3d:83:90:d0:34:5a:23:36:5e:60:f6:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:70:0d:d2:fd:2b:e6:1c:10:8a:5c:65:5f:cb:02:70: 16:bf:5c:30:72:33:90:52:69:e3:a9:d6:4b:e0:bf:a4: 17:e1:83:30:94:09:aa:6c:05:7a:46:34:29:76:4a:c5: 0e:93:d0:83:2d:d8:4f:a5:c7:9c:bc:86:1d:54:99:6f: db:10:69:72:85:75:ef:4f:84:24:8f:bf:b2:dd:70:87: 7f:a8:5c:8d:8c:5f:53:92:f1:ef:a7:29:ad:01:03:8c: 66:5b:92:44:30:5f:a6:5f:67:f9:b4:a2:76:e2:9d:b5: 70:e4:27:46:62:17:d9:ff:6b:e0:6c:d8:a5:f4:35:92: 63:5f:75:0e:61:1d:87:ac:5e:61:da:db:9a:58:a2:bc: 34:b2:24:63:5e:e1:b0:f8:e9:74:0c:17:29:d3:28:04: a5:b2:b8:92:38:d4:f4:5c:63:be:2c:d3:0f:a7:28:ab: ce:09:51:6f:18:ce:8b:09:5c:34:dd:e7:8c:8b:35:32: 34:b5:a0:e3:9a:9b:e2:0d:a7:94:38:da:ec:13:c5:81: d7:90:90:09:5a:d3:57:e4:4a:74:63:2f:19:4f:25:0b: c7:fc:79:08:cc:ca:70:e6:c7:b4:ac:6a:9c:2f:a2:2f: ea:ec:e2:ca:49:1b:64:0c:1c:dc:6f:3e:ff:2e:d7:b3 Fingerprint (SHA-256): 09:6F:12:D8:34:F2:75:68:88:D1:E7:88:8B:35:30:7E:74:E0:C0:AD:A4:C6:2C:38:A7:1E:7B:CC:17:44:F2:8D Fingerprint (SHA1): F7:C3:2E:B7:E1:A7:BF:1B:73:21:6B:30:D5:F6:66:88:E0:CD:DF:1D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #7392: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173425 (0x1957a1b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Apr 25 17:39:49 2016 Not After : Sun Apr 25 17:39:49 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:4e:fb:f7:81:ce:dc:a1:ab:d3:59:e3:da:f7:80:59: 2a:8c:c8:75:e4:e0:76:0a:fa:30:96:6a:1d:5c:b5:00: ff:2d:1f:1f:1d:a6:3d:39:f1:d9:c6:af:af:b6:0b:39: 92:d4:97:9e:3a:91:46:30:56:71:10:7d:b6:ba:6f:da: d9:f0:f1:23:d8:3d:97:65:40:85:a6:22:6f:ab:e3:af: 2b:89:6a:c3:c7:cc:bc:7c:35:1f:af:f3:52:a6:92:3d: b3:cb:36:e1:35:b7:2f:cb:6d:7b:2e:10:6d:d7:16:6d: 36:55:ba:2e:06:c5:2c:4c:e3:a4:5a:07:39:ff:a6:ff: 36:b4:d6:d8:e7:8f:ee:38:d8:de:a9:eb:fe:b9:6b:30: 94:12:ee:27:2e:54:5d:b2:8b:d0:bb:4c:33:eb:8f:a2: fb:c3:9d:9b:5b:7f:85:bb:f1:13:59:97:77:0a:78:a8: 97:5d:5e:d6:50:2c:b6:fb:d1:ca:10:2e:6f:36:69:de: 68:2a:ea:2b:51:3f:90:0a:b0:5c:ff:d2:7f:36:00:53: 32:3c:51:2f:42:38:1b:4c:b9:d6:59:28:e4:69:30:d7: cf:44:ec:a8:ae:75:6a:68:e8:83:d6:df:87:e1:ca:2b: 1e:57:ec:20:14:39:48:5c:7f:73:c1:7e:73:59:90:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:a4:68:95:9d:4a:38:9b:00:04:8b:74:a1:c9:5e:16: 3e:60:e1:8c:f9:e3:75:0d:8d:82:4c:27:91:be:7c:c4: d6:f4:67:6d:11:ec:67:68:c6:68:45:84:50:a5:ff:ee: 7d:1f:a1:cf:fd:3e:37:8e:c5:57:5f:ba:36:ee:97:94: 5a:3f:52:e3:a5:37:c4:1e:c4:e8:10:7e:e5:7e:98:a2: 9a:6e:32:7a:d8:14:db:44:31:a1:67:5f:3e:24:ce:71: c4:fe:b0:ea:06:d8:44:2b:fd:94:9f:c8:ce:ca:24:5f: da:df:ed:07:37:89:f2:ec:0f:48:42:5a:38:9b:a9:6a: c0:79:a3:6d:8c:64:c5:8c:69:05:06:02:f7:50:fa:20: 9d:62:5f:fa:48:93:c6:37:c8:7e:e8:9f:69:77:2c:aa: cd:8b:62:f8:b6:a6:74:ee:f6:ed:17:92:35:4b:40:f9: 0f:00:90:21:37:89:6f:78:65:2b:22:a4:62:8a:03:54: 4f:9b:44:e3:2e:32:6e:00:f2:6e:e1:79:69:d9:cd:97: 65:71:de:69:a8:63:6a:67:3e:a0:59:d9:6c:97:36:7b: f3:af:21:e2:b1:c2:91:7e:b7:ea:5f:86:bc:ac:4b:81: fb:c7:db:78:7c:20:d5:19:60:5a:8f:b5:29:b3:f4:80 Fingerprint (SHA-256): 6C:D4:81:B5:17:F4:D4:FC:CC:14:5D:E8:C7:70:79:1D:68:1B:A5:2D:A2:62:96:BB:3A:C8:26:C3:70:48:86:5E Fingerprint (SHA1): EC:0C:09:35:54:1A:FD:C9:5F:48:83:13:EC:20:5D:33:33:06:89:90 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #7393: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173426 (0x1957a1b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Apr 25 17:39:59 2016 Not After : Sun Apr 25 17:39:59 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:e7:9b:bb:44:7a:cb:da:84:62:9c:e2:96:e2:15:d8: 1f:f8:28:03:23:8e:e2:b3:c7:c1:ed:b5:c5:fb:b0:66: 07:d4:5e:3c:28:ef:ed:06:33:7e:f0:af:89:62:a3:6f: f5:08:19:e5:f5:1e:11:ba:6e:8b:91:13:79:b3:5c:87: c4:48:3e:93:6f:98:21:c9:df:0d:dc:bd:83:fd:10:88: ae:2a:a9:6f:53:6e:3d:b8:9e:76:6f:f1:46:b0:d0:ae: 26:51:62:3b:b7:49:c7:8e:66:e4:cf:a0:84:51:c4:d7: 7d:a6:52:41:6e:05:3f:ca:d9:76:43:d0:36:83:4e:6a: 89:37:4e:3a:ac:88:a9:d2:67:4a:13:c6:99:6d:1b:14: 90:39:eb:3d:ed:1f:35:f4:52:12:53:95:bf:9e:21:08: 9e:f0:5d:97:0e:3f:64:01:9b:5a:c6:4c:64:b2:be:42: d0:0e:72:44:14:22:65:34:d9:d1:e3:5c:a8:ce:3b:55: fe:4b:93:95:7e:70:3a:23:b9:02:fa:b4:fa:0b:38:e8: b3:89:d3:f2:5c:a1:92:27:28:10:33:c3:dd:6c:8c:df: dc:be:9f:a8:05:06:32:dd:af:d2:7c:02:53:d6:79:a3: 1e:91:a5:8f:6a:78:66:88:ef:2b:54:f5:1b:84:1b:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:f4:3a:8a:96:d1:9b:17:26:1a:0b:00:b0:f5:93:ae: 06:12:9d:53:fe:9e:73:d0:07:56:9d:cd:1d:3d:06:fd: d5:26:f8:46:73:73:86:3c:72:58:84:47:55:b7:48:51: c3:e5:3b:11:b7:86:f6:8a:8a:3f:a2:c2:80:a6:09:3a: 5d:56:c5:3c:31:cb:12:65:cc:d6:e0:4a:40:41:9f:4e: 70:ac:35:90:da:b4:ce:0e:7a:8d:7a:9a:1d:2a:a7:82: 03:84:85:6c:ea:27:95:c6:fe:2f:b1:d4:0d:14:5b:af: 15:47:f0:66:82:39:02:47:1a:10:c3:61:5b:46:d9:25: 27:69:ee:6d:57:dd:19:bb:c8:8d:07:a9:58:68:05:34: 5c:e8:43:df:e4:ab:d3:84:62:6a:02:c8:d5:b3:8c:0c: 6e:70:b4:1e:42:9c:c6:9c:41:f8:61:da:cb:90:a0:84: c7:ec:fc:5c:af:cf:07:ec:fe:c6:94:37:05:5a:2f:12: 0e:e2:65:7a:27:89:f4:e6:b8:4a:ea:82:75:13:7c:02: fe:4d:00:58:0c:89:3e:50:37:f0:3f:aa:78:06:63:55: a2:d4:3c:cb:9e:2e:de:ee:19:12:28:69:c1:74:9f:f4: 45:7e:86:d4:6d:8f:f0:65:02:45:ee:2b:4a:5c:b2:da Fingerprint (SHA-256): 7F:B2:0B:21:69:93:3B:F8:23:A5:36:1F:D7:67:29:B4:CE:60:35:0C:D6:82:BF:DD:BA:30:73:32:06:8A:63:DB Fingerprint (SHA1): 6F:D6:C9:A5:E3:EC:27:9A:41:90:1E:1F:23:89:36:E7:16:E1:40:8F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #7394: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173427 (0x1957a1b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Apr 25 17:40:20 2016 Not After : Sun Apr 25 17:40:20 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:0a:11:e4:62:e7:43:55:7c:2f:7b:9c:63:5a:08:e4: ff:1b:60:29:2f:b8:d4:b9:09:db:e1:9f:06:38:82:fa: c5:b5:48:be:18:b9:fd:bc:d0:b5:f2:cd:99:57:f0:f1: 4d:d8:3c:55:6e:e7:8e:66:d3:9f:82:82:b2:f7:9f:da: 3a:9a:ec:e6:c6:6b:ce:c5:b6:0c:28:b2:cb:a1:43:fe: 1c:2a:29:7b:89:ba:75:0d:ae:75:ed:bb:48:65:4b:03: ad:e8:32:be:b9:dd:35:82:1e:a6:66:d1:6a:ed:08:08: 23:08:56:d8:48:cb:1e:25:7d:02:02:5f:18:48:c9:94: ae:a0:a2:0c:41:a0:06:79:5d:1e:6f:75:4a:45:f0:e4: 19:8e:52:2f:b8:98:e1:a2:c9:9f:41:5c:cc:f1:ab:f3: f4:60:97:23:ec:0a:5e:e4:42:ac:5a:6d:aa:c1:dc:27: ca:03:78:36:97:ce:40:e1:40:dc:e9:36:ff:c6:28:fd: 20:5f:67:66:3c:d8:36:9e:f1:6e:0e:c3:cb:93:c4:e3: 4b:6b:7c:91:cd:7e:d9:3a:f2:0c:df:fb:cd:be:c5:1c: af:59:fa:2c:51:64:a2:7b:12:f1:ed:1f:49:57:f0:b6: 9c:98:1b:e4:fc:33:b3:1d:b5:ed:02:c8:c5:02:ad:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:9a:7d:b4:94:b4:ae:13:8f:82:99:77:06:16:ff:42: 25:61:5c:92:e2:ac:2c:4a:3f:99:0d:8e:13:fb:2d:0c: 90:de:65:29:66:7e:7e:c8:8c:33:98:39:e1:29:0a:4e: 13:7b:bf:40:30:a1:f1:b1:d8:84:46:d8:d8:52:78:39: e8:e2:71:7e:b0:46:6e:11:5f:c6:0c:40:af:a9:bc:4d: b3:20:45:d5:f0:24:0a:09:dc:37:4a:56:60:72:55:5b: d9:bb:11:f3:f4:7c:5a:07:88:f3:61:16:40:f6:86:f8: f5:91:c1:65:9e:ed:5a:d4:0b:6f:6f:af:9e:bc:b7:24: a2:6d:20:01:2f:c6:79:45:01:e1:11:c4:c9:95:2b:14: 85:37:bb:4a:f5:7f:c6:37:35:b1:b0:44:38:37:c5:3c: 88:34:c3:4a:43:a5:35:7c:88:09:f0:63:45:64:3f:c1: 7f:da:dc:4f:de:fb:8c:6f:0b:b0:06:f9:2a:32:a4:17: 76:f7:64:58:98:04:68:e4:8f:8e:8f:c1:56:19:dc:2b: 54:74:27:07:db:d6:c1:47:a3:e3:59:b5:0d:73:d6:2e: 77:72:8d:0d:fa:06:b8:cf:ae:24:41:13:13:27:a9:4d: d3:62:3e:e4:1a:8a:3e:9f:de:76:2c:60:e7:b4:51:38 Fingerprint (SHA-256): CF:FE:80:82:EF:7A:10:2C:C0:5A:1D:5E:C2:50:23:D0:6F:65:B9:E0:1F:70:36:BA:03:99:C2:AF:04:68:14:66 Fingerprint (SHA1): E5:E5:D0:8E:14:81:DC:96:36:8C:85:9A:71:10:04:87:CC:86:BA:06 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #7395: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173428 (0x1957a1b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Apr 25 17:40:28 2016 Not After : Sun Apr 25 17:40:28 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:a1:49:75:39:48:5d:4f:c9:32:8a:43:3a:35:08:03: 5a:00:60:b2:0b:68:28:06:c0:71:bb:65:3c:6c:90:29: af:48:bd:c0:7f:f8:94:de:1c:16:be:ff:1e:cc:d1:95: 55:24:e3:ee:d1:a7:59:71:46:69:b1:14:7d:01:11:f0: 28:bb:e0:9b:53:c6:44:85:12:84:b6:e2:02:02:ee:dc: 36:4f:b3:01:34:2e:eb:26:2a:42:09:3a:8c:11:6c:32: d3:4b:45:89:78:0f:2a:59:f8:14:34:1e:2a:52:67:c4: 86:87:e4:7e:4a:88:9a:f6:b9:1c:55:87:37:5a:42:fe: 4a:b4:e0:20:83:c1:c8:ec:f3:f1:1c:82:b2:85:54:16: 3d:32:c3:53:91:aa:85:fe:b1:0a:fe:1a:9a:fc:73:24: e2:60:f7:cf:c9:ad:ee:97:7f:36:42:4a:c9:18:43:86: 7e:ff:d4:de:52:73:5b:4f:92:9d:a6:76:00:a7:40:88: e6:47:99:16:66:8b:75:29:db:7c:5b:81:d5:84:5b:aa: 69:78:ae:d9:74:bf:53:fa:ae:c8:fb:ef:30:b7:d6:8c: 56:df:5d:96:16:52:b5:24:1d:c9:92:dc:4c:4f:71:c8: 5f:18:b0:5d:42:39:44:88:a5:c7:c0:5e:97:00:b1:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:ac:6e:b6:75:8f:45:36:e6:a1:15:82:59:14:33:e1: 89:71:b4:92:4a:b9:5f:b6:7b:f2:79:e2:f9:b8:48:2f: 1a:54:c7:ba:6d:b2:4c:f8:29:a4:ca:90:d0:fa:d6:91: ff:a2:44:f6:21:89:53:7b:37:dc:f9:ad:b0:78:d5:0c: a2:29:06:68:8d:03:67:34:51:ab:7d:27:72:f1:09:3f: d2:bd:4c:22:c1:2f:b6:fd:5c:6a:44:14:46:33:fd:9b: 76:cf:85:13:d4:ca:d4:34:b8:6c:95:49:78:35:a1:1f: 0e:fa:48:b5:39:7d:ea:7f:03:56:d3:e1:80:dc:96:7c: 0f:76:26:61:63:6a:c3:3b:07:bf:38:3c:2c:6e:18:90: 11:17:5c:a5:e6:34:60:33:01:1f:c5:35:30:c2:3f:40: 8a:5e:5d:7a:3c:41:3c:58:1d:6c:3f:83:cb:8b:9c:3b: 1c:70:2e:6f:eb:d7:7c:42:6d:e0:4f:92:0d:db:ef:6c: d0:2b:53:af:57:b3:bb:c0:4e:8d:11:2a:a7:23:cf:7d: 9a:7f:91:c3:f7:ba:95:d4:bb:2c:6d:7f:5b:79:99:4a: 01:52:4f:ed:68:0a:0e:4e:8c:ff:7b:44:2a:f3:66:be: f4:5f:c5:63:6d:55:2b:fa:88:e5:f0:56:24:53:07:54 Fingerprint (SHA-256): 38:DA:13:C7:3E:C6:16:8A:93:AD:BF:26:FF:E3:92:EE:67:A7:E6:38:74:1F:4E:69:BF:FF:9B:A1:37:03:B3:D2 Fingerprint (SHA1): CD:CC:99:45:84:B4:56:29:0F:31:74:68:20:C0:A1:02:B3:78:B1:7E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #7396: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7397: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173443 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7398: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7399: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7400: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7401: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173444 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7402: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7403: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7404: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7405: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173445 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7406: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7407: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7408: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7409: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425173446 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7410: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7411: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7412: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173443 (0x1957a1c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:41:55 2016 Not After : Sun Apr 25 17:41:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:5c:3f:26:5d:63:aa:76:4c:a3:2b:e1:3e:2a:6d:a8: 9b:52:bc:6f:2f:73:74:9c:df:d9:ba:6f:8e:eb:26:32: 34:04:4f:02:c5:b6:7d:94:76:62:ef:01:70:99:fa:7d: 6d:f6:f3:0e:9e:81:6d:56:fd:a3:e6:e5:a6:32:b4:65: 64:b5:51:a3:11:a5:bb:26:b9:6d:3c:e9:6a:d3:e7:86: 53:a4:df:eb:3f:9c:6d:a6:b9:3e:99:ba:80:6e:fd:fa: 51:27:fc:e9:41:ca:b1:ef:e8:6c:0b:c6:ca:87:1c:37: fc:d7:f3:d4:60:2b:32:bb:ed:86:a6:ed:5a:49:97:3f: 67:af:cf:7b:58:09:39:f2:d1:76:2e:9b:8a:c9:ae:6e: 2b:2e:38:8d:96:d8:10:57:77:84:71:8e:13:46:78:a7: ac:c1:70:0f:11:7e:ae:28:05:ff:93:d2:6f:8a:1c:49: d2:16:6b:63:83:37:b6:5c:53:0b:42:cb:03:a0:91:44: a0:51:a3:be:14:3d:5c:ff:75:dc:4d:e3:52:8e:c7:86: 6a:10:4d:41:6e:23:3f:e1:ae:4c:51:eb:7b:28:e8:07: 9e:c3:43:78:25:b3:62:9f:94:43:76:e5:d3:a6:99:0b: 70:dc:97:8c:aa:27:f7:69:1f:e8:f8:15:01:e5:a6:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:58:5e:52:b1:a4:ab:9c:2b:46:97:fc:2d:68:c1:b9: 15:fd:c7:e9:4d:7e:16:f5:13:b7:cd:d0:83:73:eb:cb: 6a:f7:ba:d6:1a:19:ec:28:bc:65:3b:a8:99:66:49:bb: be:b0:70:65:e5:07:62:93:45:e6:23:b3:c5:74:a1:e6: f1:a4:72:a9:12:d7:d2:a6:3e:e0:2f:90:e9:a0:1f:e6: 16:64:29:f9:ca:9c:4e:12:a7:bc:fc:c2:3c:20:3e:5b: 03:cb:69:5c:c5:ba:9a:67:b2:aa:8a:fb:73:11:1c:9c: 74:69:cc:65:d5:8d:e9:0c:c9:95:ba:b1:43:17:6b:68: c0:16:d9:06:82:7d:01:42:6f:7e:f2:04:5b:ca:dc:bc: 15:95:c0:12:60:89:da:d3:73:b6:08:2c:f8:48:17:7f: 89:35:30:20:98:e1:2c:5d:5a:76:27:ee:6a:3d:3a:ac: 48:25:4c:b5:13:60:2f:23:8c:a6:87:9e:bc:db:d1:96: 47:74:a3:bc:c4:70:49:37:0b:06:4f:c6:04:0e:02:b6: 78:df:10:9d:c9:c7:a4:91:7d:aa:d0:42:52:d2:c0:8c: dd:c3:cd:4e:79:90:e5:91:a1:7c:a9:58:1b:04:f1:82: f8:dd:90:ca:10:0a:c7:17:f3:db:7a:5f:24:3c:7f:c2 Fingerprint (SHA-256): 9E:A8:2E:CC:F8:6C:3C:9A:D1:8D:13:8F:7A:0A:9E:3E:42:DD:A7:D8:C2:05:19:27:12:91:FD:C7:5B:6D:83:D9 Fingerprint (SHA1): 59:78:D5:0D:0E:F1:94:68:EA:4E:FB:AC:45:28:20:BB:92:96:C9:46 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7413: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7414: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173444 (0x1957a1c4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:06 2016 Not After : Sun Apr 25 17:42:06 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bb:5d:7c:7a:52:34:ef:e8:75:d7:97:6b:8f:bc:a5: 2f:cb:e6:c8:56:cb:de:92:7a:80:98:a8:99:d5:b5:08: ef:2a:0a:52:b9:c7:71:9a:6c:9b:4c:5c:72:aa:c2:86: d0:c4:8e:4f:c3:fd:c3:1e:82:a8:36:5f:96:13:ef:c5: ad:9b:ae:49:4b:f4:83:25:32:68:b8:7b:91:83:49:fd: 86:e8:05:6d:94:fe:cd:86:2f:24:0a:74:5b:6b:03:cc: e8:7f:21:1d:99:58:fd:63:87:45:31:eb:e9:28:94:09: e3:73:f5:da:e5:fd:ad:7c:b4:a7:51:35:88:11:f0:df: e9:d5:79:74:68:af:0c:66:71:85:ce:e0:7b:88:6e:70: 0f:e3:a5:74:64:6e:e8:b1:0f:d1:e6:09:cb:57:fe:7c: 29:a6:ed:98:01:94:a3:89:41:c6:7f:15:5e:6c:4f:65: f3:7e:68:60:47:bb:f2:b9:cb:0d:70:aa:57:be:68:46: 1b:fb:51:e6:50:1e:35:22:3a:19:05:c1:2a:a6:02:2a: 93:91:69:d1:16:fd:82:3f:ed:73:6c:98:88:65:62:9c: fb:f2:d0:14:c2:5b:13:de:2a:96:11:ac:37:b9:48:98: 0f:90:8f:dd:3f:ce:f0:a2:32:ad:42:a5:5d:37:96:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:2d:6e:bb:7d:16:f4:73:3d:c4:46:40:6d:5f:be:7c: 85:e9:53:0f:15:5e:f7:7d:a2:e2:9a:6a:86:4c:e5:92: 95:5b:5c:0a:e9:21:cd:c9:b1:29:3a:b1:38:4d:03:1a: 5e:0e:31:78:4a:5d:18:f2:ee:6f:87:7d:56:38:51:0b: 70:46:7a:2d:a2:e8:b3:9d:c3:2f:d3:1f:56:99:92:60: 56:50:e6:f5:26:9a:5e:c3:66:54:f3:46:77:11:97:4d: a5:3b:64:8c:92:55:94:9f:85:92:af:21:61:97:7f:fe: 2c:62:c1:0c:c8:85:6f:1b:0f:15:95:5b:7a:85:15:c3: 5c:f4:37:10:5e:64:22:95:53:f0:f1:ce:d9:cb:83:80: cb:1a:a7:84:f9:2f:2c:00:92:0d:3e:56:47:b4:9e:67: a5:bc:e6:a3:12:cd:ba:86:ce:4d:dd:cf:e9:16:dd:83: 5a:35:4a:85:5b:f6:41:48:cc:16:f6:4b:cc:8d:cc:cf: 5f:2d:a9:69:0d:c6:e9:ff:5e:74:9c:c9:70:f3:17:f5: ac:92:d0:5b:13:45:24:6d:2b:ba:3a:e9:76:b9:71:20: c4:2a:d2:a8:92:95:24:a3:05:b2:11:56:79:87:80:59: a7:ad:83:15:dc:e5:d4:f9:76:e4:e1:72:e4:8e:02:c4 Fingerprint (SHA-256): D5:F7:E5:87:35:C6:62:C2:7C:22:BE:2E:52:5C:87:80:BE:AB:6F:CE:14:65:5E:5F:40:EB:F4:0B:95:6B:47:02 Fingerprint (SHA1): 6E:CC:DC:28:9B:0E:A1:80:CB:E9:C6:F5:E7:5E:C3:F2:22:D4:37:C8 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7415: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7416: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173445 (0x1957a1c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 17:42:15 2016 Not After : Sun Apr 25 17:42:15 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:64:4a:8c:00:69:19:7c:9f:cd:e9:2d:31:81:93:80: a6:28:b9:bd:ad:22:48:b4:a1:b0:60:d9:e3:9c:91:a8: 0c:5e:ef:ec:b3:41:c0:c7:ec:a7:7c:7c:26:df:b7:31: 6b:25:58:62:08:c2:61:53:82:9a:e0:d8:8b:e9:ab:ce: 2d:b9:d7:05:1f:cf:87:3a:dc:de:de:92:13:fc:48:ac: 41:df:53:fd:46:0a:44:dc:ff:7d:34:34:4e:49:11:2c: 2f:d3:17:53:2c:70:28:5f:c3:9b:46:81:e6:c3:8b:01: a8:43:aa:17:3f:d3:22:74:19:a0:5f:ce:2d:84:ad:dd: c4:da:dd:ad:fc:8b:d0:29:b1:11:9c:da:33:63:56:d5: de:24:b6:26:6f:9e:41:2b:90:0c:d9:57:a3:84:56:5a: 2a:3b:bb:e9:9e:a1:b5:45:68:76:22:8f:9d:68:66:58: b9:d4:3d:ac:67:e5:a1:e5:cb:ce:86:10:f9:5f:4d:0e: 73:e8:1c:0a:fc:2e:74:07:1d:47:ff:3e:d0:90:14:f1: bc:1d:54:13:67:1b:c8:56:5a:bf:47:db:23:13:7d:5c: ef:7a:ea:f5:6e:f7:11:84:b7:06:fe:75:81:1d:d3:11: c4:e1:b1:8b:d5:89:e4:1a:70:88:1f:0c:6c:a9:f9:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:49:0a:df:b7:99:c1:5b:c5:65:74:a1:8f:8d:15:21: dd:5e:1c:66:d3:d7:d9:17:da:e7:f3:a4:88:30:40:b6: 6e:b7:8f:7f:73:d9:09:2b:fd:ce:75:9d:ef:fe:95:1b: b2:e6:9d:09:df:b4:2f:00:75:6b:9c:0f:ef:7d:d2:e2: 9f:7f:a0:bb:fe:4a:aa:d0:c1:01:76:ca:1e:67:6c:83: 96:78:2b:4d:98:55:73:82:63:d0:97:8f:78:0e:18:e3: 2e:f3:e3:bd:be:56:30:4b:df:42:07:85:42:0a:b4:b9: 09:de:4c:24:b9:fb:d3:38:25:d1:a3:20:40:67:a9:0f: 61:e6:76:00:f8:84:e6:cb:12:db:57:9e:08:bd:36:91: 2f:7f:5c:62:95:30:ff:dd:db:6c:46:28:e5:48:5f:ec: 95:cf:6c:8d:e9:17:d1:1d:22:2a:15:f7:e5:bc:b8:ca: 40:28:cc:97:ad:4a:72:45:d7:3e:f2:0c:94:a9:fa:9e: c8:e4:e1:0d:58:0e:f3:81:b9:b2:31:ea:1e:ac:c9:cf: 9a:2d:44:55:12:31:25:04:ac:fd:4f:92:1f:43:ee:0e: 81:a2:6c:59:59:1d:64:76:70:b2:97:d0:e1:6e:62:4d: 39:23:df:d9:25:e4:90:1a:51:49:7d:dd:4b:9a:1f:ae Fingerprint (SHA-256): DC:68:A6:80:53:7B:1A:0E:99:A5:F1:DB:A0:78:D7:E4:CC:20:58:E2:CC:C1:3C:A9:EC:06:F7:A4:0E:CD:79:4E Fingerprint (SHA1): C1:15:5F:6C:3F:43:BF:BB:F4:86:23:7F:9D:87:CB:B5:FA:A6:0B:E1 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #7417: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7418: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7419: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7420: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7421: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173443 (0x1957a1c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:41:55 2016 Not After : Sun Apr 25 17:41:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:5c:3f:26:5d:63:aa:76:4c:a3:2b:e1:3e:2a:6d:a8: 9b:52:bc:6f:2f:73:74:9c:df:d9:ba:6f:8e:eb:26:32: 34:04:4f:02:c5:b6:7d:94:76:62:ef:01:70:99:fa:7d: 6d:f6:f3:0e:9e:81:6d:56:fd:a3:e6:e5:a6:32:b4:65: 64:b5:51:a3:11:a5:bb:26:b9:6d:3c:e9:6a:d3:e7:86: 53:a4:df:eb:3f:9c:6d:a6:b9:3e:99:ba:80:6e:fd:fa: 51:27:fc:e9:41:ca:b1:ef:e8:6c:0b:c6:ca:87:1c:37: fc:d7:f3:d4:60:2b:32:bb:ed:86:a6:ed:5a:49:97:3f: 67:af:cf:7b:58:09:39:f2:d1:76:2e:9b:8a:c9:ae:6e: 2b:2e:38:8d:96:d8:10:57:77:84:71:8e:13:46:78:a7: ac:c1:70:0f:11:7e:ae:28:05:ff:93:d2:6f:8a:1c:49: d2:16:6b:63:83:37:b6:5c:53:0b:42:cb:03:a0:91:44: a0:51:a3:be:14:3d:5c:ff:75:dc:4d:e3:52:8e:c7:86: 6a:10:4d:41:6e:23:3f:e1:ae:4c:51:eb:7b:28:e8:07: 9e:c3:43:78:25:b3:62:9f:94:43:76:e5:d3:a6:99:0b: 70:dc:97:8c:aa:27:f7:69:1f:e8:f8:15:01:e5:a6:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:58:5e:52:b1:a4:ab:9c:2b:46:97:fc:2d:68:c1:b9: 15:fd:c7:e9:4d:7e:16:f5:13:b7:cd:d0:83:73:eb:cb: 6a:f7:ba:d6:1a:19:ec:28:bc:65:3b:a8:99:66:49:bb: be:b0:70:65:e5:07:62:93:45:e6:23:b3:c5:74:a1:e6: f1:a4:72:a9:12:d7:d2:a6:3e:e0:2f:90:e9:a0:1f:e6: 16:64:29:f9:ca:9c:4e:12:a7:bc:fc:c2:3c:20:3e:5b: 03:cb:69:5c:c5:ba:9a:67:b2:aa:8a:fb:73:11:1c:9c: 74:69:cc:65:d5:8d:e9:0c:c9:95:ba:b1:43:17:6b:68: c0:16:d9:06:82:7d:01:42:6f:7e:f2:04:5b:ca:dc:bc: 15:95:c0:12:60:89:da:d3:73:b6:08:2c:f8:48:17:7f: 89:35:30:20:98:e1:2c:5d:5a:76:27:ee:6a:3d:3a:ac: 48:25:4c:b5:13:60:2f:23:8c:a6:87:9e:bc:db:d1:96: 47:74:a3:bc:c4:70:49:37:0b:06:4f:c6:04:0e:02:b6: 78:df:10:9d:c9:c7:a4:91:7d:aa:d0:42:52:d2:c0:8c: dd:c3:cd:4e:79:90:e5:91:a1:7c:a9:58:1b:04:f1:82: f8:dd:90:ca:10:0a:c7:17:f3:db:7a:5f:24:3c:7f:c2 Fingerprint (SHA-256): 9E:A8:2E:CC:F8:6C:3C:9A:D1:8D:13:8F:7A:0A:9E:3E:42:DD:A7:D8:C2:05:19:27:12:91:FD:C7:5B:6D:83:D9 Fingerprint (SHA1): 59:78:D5:0D:0E:F1:94:68:EA:4E:FB:AC:45:28:20:BB:92:96:C9:46 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7422: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7423: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173444 (0x1957a1c4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:06 2016 Not After : Sun Apr 25 17:42:06 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:bb:5d:7c:7a:52:34:ef:e8:75:d7:97:6b:8f:bc:a5: 2f:cb:e6:c8:56:cb:de:92:7a:80:98:a8:99:d5:b5:08: ef:2a:0a:52:b9:c7:71:9a:6c:9b:4c:5c:72:aa:c2:86: d0:c4:8e:4f:c3:fd:c3:1e:82:a8:36:5f:96:13:ef:c5: ad:9b:ae:49:4b:f4:83:25:32:68:b8:7b:91:83:49:fd: 86:e8:05:6d:94:fe:cd:86:2f:24:0a:74:5b:6b:03:cc: e8:7f:21:1d:99:58:fd:63:87:45:31:eb:e9:28:94:09: e3:73:f5:da:e5:fd:ad:7c:b4:a7:51:35:88:11:f0:df: e9:d5:79:74:68:af:0c:66:71:85:ce:e0:7b:88:6e:70: 0f:e3:a5:74:64:6e:e8:b1:0f:d1:e6:09:cb:57:fe:7c: 29:a6:ed:98:01:94:a3:89:41:c6:7f:15:5e:6c:4f:65: f3:7e:68:60:47:bb:f2:b9:cb:0d:70:aa:57:be:68:46: 1b:fb:51:e6:50:1e:35:22:3a:19:05:c1:2a:a6:02:2a: 93:91:69:d1:16:fd:82:3f:ed:73:6c:98:88:65:62:9c: fb:f2:d0:14:c2:5b:13:de:2a:96:11:ac:37:b9:48:98: 0f:90:8f:dd:3f:ce:f0:a2:32:ad:42:a5:5d:37:96:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:2d:6e:bb:7d:16:f4:73:3d:c4:46:40:6d:5f:be:7c: 85:e9:53:0f:15:5e:f7:7d:a2:e2:9a:6a:86:4c:e5:92: 95:5b:5c:0a:e9:21:cd:c9:b1:29:3a:b1:38:4d:03:1a: 5e:0e:31:78:4a:5d:18:f2:ee:6f:87:7d:56:38:51:0b: 70:46:7a:2d:a2:e8:b3:9d:c3:2f:d3:1f:56:99:92:60: 56:50:e6:f5:26:9a:5e:c3:66:54:f3:46:77:11:97:4d: a5:3b:64:8c:92:55:94:9f:85:92:af:21:61:97:7f:fe: 2c:62:c1:0c:c8:85:6f:1b:0f:15:95:5b:7a:85:15:c3: 5c:f4:37:10:5e:64:22:95:53:f0:f1:ce:d9:cb:83:80: cb:1a:a7:84:f9:2f:2c:00:92:0d:3e:56:47:b4:9e:67: a5:bc:e6:a3:12:cd:ba:86:ce:4d:dd:cf:e9:16:dd:83: 5a:35:4a:85:5b:f6:41:48:cc:16:f6:4b:cc:8d:cc:cf: 5f:2d:a9:69:0d:c6:e9:ff:5e:74:9c:c9:70:f3:17:f5: ac:92:d0:5b:13:45:24:6d:2b:ba:3a:e9:76:b9:71:20: c4:2a:d2:a8:92:95:24:a3:05:b2:11:56:79:87:80:59: a7:ad:83:15:dc:e5:d4:f9:76:e4:e1:72:e4:8e:02:c4 Fingerprint (SHA-256): D5:F7:E5:87:35:C6:62:C2:7C:22:BE:2E:52:5C:87:80:BE:AB:6F:CE:14:65:5E:5F:40:EB:F4:0B:95:6B:47:02 Fingerprint (SHA1): 6E:CC:DC:28:9B:0E:A1:80:CB:E9:C6:F5:E7:5E:C3:F2:22:D4:37:C8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7424: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7425: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173445 (0x1957a1c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 17:42:15 2016 Not After : Sun Apr 25 17:42:15 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:64:4a:8c:00:69:19:7c:9f:cd:e9:2d:31:81:93:80: a6:28:b9:bd:ad:22:48:b4:a1:b0:60:d9:e3:9c:91:a8: 0c:5e:ef:ec:b3:41:c0:c7:ec:a7:7c:7c:26:df:b7:31: 6b:25:58:62:08:c2:61:53:82:9a:e0:d8:8b:e9:ab:ce: 2d:b9:d7:05:1f:cf:87:3a:dc:de:de:92:13:fc:48:ac: 41:df:53:fd:46:0a:44:dc:ff:7d:34:34:4e:49:11:2c: 2f:d3:17:53:2c:70:28:5f:c3:9b:46:81:e6:c3:8b:01: a8:43:aa:17:3f:d3:22:74:19:a0:5f:ce:2d:84:ad:dd: c4:da:dd:ad:fc:8b:d0:29:b1:11:9c:da:33:63:56:d5: de:24:b6:26:6f:9e:41:2b:90:0c:d9:57:a3:84:56:5a: 2a:3b:bb:e9:9e:a1:b5:45:68:76:22:8f:9d:68:66:58: b9:d4:3d:ac:67:e5:a1:e5:cb:ce:86:10:f9:5f:4d:0e: 73:e8:1c:0a:fc:2e:74:07:1d:47:ff:3e:d0:90:14:f1: bc:1d:54:13:67:1b:c8:56:5a:bf:47:db:23:13:7d:5c: ef:7a:ea:f5:6e:f7:11:84:b7:06:fe:75:81:1d:d3:11: c4:e1:b1:8b:d5:89:e4:1a:70:88:1f:0c:6c:a9:f9:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:49:0a:df:b7:99:c1:5b:c5:65:74:a1:8f:8d:15:21: dd:5e:1c:66:d3:d7:d9:17:da:e7:f3:a4:88:30:40:b6: 6e:b7:8f:7f:73:d9:09:2b:fd:ce:75:9d:ef:fe:95:1b: b2:e6:9d:09:df:b4:2f:00:75:6b:9c:0f:ef:7d:d2:e2: 9f:7f:a0:bb:fe:4a:aa:d0:c1:01:76:ca:1e:67:6c:83: 96:78:2b:4d:98:55:73:82:63:d0:97:8f:78:0e:18:e3: 2e:f3:e3:bd:be:56:30:4b:df:42:07:85:42:0a:b4:b9: 09:de:4c:24:b9:fb:d3:38:25:d1:a3:20:40:67:a9:0f: 61:e6:76:00:f8:84:e6:cb:12:db:57:9e:08:bd:36:91: 2f:7f:5c:62:95:30:ff:dd:db:6c:46:28:e5:48:5f:ec: 95:cf:6c:8d:e9:17:d1:1d:22:2a:15:f7:e5:bc:b8:ca: 40:28:cc:97:ad:4a:72:45:d7:3e:f2:0c:94:a9:fa:9e: c8:e4:e1:0d:58:0e:f3:81:b9:b2:31:ea:1e:ac:c9:cf: 9a:2d:44:55:12:31:25:04:ac:fd:4f:92:1f:43:ee:0e: 81:a2:6c:59:59:1d:64:76:70:b2:97:d0:e1:6e:62:4d: 39:23:df:d9:25:e4:90:1a:51:49:7d:dd:4b:9a:1f:ae Fingerprint (SHA-256): DC:68:A6:80:53:7B:1A:0E:99:A5:F1:DB:A0:78:D7:E4:CC:20:58:E2:CC:C1:3C:A9:EC:06:F7:A4:0E:CD:79:4E Fingerprint (SHA1): C1:15:5F:6C:3F:43:BF:BB:F4:86:23:7F:9D:87:CB:B5:FA:A6:0B:E1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #7426: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7427: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7428: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173447 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7429: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7430: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7431: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7432: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173448 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7433: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7434: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7435: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7436: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173449 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7437: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7438: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #7439: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7440: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425173450 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7441: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7442: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #7443: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7444: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425173451 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7445: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7446: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7447: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173447 (0x1957a1c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:44 2016 Not After : Sun Apr 25 17:42:44 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:29:3b:f4:fa:50:9e:69:f0:97:ab:aa:75:09:2d:38: 4f:03:64:50:f8:1e:e3:c7:9e:ed:55:bf:6b:0b:5c:0e: b4:4d:35:f5:a3:ac:94:b7:ef:58:fb:54:22:df:64:56: cc:c5:46:b1:a0:af:5a:d4:e2:5a:ba:70:d4:d4:af:3a: 40:16:de:ea:b6:42:81:91:12:8f:26:c7:01:1c:dd:72: 15:ce:71:51:4f:1f:8e:46:a0:26:23:76:b3:48:7f:de: 8b:55:ff:f2:97:8a:de:db:d5:3f:b3:cb:27:da:91:66: 85:6d:92:e4:54:4d:b2:60:e7:45:b7:18:3f:c9:41:f5: fe:88:6f:92:1c:64:9e:71:11:a7:ba:7a:94:b1:f9:a6: 16:ed:02:fd:ec:c0:fc:62:35:bc:be:77:b1:09:0b:71: d3:62:ea:94:59:0c:1b:cd:4d:b0:31:89:6b:db:c9:1c: 1a:b7:c4:18:6f:fd:4d:6a:4b:e5:5a:39:e4:05:5d:e9: db:73:f2:e8:bc:3d:9b:ac:c2:3b:3c:f5:70:bd:c7:3e: bc:d9:47:a9:3d:19:48:7a:48:93:bf:21:05:f3:a5:de: 42:6b:0f:7b:5b:f0:16:16:d9:9c:c9:6f:22:bf:75:9a: c9:d0:ea:61:8b:af:3d:4a:7f:78:d1:25:cb:8b:0d:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:8f:1c:41:16:11:44:97:44:5b:6e:26:82:80:3f:57: fc:8d:a9:f8:e1:9f:9c:f8:bd:7c:a6:b8:20:59:6b:a4: 90:a2:88:91:bd:5b:53:14:5c:3f:3d:0a:34:64:ca:c0: e2:88:e6:e2:25:d1:ca:b5:d2:bb:a3:51:71:e1:a8:1d: 27:b3:6d:23:48:78:46:ad:de:b2:0b:bc:a0:0a:5f:ff: 40:15:a5:f4:0b:3e:46:2e:9b:75:98:e3:d9:d3:80:e6: e8:0e:1f:4b:db:c1:52:e4:b3:66:29:db:29:80:42:78: da:57:35:77:6c:35:5c:8b:1e:4b:fd:f6:8d:58:56:8e: c0:f6:02:e9:6f:fc:3e:fc:eb:e4:74:8a:c5:1c:13:7e: e5:38:09:46:1d:1a:29:4e:a3:70:0c:be:6f:9b:37:5c: 85:b8:d5:4d:bd:36:c3:2c:15:ad:48:4b:5e:56:d6:12: e1:d5:ed:fe:21:bb:7d:93:df:c2:f0:2e:3d:43:f8:67: e6:2a:15:45:29:5d:3c:f6:d5:62:e1:73:d7:83:7e:4b: 94:a5:6e:0d:0d:69:97:6d:7e:b6:19:72:c4:49:8a:7b: 00:cb:3e:a3:2a:0f:57:60:1e:f8:f8:46:89:21:86:34: b0:00:2a:32:af:b6:90:bc:e1:c5:9d:a4:f4:ca:13:ba Fingerprint (SHA-256): 27:D7:8A:E5:6A:2C:E7:92:4C:F8:D3:AD:3B:C6:28:B0:74:F8:4A:D0:1E:26:38:DB:F5:F8:E3:25:1C:28:1A:43 Fingerprint (SHA1): 37:6B:40:F9:81:23:59:4D:A6:DB:ED:B5:31:C4:FB:9A:19:85:45:43 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7448: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7449: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173448 (0x1957a1c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:56 2016 Not After : Sun Apr 25 17:42:56 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:72:8e:ef:2a:1f:19:4d:5f:c2:fd:05:6b:4b:e2:50: 53:2b:4c:c5:b3:9d:a5:75:7c:5b:77:83:c9:72:2f:8b: fb:1d:f7:4b:2f:4e:6c:af:34:fc:80:58:ba:70:de:3d: 7f:f2:19:ff:18:02:a0:c7:58:5d:9b:11:bb:27:a1:d0: 3d:26:b5:d7:71:6c:5d:bb:b6:01:81:8f:0e:10:01:87: 71:b8:29:7a:0d:39:fb:77:33:a0:bd:43:5e:89:bc:aa: 9a:fd:dd:81:88:44:7b:7b:d6:43:da:e7:57:ef:42:9d: 88:63:f0:23:a1:3e:20:f9:3a:b4:44:2d:e7:c1:59:cd: 96:a3:b2:80:a6:3a:3a:a6:6c:6f:f1:c4:25:0b:17:39: 11:de:5c:1e:33:93:ba:8d:48:3d:11:70:97:cc:09:7d: 9e:95:6e:1d:e3:63:12:7f:9c:16:0c:f6:6a:49:3e:09: 36:e6:fb:93:8a:f7:fd:d6:ec:da:c9:88:e2:70:87:20: b8:62:6f:67:ae:28:92:28:b7:37:33:c0:3c:18:51:e5: 17:e8:a4:32:37:ea:c8:67:a8:dc:5a:92:b0:82:a6:c4: 23:54:1f:96:e7:f2:67:e8:16:b7:82:d9:3c:1c:8b:e7: 24:27:d6:d9:bb:cf:81:55:7f:27:50:03:95:92:7e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:df:9f:4a:f3:b9:13:94:24:b3:29:64:b2:d6:f0:9e: 20:a7:42:fb:fa:3e:0c:01:10:b2:03:d4:94:0d:72:dd: 0f:81:ed:80:a6:8f:62:fd:b7:64:13:2c:60:20:3e:7b: 0b:04:83:0d:1b:e6:b3:c2:b6:ff:74:dd:1d:e5:0a:f4: 00:2e:9e:15:86:21:d0:34:9f:40:bf:d9:67:62:b0:44: 38:fd:ca:75:49:0e:56:b1:0b:dd:a1:fe:18:be:e5:bd: d4:56:ed:15:43:df:f6:78:ba:d0:37:ee:33:7b:e9:2f: b7:20:17:dc:6f:3a:6d:e8:72:8a:76:ee:ee:ee:e8:fd: 31:a0:23:07:a7:8d:37:a5:ce:81:25:2e:25:24:2e:de: 91:a9:b7:1a:28:2f:db:0a:20:9d:a4:13:82:4e:97:c1: 60:f7:37:64:9d:93:2a:85:65:72:42:b9:8f:5c:4c:de: 6a:61:58:a6:b0:5e:fb:5f:01:e5:47:16:e6:af:a4:44: 7c:5c:4a:07:23:74:6e:13:fd:0b:62:e0:e1:92:13:a5: 08:5b:9c:e1:25:f0:4c:95:ed:f9:05:a6:ff:ef:69:29: 7d:dc:65:dc:94:cd:92:83:1a:ce:48:cc:43:c8:dc:ba: c0:c5:1b:1d:43:6c:3d:cf:df:1d:e8:a9:94:a4:c1:b6 Fingerprint (SHA-256): 5A:35:F4:BF:D2:67:15:0E:6F:CB:C7:08:54:D4:D5:24:1E:BF:9E:9F:21:1F:A9:40:68:B1:E6:7D:67:5C:B0:12 Fingerprint (SHA1): EC:31:32:FA:04:84:DB:68:EE:03:C7:9B:3D:B7:E1:4A:31:80:D5:D7 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7450: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7451: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173449 (0x1957a1c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 17:43:05 2016 Not After : Sun Apr 25 17:43:05 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:ad:79:ec:a2:be:1b:90:47:1b:98:e4:e9:47:b9:83: 6d:57:88:fa:05:9a:0a:d1:50:14:b1:84:74:a7:3a:a4: ca:43:b0:e7:3a:7a:02:3e:fe:cd:e3:8f:b3:24:cb:46: fa:44:14:3d:0f:ce:92:b8:fa:05:d4:14:77:41:eb:ba: 47:af:b4:7a:2a:e3:d3:09:15:79:3e:e6:20:1e:85:39: fd:85:36:34:c9:21:15:a8:9e:dc:b8:7f:bc:0d:e0:0b: 38:7a:ff:fe:f0:8b:08:48:66:cb:f3:a5:9c:7d:eb:57: 79:71:6a:ea:2d:9b:30:f2:f1:ab:26:78:b0:d7:12:11: 63:cf:b6:c3:0d:38:2b:85:45:8e:c4:29:ac:8f:a0:92: 63:e8:b0:db:c6:49:20:ce:e6:0d:e8:ed:85:da:6f:40: 02:43:5c:f2:71:93:35:3a:80:78:0d:ad:56:b3:64:45: 07:77:52:0f:26:19:d5:6f:47:09:ee:90:2d:50:ad:b4: ec:43:21:dd:47:76:16:5f:26:99:79:52:87:f3:fa:dd: e4:6a:cf:81:07:e1:55:d7:36:49:d9:6d:ab:22:ac:0f: 91:ab:4f:0a:8c:34:d8:9d:1c:f6:ec:94:a1:4a:33:fb: 62:e1:09:92:7a:b8:c8:e6:3a:d4:47:9e:25:73:8a:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:c7:4b:64:4d:6e:61:86:a4:74:35:6a:82:e5:fa:44: f9:33:bc:37:a2:2c:ab:b4:cc:1f:6a:7e:a4:6f:63:be: 99:31:69:4a:35:40:ea:1b:2a:c5:81:df:df:9e:59:ac: 3f:db:a1:c6:da:4d:6b:37:0d:40:4c:84:14:52:13:d8: e4:7f:70:93:33:ea:b6:d9:ad:3b:5a:4a:f4:b9:ea:a9: f0:20:6b:74:de:c6:24:db:6d:6d:98:ee:5a:1a:f6:f7: 3c:ca:9d:1b:fd:bd:01:eb:5e:72:25:de:74:72:80:ea: b2:75:42:36:93:aa:2c:0e:e5:32:4c:84:95:9a:cd:61: 0a:fb:2b:54:d5:5c:f8:6e:77:64:70:99:34:b8:c8:a8: f8:49:70:97:ff:55:28:39:6b:31:fa:1b:44:ed:98:58: ed:a2:8d:62:94:77:bc:3d:92:70:31:ca:e0:50:68:e6: ed:66:00:cb:ad:ea:ca:cc:7f:7f:c8:49:cc:12:aa:07: c0:6d:c9:8c:40:44:b9:00:22:7a:47:a8:55:e2:35:60: b1:bd:a4:d3:2f:60:ff:07:b7:ea:8f:9c:b5:6f:25:78: ad:46:fa:15:4d:1a:a8:49:0c:90:91:e5:a1:a7:ee:03: 45:31:48:6e:d6:3c:75:1f:e6:9c:2b:85:ea:75:21:1c Fingerprint (SHA-256): 9D:3A:33:A6:10:D1:6F:9D:98:98:A3:80:39:1C:94:45:48:93:6F:3B:19:CF:4A:F8:94:C4:75:E4:5C:CC:1B:90 Fingerprint (SHA1): E6:77:29:95:AA:B3:C4:34:3D:BE:20:2E:52:8C:7F:C7:E6:FF:07:3A Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #7452: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7453: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7454: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7455: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7456: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173447 (0x1957a1c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:44 2016 Not After : Sun Apr 25 17:42:44 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:29:3b:f4:fa:50:9e:69:f0:97:ab:aa:75:09:2d:38: 4f:03:64:50:f8:1e:e3:c7:9e:ed:55:bf:6b:0b:5c:0e: b4:4d:35:f5:a3:ac:94:b7:ef:58:fb:54:22:df:64:56: cc:c5:46:b1:a0:af:5a:d4:e2:5a:ba:70:d4:d4:af:3a: 40:16:de:ea:b6:42:81:91:12:8f:26:c7:01:1c:dd:72: 15:ce:71:51:4f:1f:8e:46:a0:26:23:76:b3:48:7f:de: 8b:55:ff:f2:97:8a:de:db:d5:3f:b3:cb:27:da:91:66: 85:6d:92:e4:54:4d:b2:60:e7:45:b7:18:3f:c9:41:f5: fe:88:6f:92:1c:64:9e:71:11:a7:ba:7a:94:b1:f9:a6: 16:ed:02:fd:ec:c0:fc:62:35:bc:be:77:b1:09:0b:71: d3:62:ea:94:59:0c:1b:cd:4d:b0:31:89:6b:db:c9:1c: 1a:b7:c4:18:6f:fd:4d:6a:4b:e5:5a:39:e4:05:5d:e9: db:73:f2:e8:bc:3d:9b:ac:c2:3b:3c:f5:70:bd:c7:3e: bc:d9:47:a9:3d:19:48:7a:48:93:bf:21:05:f3:a5:de: 42:6b:0f:7b:5b:f0:16:16:d9:9c:c9:6f:22:bf:75:9a: c9:d0:ea:61:8b:af:3d:4a:7f:78:d1:25:cb:8b:0d:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:8f:1c:41:16:11:44:97:44:5b:6e:26:82:80:3f:57: fc:8d:a9:f8:e1:9f:9c:f8:bd:7c:a6:b8:20:59:6b:a4: 90:a2:88:91:bd:5b:53:14:5c:3f:3d:0a:34:64:ca:c0: e2:88:e6:e2:25:d1:ca:b5:d2:bb:a3:51:71:e1:a8:1d: 27:b3:6d:23:48:78:46:ad:de:b2:0b:bc:a0:0a:5f:ff: 40:15:a5:f4:0b:3e:46:2e:9b:75:98:e3:d9:d3:80:e6: e8:0e:1f:4b:db:c1:52:e4:b3:66:29:db:29:80:42:78: da:57:35:77:6c:35:5c:8b:1e:4b:fd:f6:8d:58:56:8e: c0:f6:02:e9:6f:fc:3e:fc:eb:e4:74:8a:c5:1c:13:7e: e5:38:09:46:1d:1a:29:4e:a3:70:0c:be:6f:9b:37:5c: 85:b8:d5:4d:bd:36:c3:2c:15:ad:48:4b:5e:56:d6:12: e1:d5:ed:fe:21:bb:7d:93:df:c2:f0:2e:3d:43:f8:67: e6:2a:15:45:29:5d:3c:f6:d5:62:e1:73:d7:83:7e:4b: 94:a5:6e:0d:0d:69:97:6d:7e:b6:19:72:c4:49:8a:7b: 00:cb:3e:a3:2a:0f:57:60:1e:f8:f8:46:89:21:86:34: b0:00:2a:32:af:b6:90:bc:e1:c5:9d:a4:f4:ca:13:ba Fingerprint (SHA-256): 27:D7:8A:E5:6A:2C:E7:92:4C:F8:D3:AD:3B:C6:28:B0:74:F8:4A:D0:1E:26:38:DB:F5:F8:E3:25:1C:28:1A:43 Fingerprint (SHA1): 37:6B:40:F9:81:23:59:4D:A6:DB:ED:B5:31:C4:FB:9A:19:85:45:43 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7457: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7458: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173448 (0x1957a1c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:56 2016 Not After : Sun Apr 25 17:42:56 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:72:8e:ef:2a:1f:19:4d:5f:c2:fd:05:6b:4b:e2:50: 53:2b:4c:c5:b3:9d:a5:75:7c:5b:77:83:c9:72:2f:8b: fb:1d:f7:4b:2f:4e:6c:af:34:fc:80:58:ba:70:de:3d: 7f:f2:19:ff:18:02:a0:c7:58:5d:9b:11:bb:27:a1:d0: 3d:26:b5:d7:71:6c:5d:bb:b6:01:81:8f:0e:10:01:87: 71:b8:29:7a:0d:39:fb:77:33:a0:bd:43:5e:89:bc:aa: 9a:fd:dd:81:88:44:7b:7b:d6:43:da:e7:57:ef:42:9d: 88:63:f0:23:a1:3e:20:f9:3a:b4:44:2d:e7:c1:59:cd: 96:a3:b2:80:a6:3a:3a:a6:6c:6f:f1:c4:25:0b:17:39: 11:de:5c:1e:33:93:ba:8d:48:3d:11:70:97:cc:09:7d: 9e:95:6e:1d:e3:63:12:7f:9c:16:0c:f6:6a:49:3e:09: 36:e6:fb:93:8a:f7:fd:d6:ec:da:c9:88:e2:70:87:20: b8:62:6f:67:ae:28:92:28:b7:37:33:c0:3c:18:51:e5: 17:e8:a4:32:37:ea:c8:67:a8:dc:5a:92:b0:82:a6:c4: 23:54:1f:96:e7:f2:67:e8:16:b7:82:d9:3c:1c:8b:e7: 24:27:d6:d9:bb:cf:81:55:7f:27:50:03:95:92:7e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:df:9f:4a:f3:b9:13:94:24:b3:29:64:b2:d6:f0:9e: 20:a7:42:fb:fa:3e:0c:01:10:b2:03:d4:94:0d:72:dd: 0f:81:ed:80:a6:8f:62:fd:b7:64:13:2c:60:20:3e:7b: 0b:04:83:0d:1b:e6:b3:c2:b6:ff:74:dd:1d:e5:0a:f4: 00:2e:9e:15:86:21:d0:34:9f:40:bf:d9:67:62:b0:44: 38:fd:ca:75:49:0e:56:b1:0b:dd:a1:fe:18:be:e5:bd: d4:56:ed:15:43:df:f6:78:ba:d0:37:ee:33:7b:e9:2f: b7:20:17:dc:6f:3a:6d:e8:72:8a:76:ee:ee:ee:e8:fd: 31:a0:23:07:a7:8d:37:a5:ce:81:25:2e:25:24:2e:de: 91:a9:b7:1a:28:2f:db:0a:20:9d:a4:13:82:4e:97:c1: 60:f7:37:64:9d:93:2a:85:65:72:42:b9:8f:5c:4c:de: 6a:61:58:a6:b0:5e:fb:5f:01:e5:47:16:e6:af:a4:44: 7c:5c:4a:07:23:74:6e:13:fd:0b:62:e0:e1:92:13:a5: 08:5b:9c:e1:25:f0:4c:95:ed:f9:05:a6:ff:ef:69:29: 7d:dc:65:dc:94:cd:92:83:1a:ce:48:cc:43:c8:dc:ba: c0:c5:1b:1d:43:6c:3d:cf:df:1d:e8:a9:94:a4:c1:b6 Fingerprint (SHA-256): 5A:35:F4:BF:D2:67:15:0E:6F:CB:C7:08:54:D4:D5:24:1E:BF:9E:9F:21:1F:A9:40:68:B1:E6:7D:67:5C:B0:12 Fingerprint (SHA1): EC:31:32:FA:04:84:DB:68:EE:03:C7:9B:3D:B7:E1:4A:31:80:D5:D7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7459: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7460: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173449 (0x1957a1c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 17:43:05 2016 Not After : Sun Apr 25 17:43:05 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:ad:79:ec:a2:be:1b:90:47:1b:98:e4:e9:47:b9:83: 6d:57:88:fa:05:9a:0a:d1:50:14:b1:84:74:a7:3a:a4: ca:43:b0:e7:3a:7a:02:3e:fe:cd:e3:8f:b3:24:cb:46: fa:44:14:3d:0f:ce:92:b8:fa:05:d4:14:77:41:eb:ba: 47:af:b4:7a:2a:e3:d3:09:15:79:3e:e6:20:1e:85:39: fd:85:36:34:c9:21:15:a8:9e:dc:b8:7f:bc:0d:e0:0b: 38:7a:ff:fe:f0:8b:08:48:66:cb:f3:a5:9c:7d:eb:57: 79:71:6a:ea:2d:9b:30:f2:f1:ab:26:78:b0:d7:12:11: 63:cf:b6:c3:0d:38:2b:85:45:8e:c4:29:ac:8f:a0:92: 63:e8:b0:db:c6:49:20:ce:e6:0d:e8:ed:85:da:6f:40: 02:43:5c:f2:71:93:35:3a:80:78:0d:ad:56:b3:64:45: 07:77:52:0f:26:19:d5:6f:47:09:ee:90:2d:50:ad:b4: ec:43:21:dd:47:76:16:5f:26:99:79:52:87:f3:fa:dd: e4:6a:cf:81:07:e1:55:d7:36:49:d9:6d:ab:22:ac:0f: 91:ab:4f:0a:8c:34:d8:9d:1c:f6:ec:94:a1:4a:33:fb: 62:e1:09:92:7a:b8:c8:e6:3a:d4:47:9e:25:73:8a:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:c7:4b:64:4d:6e:61:86:a4:74:35:6a:82:e5:fa:44: f9:33:bc:37:a2:2c:ab:b4:cc:1f:6a:7e:a4:6f:63:be: 99:31:69:4a:35:40:ea:1b:2a:c5:81:df:df:9e:59:ac: 3f:db:a1:c6:da:4d:6b:37:0d:40:4c:84:14:52:13:d8: e4:7f:70:93:33:ea:b6:d9:ad:3b:5a:4a:f4:b9:ea:a9: f0:20:6b:74:de:c6:24:db:6d:6d:98:ee:5a:1a:f6:f7: 3c:ca:9d:1b:fd:bd:01:eb:5e:72:25:de:74:72:80:ea: b2:75:42:36:93:aa:2c:0e:e5:32:4c:84:95:9a:cd:61: 0a:fb:2b:54:d5:5c:f8:6e:77:64:70:99:34:b8:c8:a8: f8:49:70:97:ff:55:28:39:6b:31:fa:1b:44:ed:98:58: ed:a2:8d:62:94:77:bc:3d:92:70:31:ca:e0:50:68:e6: ed:66:00:cb:ad:ea:ca:cc:7f:7f:c8:49:cc:12:aa:07: c0:6d:c9:8c:40:44:b9:00:22:7a:47:a8:55:e2:35:60: b1:bd:a4:d3:2f:60:ff:07:b7:ea:8f:9c:b5:6f:25:78: ad:46:fa:15:4d:1a:a8:49:0c:90:91:e5:a1:a7:ee:03: 45:31:48:6e:d6:3c:75:1f:e6:9c:2b:85:ea:75:21:1c Fingerprint (SHA-256): 9D:3A:33:A6:10:D1:6F:9D:98:98:A3:80:39:1C:94:45:48:93:6F:3B:19:CF:4A:F8:94:C4:75:E4:5C:CC:1B:90 Fingerprint (SHA1): E6:77:29:95:AA:B3:C4:34:3D:BE:20:2E:52:8C:7F:C7:E6:FF:07:3A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #7461: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7462: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173447 (0x1957a1c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:44 2016 Not After : Sun Apr 25 17:42:44 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:29:3b:f4:fa:50:9e:69:f0:97:ab:aa:75:09:2d:38: 4f:03:64:50:f8:1e:e3:c7:9e:ed:55:bf:6b:0b:5c:0e: b4:4d:35:f5:a3:ac:94:b7:ef:58:fb:54:22:df:64:56: cc:c5:46:b1:a0:af:5a:d4:e2:5a:ba:70:d4:d4:af:3a: 40:16:de:ea:b6:42:81:91:12:8f:26:c7:01:1c:dd:72: 15:ce:71:51:4f:1f:8e:46:a0:26:23:76:b3:48:7f:de: 8b:55:ff:f2:97:8a:de:db:d5:3f:b3:cb:27:da:91:66: 85:6d:92:e4:54:4d:b2:60:e7:45:b7:18:3f:c9:41:f5: fe:88:6f:92:1c:64:9e:71:11:a7:ba:7a:94:b1:f9:a6: 16:ed:02:fd:ec:c0:fc:62:35:bc:be:77:b1:09:0b:71: d3:62:ea:94:59:0c:1b:cd:4d:b0:31:89:6b:db:c9:1c: 1a:b7:c4:18:6f:fd:4d:6a:4b:e5:5a:39:e4:05:5d:e9: db:73:f2:e8:bc:3d:9b:ac:c2:3b:3c:f5:70:bd:c7:3e: bc:d9:47:a9:3d:19:48:7a:48:93:bf:21:05:f3:a5:de: 42:6b:0f:7b:5b:f0:16:16:d9:9c:c9:6f:22:bf:75:9a: c9:d0:ea:61:8b:af:3d:4a:7f:78:d1:25:cb:8b:0d:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:8f:1c:41:16:11:44:97:44:5b:6e:26:82:80:3f:57: fc:8d:a9:f8:e1:9f:9c:f8:bd:7c:a6:b8:20:59:6b:a4: 90:a2:88:91:bd:5b:53:14:5c:3f:3d:0a:34:64:ca:c0: e2:88:e6:e2:25:d1:ca:b5:d2:bb:a3:51:71:e1:a8:1d: 27:b3:6d:23:48:78:46:ad:de:b2:0b:bc:a0:0a:5f:ff: 40:15:a5:f4:0b:3e:46:2e:9b:75:98:e3:d9:d3:80:e6: e8:0e:1f:4b:db:c1:52:e4:b3:66:29:db:29:80:42:78: da:57:35:77:6c:35:5c:8b:1e:4b:fd:f6:8d:58:56:8e: c0:f6:02:e9:6f:fc:3e:fc:eb:e4:74:8a:c5:1c:13:7e: e5:38:09:46:1d:1a:29:4e:a3:70:0c:be:6f:9b:37:5c: 85:b8:d5:4d:bd:36:c3:2c:15:ad:48:4b:5e:56:d6:12: e1:d5:ed:fe:21:bb:7d:93:df:c2:f0:2e:3d:43:f8:67: e6:2a:15:45:29:5d:3c:f6:d5:62:e1:73:d7:83:7e:4b: 94:a5:6e:0d:0d:69:97:6d:7e:b6:19:72:c4:49:8a:7b: 00:cb:3e:a3:2a:0f:57:60:1e:f8:f8:46:89:21:86:34: b0:00:2a:32:af:b6:90:bc:e1:c5:9d:a4:f4:ca:13:ba Fingerprint (SHA-256): 27:D7:8A:E5:6A:2C:E7:92:4C:F8:D3:AD:3B:C6:28:B0:74:F8:4A:D0:1E:26:38:DB:F5:F8:E3:25:1C:28:1A:43 Fingerprint (SHA1): 37:6B:40:F9:81:23:59:4D:A6:DB:ED:B5:31:C4:FB:9A:19:85:45:43 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7463: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173447 (0x1957a1c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:44 2016 Not After : Sun Apr 25 17:42:44 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:29:3b:f4:fa:50:9e:69:f0:97:ab:aa:75:09:2d:38: 4f:03:64:50:f8:1e:e3:c7:9e:ed:55:bf:6b:0b:5c:0e: b4:4d:35:f5:a3:ac:94:b7:ef:58:fb:54:22:df:64:56: cc:c5:46:b1:a0:af:5a:d4:e2:5a:ba:70:d4:d4:af:3a: 40:16:de:ea:b6:42:81:91:12:8f:26:c7:01:1c:dd:72: 15:ce:71:51:4f:1f:8e:46:a0:26:23:76:b3:48:7f:de: 8b:55:ff:f2:97:8a:de:db:d5:3f:b3:cb:27:da:91:66: 85:6d:92:e4:54:4d:b2:60:e7:45:b7:18:3f:c9:41:f5: fe:88:6f:92:1c:64:9e:71:11:a7:ba:7a:94:b1:f9:a6: 16:ed:02:fd:ec:c0:fc:62:35:bc:be:77:b1:09:0b:71: d3:62:ea:94:59:0c:1b:cd:4d:b0:31:89:6b:db:c9:1c: 1a:b7:c4:18:6f:fd:4d:6a:4b:e5:5a:39:e4:05:5d:e9: db:73:f2:e8:bc:3d:9b:ac:c2:3b:3c:f5:70:bd:c7:3e: bc:d9:47:a9:3d:19:48:7a:48:93:bf:21:05:f3:a5:de: 42:6b:0f:7b:5b:f0:16:16:d9:9c:c9:6f:22:bf:75:9a: c9:d0:ea:61:8b:af:3d:4a:7f:78:d1:25:cb:8b:0d:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:8f:1c:41:16:11:44:97:44:5b:6e:26:82:80:3f:57: fc:8d:a9:f8:e1:9f:9c:f8:bd:7c:a6:b8:20:59:6b:a4: 90:a2:88:91:bd:5b:53:14:5c:3f:3d:0a:34:64:ca:c0: e2:88:e6:e2:25:d1:ca:b5:d2:bb:a3:51:71:e1:a8:1d: 27:b3:6d:23:48:78:46:ad:de:b2:0b:bc:a0:0a:5f:ff: 40:15:a5:f4:0b:3e:46:2e:9b:75:98:e3:d9:d3:80:e6: e8:0e:1f:4b:db:c1:52:e4:b3:66:29:db:29:80:42:78: da:57:35:77:6c:35:5c:8b:1e:4b:fd:f6:8d:58:56:8e: c0:f6:02:e9:6f:fc:3e:fc:eb:e4:74:8a:c5:1c:13:7e: e5:38:09:46:1d:1a:29:4e:a3:70:0c:be:6f:9b:37:5c: 85:b8:d5:4d:bd:36:c3:2c:15:ad:48:4b:5e:56:d6:12: e1:d5:ed:fe:21:bb:7d:93:df:c2:f0:2e:3d:43:f8:67: e6:2a:15:45:29:5d:3c:f6:d5:62:e1:73:d7:83:7e:4b: 94:a5:6e:0d:0d:69:97:6d:7e:b6:19:72:c4:49:8a:7b: 00:cb:3e:a3:2a:0f:57:60:1e:f8:f8:46:89:21:86:34: b0:00:2a:32:af:b6:90:bc:e1:c5:9d:a4:f4:ca:13:ba Fingerprint (SHA-256): 27:D7:8A:E5:6A:2C:E7:92:4C:F8:D3:AD:3B:C6:28:B0:74:F8:4A:D0:1E:26:38:DB:F5:F8:E3:25:1C:28:1A:43 Fingerprint (SHA1): 37:6B:40:F9:81:23:59:4D:A6:DB:ED:B5:31:C4:FB:9A:19:85:45:43 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7464: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173448 (0x1957a1c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:56 2016 Not After : Sun Apr 25 17:42:56 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:72:8e:ef:2a:1f:19:4d:5f:c2:fd:05:6b:4b:e2:50: 53:2b:4c:c5:b3:9d:a5:75:7c:5b:77:83:c9:72:2f:8b: fb:1d:f7:4b:2f:4e:6c:af:34:fc:80:58:ba:70:de:3d: 7f:f2:19:ff:18:02:a0:c7:58:5d:9b:11:bb:27:a1:d0: 3d:26:b5:d7:71:6c:5d:bb:b6:01:81:8f:0e:10:01:87: 71:b8:29:7a:0d:39:fb:77:33:a0:bd:43:5e:89:bc:aa: 9a:fd:dd:81:88:44:7b:7b:d6:43:da:e7:57:ef:42:9d: 88:63:f0:23:a1:3e:20:f9:3a:b4:44:2d:e7:c1:59:cd: 96:a3:b2:80:a6:3a:3a:a6:6c:6f:f1:c4:25:0b:17:39: 11:de:5c:1e:33:93:ba:8d:48:3d:11:70:97:cc:09:7d: 9e:95:6e:1d:e3:63:12:7f:9c:16:0c:f6:6a:49:3e:09: 36:e6:fb:93:8a:f7:fd:d6:ec:da:c9:88:e2:70:87:20: b8:62:6f:67:ae:28:92:28:b7:37:33:c0:3c:18:51:e5: 17:e8:a4:32:37:ea:c8:67:a8:dc:5a:92:b0:82:a6:c4: 23:54:1f:96:e7:f2:67:e8:16:b7:82:d9:3c:1c:8b:e7: 24:27:d6:d9:bb:cf:81:55:7f:27:50:03:95:92:7e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:df:9f:4a:f3:b9:13:94:24:b3:29:64:b2:d6:f0:9e: 20:a7:42:fb:fa:3e:0c:01:10:b2:03:d4:94:0d:72:dd: 0f:81:ed:80:a6:8f:62:fd:b7:64:13:2c:60:20:3e:7b: 0b:04:83:0d:1b:e6:b3:c2:b6:ff:74:dd:1d:e5:0a:f4: 00:2e:9e:15:86:21:d0:34:9f:40:bf:d9:67:62:b0:44: 38:fd:ca:75:49:0e:56:b1:0b:dd:a1:fe:18:be:e5:bd: d4:56:ed:15:43:df:f6:78:ba:d0:37:ee:33:7b:e9:2f: b7:20:17:dc:6f:3a:6d:e8:72:8a:76:ee:ee:ee:e8:fd: 31:a0:23:07:a7:8d:37:a5:ce:81:25:2e:25:24:2e:de: 91:a9:b7:1a:28:2f:db:0a:20:9d:a4:13:82:4e:97:c1: 60:f7:37:64:9d:93:2a:85:65:72:42:b9:8f:5c:4c:de: 6a:61:58:a6:b0:5e:fb:5f:01:e5:47:16:e6:af:a4:44: 7c:5c:4a:07:23:74:6e:13:fd:0b:62:e0:e1:92:13:a5: 08:5b:9c:e1:25:f0:4c:95:ed:f9:05:a6:ff:ef:69:29: 7d:dc:65:dc:94:cd:92:83:1a:ce:48:cc:43:c8:dc:ba: c0:c5:1b:1d:43:6c:3d:cf:df:1d:e8:a9:94:a4:c1:b6 Fingerprint (SHA-256): 5A:35:F4:BF:D2:67:15:0E:6F:CB:C7:08:54:D4:D5:24:1E:BF:9E:9F:21:1F:A9:40:68:B1:E6:7D:67:5C:B0:12 Fingerprint (SHA1): EC:31:32:FA:04:84:DB:68:EE:03:C7:9B:3D:B7:E1:4A:31:80:D5:D7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7465: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173448 (0x1957a1c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:42:56 2016 Not After : Sun Apr 25 17:42:56 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:72:8e:ef:2a:1f:19:4d:5f:c2:fd:05:6b:4b:e2:50: 53:2b:4c:c5:b3:9d:a5:75:7c:5b:77:83:c9:72:2f:8b: fb:1d:f7:4b:2f:4e:6c:af:34:fc:80:58:ba:70:de:3d: 7f:f2:19:ff:18:02:a0:c7:58:5d:9b:11:bb:27:a1:d0: 3d:26:b5:d7:71:6c:5d:bb:b6:01:81:8f:0e:10:01:87: 71:b8:29:7a:0d:39:fb:77:33:a0:bd:43:5e:89:bc:aa: 9a:fd:dd:81:88:44:7b:7b:d6:43:da:e7:57:ef:42:9d: 88:63:f0:23:a1:3e:20:f9:3a:b4:44:2d:e7:c1:59:cd: 96:a3:b2:80:a6:3a:3a:a6:6c:6f:f1:c4:25:0b:17:39: 11:de:5c:1e:33:93:ba:8d:48:3d:11:70:97:cc:09:7d: 9e:95:6e:1d:e3:63:12:7f:9c:16:0c:f6:6a:49:3e:09: 36:e6:fb:93:8a:f7:fd:d6:ec:da:c9:88:e2:70:87:20: b8:62:6f:67:ae:28:92:28:b7:37:33:c0:3c:18:51:e5: 17:e8:a4:32:37:ea:c8:67:a8:dc:5a:92:b0:82:a6:c4: 23:54:1f:96:e7:f2:67:e8:16:b7:82:d9:3c:1c:8b:e7: 24:27:d6:d9:bb:cf:81:55:7f:27:50:03:95:92:7e:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:df:9f:4a:f3:b9:13:94:24:b3:29:64:b2:d6:f0:9e: 20:a7:42:fb:fa:3e:0c:01:10:b2:03:d4:94:0d:72:dd: 0f:81:ed:80:a6:8f:62:fd:b7:64:13:2c:60:20:3e:7b: 0b:04:83:0d:1b:e6:b3:c2:b6:ff:74:dd:1d:e5:0a:f4: 00:2e:9e:15:86:21:d0:34:9f:40:bf:d9:67:62:b0:44: 38:fd:ca:75:49:0e:56:b1:0b:dd:a1:fe:18:be:e5:bd: d4:56:ed:15:43:df:f6:78:ba:d0:37:ee:33:7b:e9:2f: b7:20:17:dc:6f:3a:6d:e8:72:8a:76:ee:ee:ee:e8:fd: 31:a0:23:07:a7:8d:37:a5:ce:81:25:2e:25:24:2e:de: 91:a9:b7:1a:28:2f:db:0a:20:9d:a4:13:82:4e:97:c1: 60:f7:37:64:9d:93:2a:85:65:72:42:b9:8f:5c:4c:de: 6a:61:58:a6:b0:5e:fb:5f:01:e5:47:16:e6:af:a4:44: 7c:5c:4a:07:23:74:6e:13:fd:0b:62:e0:e1:92:13:a5: 08:5b:9c:e1:25:f0:4c:95:ed:f9:05:a6:ff:ef:69:29: 7d:dc:65:dc:94:cd:92:83:1a:ce:48:cc:43:c8:dc:ba: c0:c5:1b:1d:43:6c:3d:cf:df:1d:e8:a9:94:a4:c1:b6 Fingerprint (SHA-256): 5A:35:F4:BF:D2:67:15:0E:6F:CB:C7:08:54:D4:D5:24:1E:BF:9E:9F:21:1F:A9:40:68:B1:E6:7D:67:5C:B0:12 Fingerprint (SHA1): EC:31:32:FA:04:84:DB:68:EE:03:C7:9B:3D:B7:E1:4A:31:80:D5:D7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7466: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173449 (0x1957a1c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 17:43:05 2016 Not After : Sun Apr 25 17:43:05 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:ad:79:ec:a2:be:1b:90:47:1b:98:e4:e9:47:b9:83: 6d:57:88:fa:05:9a:0a:d1:50:14:b1:84:74:a7:3a:a4: ca:43:b0:e7:3a:7a:02:3e:fe:cd:e3:8f:b3:24:cb:46: fa:44:14:3d:0f:ce:92:b8:fa:05:d4:14:77:41:eb:ba: 47:af:b4:7a:2a:e3:d3:09:15:79:3e:e6:20:1e:85:39: fd:85:36:34:c9:21:15:a8:9e:dc:b8:7f:bc:0d:e0:0b: 38:7a:ff:fe:f0:8b:08:48:66:cb:f3:a5:9c:7d:eb:57: 79:71:6a:ea:2d:9b:30:f2:f1:ab:26:78:b0:d7:12:11: 63:cf:b6:c3:0d:38:2b:85:45:8e:c4:29:ac:8f:a0:92: 63:e8:b0:db:c6:49:20:ce:e6:0d:e8:ed:85:da:6f:40: 02:43:5c:f2:71:93:35:3a:80:78:0d:ad:56:b3:64:45: 07:77:52:0f:26:19:d5:6f:47:09:ee:90:2d:50:ad:b4: ec:43:21:dd:47:76:16:5f:26:99:79:52:87:f3:fa:dd: e4:6a:cf:81:07:e1:55:d7:36:49:d9:6d:ab:22:ac:0f: 91:ab:4f:0a:8c:34:d8:9d:1c:f6:ec:94:a1:4a:33:fb: 62:e1:09:92:7a:b8:c8:e6:3a:d4:47:9e:25:73:8a:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:c7:4b:64:4d:6e:61:86:a4:74:35:6a:82:e5:fa:44: f9:33:bc:37:a2:2c:ab:b4:cc:1f:6a:7e:a4:6f:63:be: 99:31:69:4a:35:40:ea:1b:2a:c5:81:df:df:9e:59:ac: 3f:db:a1:c6:da:4d:6b:37:0d:40:4c:84:14:52:13:d8: e4:7f:70:93:33:ea:b6:d9:ad:3b:5a:4a:f4:b9:ea:a9: f0:20:6b:74:de:c6:24:db:6d:6d:98:ee:5a:1a:f6:f7: 3c:ca:9d:1b:fd:bd:01:eb:5e:72:25:de:74:72:80:ea: b2:75:42:36:93:aa:2c:0e:e5:32:4c:84:95:9a:cd:61: 0a:fb:2b:54:d5:5c:f8:6e:77:64:70:99:34:b8:c8:a8: f8:49:70:97:ff:55:28:39:6b:31:fa:1b:44:ed:98:58: ed:a2:8d:62:94:77:bc:3d:92:70:31:ca:e0:50:68:e6: ed:66:00:cb:ad:ea:ca:cc:7f:7f:c8:49:cc:12:aa:07: c0:6d:c9:8c:40:44:b9:00:22:7a:47:a8:55:e2:35:60: b1:bd:a4:d3:2f:60:ff:07:b7:ea:8f:9c:b5:6f:25:78: ad:46:fa:15:4d:1a:a8:49:0c:90:91:e5:a1:a7:ee:03: 45:31:48:6e:d6:3c:75:1f:e6:9c:2b:85:ea:75:21:1c Fingerprint (SHA-256): 9D:3A:33:A6:10:D1:6F:9D:98:98:A3:80:39:1C:94:45:48:93:6F:3B:19:CF:4A:F8:94:C4:75:E4:5C:CC:1B:90 Fingerprint (SHA1): E6:77:29:95:AA:B3:C4:34:3D:BE:20:2E:52:8C:7F:C7:E6:FF:07:3A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #7467: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173449 (0x1957a1c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 17:43:05 2016 Not After : Sun Apr 25 17:43:05 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:ad:79:ec:a2:be:1b:90:47:1b:98:e4:e9:47:b9:83: 6d:57:88:fa:05:9a:0a:d1:50:14:b1:84:74:a7:3a:a4: ca:43:b0:e7:3a:7a:02:3e:fe:cd:e3:8f:b3:24:cb:46: fa:44:14:3d:0f:ce:92:b8:fa:05:d4:14:77:41:eb:ba: 47:af:b4:7a:2a:e3:d3:09:15:79:3e:e6:20:1e:85:39: fd:85:36:34:c9:21:15:a8:9e:dc:b8:7f:bc:0d:e0:0b: 38:7a:ff:fe:f0:8b:08:48:66:cb:f3:a5:9c:7d:eb:57: 79:71:6a:ea:2d:9b:30:f2:f1:ab:26:78:b0:d7:12:11: 63:cf:b6:c3:0d:38:2b:85:45:8e:c4:29:ac:8f:a0:92: 63:e8:b0:db:c6:49:20:ce:e6:0d:e8:ed:85:da:6f:40: 02:43:5c:f2:71:93:35:3a:80:78:0d:ad:56:b3:64:45: 07:77:52:0f:26:19:d5:6f:47:09:ee:90:2d:50:ad:b4: ec:43:21:dd:47:76:16:5f:26:99:79:52:87:f3:fa:dd: e4:6a:cf:81:07:e1:55:d7:36:49:d9:6d:ab:22:ac:0f: 91:ab:4f:0a:8c:34:d8:9d:1c:f6:ec:94:a1:4a:33:fb: 62:e1:09:92:7a:b8:c8:e6:3a:d4:47:9e:25:73:8a:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:c7:4b:64:4d:6e:61:86:a4:74:35:6a:82:e5:fa:44: f9:33:bc:37:a2:2c:ab:b4:cc:1f:6a:7e:a4:6f:63:be: 99:31:69:4a:35:40:ea:1b:2a:c5:81:df:df:9e:59:ac: 3f:db:a1:c6:da:4d:6b:37:0d:40:4c:84:14:52:13:d8: e4:7f:70:93:33:ea:b6:d9:ad:3b:5a:4a:f4:b9:ea:a9: f0:20:6b:74:de:c6:24:db:6d:6d:98:ee:5a:1a:f6:f7: 3c:ca:9d:1b:fd:bd:01:eb:5e:72:25:de:74:72:80:ea: b2:75:42:36:93:aa:2c:0e:e5:32:4c:84:95:9a:cd:61: 0a:fb:2b:54:d5:5c:f8:6e:77:64:70:99:34:b8:c8:a8: f8:49:70:97:ff:55:28:39:6b:31:fa:1b:44:ed:98:58: ed:a2:8d:62:94:77:bc:3d:92:70:31:ca:e0:50:68:e6: ed:66:00:cb:ad:ea:ca:cc:7f:7f:c8:49:cc:12:aa:07: c0:6d:c9:8c:40:44:b9:00:22:7a:47:a8:55:e2:35:60: b1:bd:a4:d3:2f:60:ff:07:b7:ea:8f:9c:b5:6f:25:78: ad:46:fa:15:4d:1a:a8:49:0c:90:91:e5:a1:a7:ee:03: 45:31:48:6e:d6:3c:75:1f:e6:9c:2b:85:ea:75:21:1c Fingerprint (SHA-256): 9D:3A:33:A6:10:D1:6F:9D:98:98:A3:80:39:1C:94:45:48:93:6F:3B:19:CF:4A:F8:94:C4:75:E4:5C:CC:1B:90 Fingerprint (SHA1): E6:77:29:95:AA:B3:C4:34:3D:BE:20:2E:52:8C:7F:C7:E6:FF:07:3A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #7468: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #7469: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173452 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7470: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #7471: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7472: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7473: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425173453 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7474: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7475: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7476: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7477: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173454 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7478: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7479: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #7480: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7481: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 425173455 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7482: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7483: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #7484: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7485: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425173456 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7486: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7487: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #7488: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7489: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425173457 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7490: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7491: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #7492: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7493: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 425173458 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7494: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7495: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7496: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #7497: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #7498: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7499: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #7500: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173452 (0x1957a1cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:43:46 2016 Not After : Sun Apr 25 17:43:46 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:7b:97:c3:bf:e9:21:b5:0f:40:ef:5d:b2:d2:58:b9: c8:4c:14:20:a3:b8:9a:33:eb:30:7d:24:9d:61:95:f8: 13:e0:7b:42:04:5e:16:dc:7b:3f:11:69:b0:9a:69:9b: 7d:df:72:c5:b9:7d:2a:cf:99:29:8e:7c:6e:a6:d4:1a: e8:f1:c1:2e:84:13:6d:9c:e2:27:0e:f6:0c:54:be:db: bd:3b:ee:ea:3e:65:5c:e5:b5:11:08:36:ee:6a:da:17: d7:08:23:68:fe:13:5d:3d:d3:14:88:fc:0c:31:ce:61: 03:87:c1:c3:92:84:e4:14:53:4a:71:db:18:49:10:5f: ad:68:05:26:d8:90:40:fa:43:2e:81:e7:e1:66:c1:be: d8:c2:76:1c:b7:95:5d:0f:9c:3f:b0:9f:1b:d0:15:f2: 99:e7:be:ac:63:5e:db:1f:f0:1f:3a:5e:ec:ab:51:51: 6c:4e:f8:67:0c:7c:b1:87:73:d8:b7:1d:a4:e3:dd:c0: bf:ae:27:ab:89:42:e3:92:c3:7d:b6:93:55:74:f6:c6: 47:89:26:f2:39:b6:d8:e2:d4:a4:38:da:c2:55:50:e2: 92:8a:f6:28:54:72:15:41:d7:27:9b:0e:b2:87:fd:45: 90:16:d2:7b:5b:b4:67:1b:8c:b4:81:60:15:a4:fe:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:5b:23:fc:59:80:c4:10:3f:e6:ea:46:65:fd:1d:fb: 8a:ba:69:93:3f:5e:57:9a:7e:b4:9b:ba:14:b8:0a:98: d4:a0:b5:5c:dd:37:2f:57:bf:f2:68:5a:7d:61:73:e1: d8:68:1d:55:8d:e7:52:cd:f8:01:9d:ca:ab:3b:a7:1c: 1d:82:32:1d:e3:ee:fa:09:67:c3:ea:bb:09:75:d0:ad: 0d:e8:4f:33:51:46:69:94:64:8f:40:81:8b:d1:7a:13: 42:ec:a7:04:7e:31:d3:47:bc:6d:e4:74:3f:c1:0b:2d: e3:49:0d:51:4d:a9:cb:9e:26:d2:99:e6:bf:be:57:7c: b5:10:18:06:7f:40:12:1b:5d:28:99:4d:38:cd:81:da: c1:31:4f:76:73:71:92:38:7e:ff:d5:48:f5:82:a8:c8: 20:36:7f:43:38:3c:c5:7d:05:8d:d3:e2:be:ea:65:87: 31:85:4f:0e:19:fc:b6:13:21:31:b5:5c:d1:ef:bf:e5: f8:5b:05:da:57:c8:13:22:29:c0:dc:8d:2f:e3:93:dc: 72:33:84:03:b2:fb:cf:11:e2:9e:dd:64:d4:5f:b6:fe: a1:38:80:27:ad:54:ec:10:7b:c5:c2:82:53:dc:ac:c8: c3:5b:82:7d:ef:41:ff:d1:3f:66:34:67:89:85:cc:65 Fingerprint (SHA-256): 45:F2:2C:DC:D8:07:25:CF:EA:28:C3:24:75:E9:7B:BB:DE:05:7E:C8:EE:3C:CC:ED:FE:C8:A5:0A:B0:EC:DE:04 Fingerprint (SHA1): 47:20:20:A1:C0:0A:62:96:88:E4:83:41:1B:CB:E5:A5:3D:B1:36:96 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7501: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7502: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7503: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7504: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173452 (0x1957a1cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:43:46 2016 Not After : Sun Apr 25 17:43:46 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:7b:97:c3:bf:e9:21:b5:0f:40:ef:5d:b2:d2:58:b9: c8:4c:14:20:a3:b8:9a:33:eb:30:7d:24:9d:61:95:f8: 13:e0:7b:42:04:5e:16:dc:7b:3f:11:69:b0:9a:69:9b: 7d:df:72:c5:b9:7d:2a:cf:99:29:8e:7c:6e:a6:d4:1a: e8:f1:c1:2e:84:13:6d:9c:e2:27:0e:f6:0c:54:be:db: bd:3b:ee:ea:3e:65:5c:e5:b5:11:08:36:ee:6a:da:17: d7:08:23:68:fe:13:5d:3d:d3:14:88:fc:0c:31:ce:61: 03:87:c1:c3:92:84:e4:14:53:4a:71:db:18:49:10:5f: ad:68:05:26:d8:90:40:fa:43:2e:81:e7:e1:66:c1:be: d8:c2:76:1c:b7:95:5d:0f:9c:3f:b0:9f:1b:d0:15:f2: 99:e7:be:ac:63:5e:db:1f:f0:1f:3a:5e:ec:ab:51:51: 6c:4e:f8:67:0c:7c:b1:87:73:d8:b7:1d:a4:e3:dd:c0: bf:ae:27:ab:89:42:e3:92:c3:7d:b6:93:55:74:f6:c6: 47:89:26:f2:39:b6:d8:e2:d4:a4:38:da:c2:55:50:e2: 92:8a:f6:28:54:72:15:41:d7:27:9b:0e:b2:87:fd:45: 90:16:d2:7b:5b:b4:67:1b:8c:b4:81:60:15:a4:fe:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:5b:23:fc:59:80:c4:10:3f:e6:ea:46:65:fd:1d:fb: 8a:ba:69:93:3f:5e:57:9a:7e:b4:9b:ba:14:b8:0a:98: d4:a0:b5:5c:dd:37:2f:57:bf:f2:68:5a:7d:61:73:e1: d8:68:1d:55:8d:e7:52:cd:f8:01:9d:ca:ab:3b:a7:1c: 1d:82:32:1d:e3:ee:fa:09:67:c3:ea:bb:09:75:d0:ad: 0d:e8:4f:33:51:46:69:94:64:8f:40:81:8b:d1:7a:13: 42:ec:a7:04:7e:31:d3:47:bc:6d:e4:74:3f:c1:0b:2d: e3:49:0d:51:4d:a9:cb:9e:26:d2:99:e6:bf:be:57:7c: b5:10:18:06:7f:40:12:1b:5d:28:99:4d:38:cd:81:da: c1:31:4f:76:73:71:92:38:7e:ff:d5:48:f5:82:a8:c8: 20:36:7f:43:38:3c:c5:7d:05:8d:d3:e2:be:ea:65:87: 31:85:4f:0e:19:fc:b6:13:21:31:b5:5c:d1:ef:bf:e5: f8:5b:05:da:57:c8:13:22:29:c0:dc:8d:2f:e3:93:dc: 72:33:84:03:b2:fb:cf:11:e2:9e:dd:64:d4:5f:b6:fe: a1:38:80:27:ad:54:ec:10:7b:c5:c2:82:53:dc:ac:c8: c3:5b:82:7d:ef:41:ff:d1:3f:66:34:67:89:85:cc:65 Fingerprint (SHA-256): 45:F2:2C:DC:D8:07:25:CF:EA:28:C3:24:75:E9:7B:BB:DE:05:7E:C8:EE:3C:CC:ED:FE:C8:A5:0A:B0:EC:DE:04 Fingerprint (SHA1): 47:20:20:A1:C0:0A:62:96:88:E4:83:41:1B:CB:E5:A5:3D:B1:36:96 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7505: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7506: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #7507: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173459 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7508: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #7509: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7510: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7511: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425173460 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7512: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7513: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #7514: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7515: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 425173461 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7516: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7517: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #7518: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7519: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 425173462 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7520: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7521: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7522: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7523: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 425173463 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7524: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7525: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #7526: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7527: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 425173464 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7528: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7529: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #7530: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7531: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 425173465 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7532: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7533: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7534: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7535: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 425173466 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7536: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7537: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #7538: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7539: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 425173467 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7540: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7541: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #7542: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7543: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 425173468 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7544: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7545: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #7546: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7547: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 425173469 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7548: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7549: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #7550: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7551: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 425173470 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7552: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7553: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #7554: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7555: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 425173471 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7556: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7557: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #7558: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7559: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 425173472 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7560: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7561: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #7562: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7563: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 425173473 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7564: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7565: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #7566: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7567: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 425173474 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7568: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7569: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #7570: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7571: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 425173475 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7572: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7573: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #7574: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7575: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 425173476 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #7576: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7577: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #7578: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7579: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 425173477 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7580: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7581: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #7582: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7583: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 425173478 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7584: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7585: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #7586: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7587: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 425173479 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7588: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7589: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #7590: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7591: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 425173480 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7592: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7593: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #7594: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7595: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 425173481 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7596: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7597: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #7598: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7599: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 425173482 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7600: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7601: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #7602: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7603: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 425173483 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7604: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7605: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #7606: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7607: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 425173484 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7608: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7609: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #7610: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7611: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 425173485 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7612: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7613: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #7614: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7615: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 425173486 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7616: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7617: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #7618: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7619: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 425173487 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7620: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7621: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #7622: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7623: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 425173488 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7624: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7625: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7626: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7627: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7628: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7629: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7630: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7631: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7632: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7633: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7634: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7635: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7636: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7637: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7638: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7639: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7640: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7641: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7642: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7643: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7644: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7645: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7646: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7647: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7648: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173459 (0x1957a1d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 17:44:51 2016 Not After : Sun Apr 25 17:44:51 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:c0:5d:ca:15:72:23:23:47:d4:20:e0:c8:d6:e2:40: b6:3c:81:09:95:a9:65:81:94:bc:f5:d2:48:ae:e9:26: 98:c1:57:5b:aa:ea:c0:b9:71:84:82:93:9d:7c:e2:8b: 9f:da:54:9b:5f:ed:67:5d:97:e8:df:b0:e9:c5:b1:d9: 89:3c:af:48:9f:13:fe:ea:f8:91:51:a8:5d:5b:31:e4: ac:8b:69:48:d8:c9:70:73:ea:a0:e2:72:0f:f0:ce:9a: d1:4c:01:25:57:ee:a9:81:b2:1c:12:ec:85:56:73:aa: 56:5e:86:7c:78:87:17:89:68:6a:ff:f5:ee:02:93:a6: cc:3d:32:1c:e9:36:83:d7:85:88:63:13:46:9d:2a:4d: 8d:34:c2:c7:b4:43:c1:7f:10:4b:b1:5f:aa:c0:d2:44: 5b:9f:c0:12:dd:cb:83:fc:7d:b3:47:48:92:81:5f:6d: a3:e4:86:d6:58:51:7b:5a:39:e5:c1:cf:49:9f:4d:26: 6d:55:18:1d:f8:1f:12:a4:ab:3c:45:74:ef:22:75:c5: e6:04:03:19:bd:f6:7b:ff:a4:ed:c3:67:e9:25:a0:9e: 5c:f9:37:fb:9b:c0:41:07:6d:b3:78:b2:ae:27:e2:cd: ae:40:65:78:be:e8:51:15:e6:16:02:ad:f6:8c:75:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:a5:65:6e:ef:38:65:e7:3d:04:fa:19:d3:f7:8a:ab: 36:f0:53:c1:16:80:cc:d4:93:47:3c:2f:53:61:85:87: 4f:98:23:13:91:a1:20:2a:92:ac:f1:bf:28:70:63:a5: d7:bb:3e:85:21:67:2e:25:69:c0:47:90:5f:69:e9:9b: e1:ad:ff:e7:bf:b3:1f:57:97:ff:b5:01:ae:49:0a:41: 96:53:80:c2:7b:24:ad:8e:b9:8b:b8:ac:26:c1:2f:85: 25:ab:55:c6:ab:cc:f3:ad:d4:0f:39:ad:0f:17:4b:29: 45:84:0c:8c:d9:05:d9:aa:e9:cd:ea:ee:7b:9d:7b:ce: 14:16:67:7e:a8:f9:99:d1:12:5f:7f:e6:0a:6a:ab:f2: ee:e7:68:4c:71:2d:93:71:24:7e:d1:a2:82:90:a8:fa: 70:ff:02:c7:7f:32:61:f5:f5:5e:7e:ed:dd:17:1f:85: 05:49:7e:d4:4a:64:bf:5a:b8:43:a9:49:6c:ad:70:58: 8e:e3:f8:59:4d:b3:8a:a2:8d:84:fc:a5:48:4e:e9:08: e7:81:18:b0:41:50:52:79:38:37:bc:bb:33:a1:99:08: 50:36:1e:12:ae:bb:7e:cb:83:b9:fa:24:7f:86:2d:0c: 75:ec:ee:bf:60:40:b7:87:28:5f:9a:b7:e0:5c:f2:5e Fingerprint (SHA-256): 4C:A5:83:5F:D3:94:43:7E:F3:C8:62:DB:6E:80:2B:4E:F1:90:7B:53:B2:91:73:39:E9:E2:7C:E7:87:C6:2C:72 Fingerprint (SHA1): 65:80:D1:B1:DE:83:A9:59:C1:8F:7A:DB:3D:76:86:F5:54:82:BA:A7 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #7649: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7650: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7651: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173489 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7652: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7653: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #7654: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7655: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 425173490 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7656: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7657: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #7658: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7659: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 425173491 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7660: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7661: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #7662: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7663: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 425173492 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7664: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7665: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #7666: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7667: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 425173493 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7668: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7669: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #7670: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7671: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 425173494 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7672: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7673: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #7674: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7675: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 425173495 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7676: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7677: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7678: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173489 (0x1957a1f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:51:27 2016 Not After : Sun Apr 25 17:51:27 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:9a:0f:c1:56:65:dd:60:85:2a:36:ca:af:ee:7e:d1: 6d:f4:32:1e:44:ec:19:bb:2d:39:75:34:ac:56:85:4c: e7:75:44:57:dc:8e:be:c6:1b:16:9a:10:22:9d:b2:35: 3d:98:7b:2a:8f:e9:be:e1:02:5b:a3:70:86:e5:31:81: 9b:6e:33:59:56:c0:8c:09:52:17:2a:c2:ab:7e:f9:99: 65:89:57:71:88:62:d3:b3:c3:a1:47:e5:25:d9:7e:2e: f9:61:df:86:af:90:2d:ef:7d:67:c6:5d:09:b1:a8:5e: 1d:07:e1:4d:fc:9b:f1:b8:94:6c:41:8b:3c:c6:c7:87: 3f:d2:99:20:cd:9a:77:d7:09:2f:ec:d1:97:0f:98:72: b7:40:4b:3f:9f:7f:f1:56:c8:fd:2b:40:15:0c:c0:32: cb:cc:1a:aa:22:31:b7:7a:94:62:da:8c:0d:1b:5c:49: db:56:70:ad:d3:45:38:f7:03:40:5e:f5:3e:5c:2c:52: df:56:a6:fc:ba:cc:a1:4b:47:bd:34:5b:fa:59:96:ad: 08:66:5e:0e:31:61:ef:f7:64:6d:bb:86:2e:49:a8:4e: b7:92:9b:7b:b8:61:9e:e4:4b:29:78:15:af:ed:a7:6a: d7:ff:eb:07:a0:f1:a1:a1:29:33:d6:df:e9:d1:38:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:fd:00:0e:49:1a:c2:b1:91:18:3b:3c:28:13:bb:9b: df:ef:5f:6f:82:be:d8:a7:b9:eb:02:00:5e:9e:95:87: 11:00:cc:34:39:ec:b3:9a:bc:5f:90:19:e2:7e:a2:f7: 8a:1f:4a:64:82:16:b4:4e:d7:90:94:bc:72:82:90:9a: ea:8b:9b:86:ba:4d:71:0e:3b:46:17:ef:95:f0:4a:33: d7:bb:de:56:0c:bd:ac:87:c4:15:9d:91:e1:98:7b:ad: 0f:64:f1:f6:25:3c:95:b4:99:e3:4c:7c:bf:18:ca:89: e4:6f:7c:49:55:7b:3f:b9:f7:77:db:08:2d:aa:be:eb: 51:f7:77:e3:d0:fa:15:b5:8b:d6:7a:c0:b4:c6:d0:ef: 05:b3:b9:3a:8b:76:bf:3e:c8:5b:8d:ed:6d:e3:cf:ac: c0:06:68:a8:d3:94:95:f7:15:fb:e8:40:07:96:aa:71: a3:21:eb:7c:7f:e6:d9:4b:62:62:2c:b9:2c:e5:75:13: 88:a9:46:a1:0a:8e:17:24:ce:f6:7e:89:7c:a6:9f:9c: 45:93:fe:d2:90:f2:95:5b:c5:99:2a:4e:18:0c:2f:05: 9b:d0:89:82:2f:e1:96:91:a9:db:b5:0e:ab:f6:e6:7e: a6:8b:65:aa:ab:19:5f:e3:05:97:48:3e:11:05:08:c1 Fingerprint (SHA-256): CC:79:59:47:CC:C7:84:0C:63:C0:B5:88:42:6A:18:A8:AE:33:45:DD:8D:E7:93:59:24:D0:F0:89:EF:18:EA:C0 Fingerprint (SHA1): 9B:DD:6F:BD:86:FE:A5:23:DE:5C:69:58:BE:2D:C2:08:59:74:05:66 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #7679: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7680: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7681: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7682: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173489 (0x1957a1f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:51:27 2016 Not After : Sun Apr 25 17:51:27 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:9a:0f:c1:56:65:dd:60:85:2a:36:ca:af:ee:7e:d1: 6d:f4:32:1e:44:ec:19:bb:2d:39:75:34:ac:56:85:4c: e7:75:44:57:dc:8e:be:c6:1b:16:9a:10:22:9d:b2:35: 3d:98:7b:2a:8f:e9:be:e1:02:5b:a3:70:86:e5:31:81: 9b:6e:33:59:56:c0:8c:09:52:17:2a:c2:ab:7e:f9:99: 65:89:57:71:88:62:d3:b3:c3:a1:47:e5:25:d9:7e:2e: f9:61:df:86:af:90:2d:ef:7d:67:c6:5d:09:b1:a8:5e: 1d:07:e1:4d:fc:9b:f1:b8:94:6c:41:8b:3c:c6:c7:87: 3f:d2:99:20:cd:9a:77:d7:09:2f:ec:d1:97:0f:98:72: b7:40:4b:3f:9f:7f:f1:56:c8:fd:2b:40:15:0c:c0:32: cb:cc:1a:aa:22:31:b7:7a:94:62:da:8c:0d:1b:5c:49: db:56:70:ad:d3:45:38:f7:03:40:5e:f5:3e:5c:2c:52: df:56:a6:fc:ba:cc:a1:4b:47:bd:34:5b:fa:59:96:ad: 08:66:5e:0e:31:61:ef:f7:64:6d:bb:86:2e:49:a8:4e: b7:92:9b:7b:b8:61:9e:e4:4b:29:78:15:af:ed:a7:6a: d7:ff:eb:07:a0:f1:a1:a1:29:33:d6:df:e9:d1:38:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:fd:00:0e:49:1a:c2:b1:91:18:3b:3c:28:13:bb:9b: df:ef:5f:6f:82:be:d8:a7:b9:eb:02:00:5e:9e:95:87: 11:00:cc:34:39:ec:b3:9a:bc:5f:90:19:e2:7e:a2:f7: 8a:1f:4a:64:82:16:b4:4e:d7:90:94:bc:72:82:90:9a: ea:8b:9b:86:ba:4d:71:0e:3b:46:17:ef:95:f0:4a:33: d7:bb:de:56:0c:bd:ac:87:c4:15:9d:91:e1:98:7b:ad: 0f:64:f1:f6:25:3c:95:b4:99:e3:4c:7c:bf:18:ca:89: e4:6f:7c:49:55:7b:3f:b9:f7:77:db:08:2d:aa:be:eb: 51:f7:77:e3:d0:fa:15:b5:8b:d6:7a:c0:b4:c6:d0:ef: 05:b3:b9:3a:8b:76:bf:3e:c8:5b:8d:ed:6d:e3:cf:ac: c0:06:68:a8:d3:94:95:f7:15:fb:e8:40:07:96:aa:71: a3:21:eb:7c:7f:e6:d9:4b:62:62:2c:b9:2c:e5:75:13: 88:a9:46:a1:0a:8e:17:24:ce:f6:7e:89:7c:a6:9f:9c: 45:93:fe:d2:90:f2:95:5b:c5:99:2a:4e:18:0c:2f:05: 9b:d0:89:82:2f:e1:96:91:a9:db:b5:0e:ab:f6:e6:7e: a6:8b:65:aa:ab:19:5f:e3:05:97:48:3e:11:05:08:c1 Fingerprint (SHA-256): CC:79:59:47:CC:C7:84:0C:63:C0:B5:88:42:6A:18:A8:AE:33:45:DD:8D:E7:93:59:24:D0:F0:89:EF:18:EA:C0 Fingerprint (SHA1): 9B:DD:6F:BD:86:FE:A5:23:DE:5C:69:58:BE:2D:C2:08:59:74:05:66 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #7683: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7684: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7685: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7686: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173496 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7687: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7688: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7689: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7690: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173497 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7691: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7692: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7693: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7694: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173498 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7695: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7696: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7697: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7698: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425173499 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7699: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7700: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7701: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7702: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7703: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7704: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173496 (0x1957a1f8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:53:20 2016 Not After : Sun Apr 25 17:53:20 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:fa:56:f5:8a:89:ac:29:4d:27:38:88:f0:d4:fd:d3: 9b:71:6a:cc:4d:b8:0c:f4:55:71:6a:3c:5f:3b:e7:01: f1:a1:1a:66:9b:73:78:2c:3f:60:54:97:b1:46:d6:f5: 67:e1:c5:cb:68:1f:99:a2:8e:bf:46:f7:aa:a4:49:62: 2c:28:89:49:d1:29:f5:52:1f:bc:77:92:f8:ad:65:98: 56:4b:7f:b7:2b:70:c0:e5:fb:d6:77:5d:b6:d8:35:e5: 4e:a3:49:ac:fd:20:70:ad:03:63:ac:5b:51:c9:bf:1c: 9d:e2:88:06:cb:fd:9e:00:a4:ca:8d:21:59:38:50:9b: ad:4c:6d:5b:59:f8:d1:44:64:ef:a8:42:d5:53:9c:2c: 0e:94:2b:5c:b2:52:c8:35:6c:4a:01:8a:bc:5e:6e:5f: 74:3b:86:05:b2:bc:b2:a9:b3:5f:ad:60:83:d3:90:86: 88:34:33:a3:fb:61:4f:10:ed:9f:9d:b1:3a:1b:5f:03: a2:43:4f:3c:b3:ee:98:21:fb:dd:62:99:b8:50:c0:f7: a4:29:ab:d5:1c:07:81:cf:0b:d9:31:b0:cf:65:4c:b3: 32:41:75:3a:2b:19:d4:73:93:a0:c5:d3:77:5c:22:f1: aa:de:7f:c7:cf:58:74:10:3f:81:70:da:15:4a:f7:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:ae:6f:a0:3e:a1:e6:4f:d3:3a:db:c1:f3:5b:3a:f7: e0:39:56:52:dd:4f:91:07:9b:77:53:96:ad:6d:80:02: 0c:92:ba:a2:62:c9:54:74:07:92:be:96:42:a1:58:a1: 8c:0b:ea:2d:de:fa:53:2f:66:29:84:d0:2e:b1:75:ee: 51:b3:8f:d5:90:d5:85:38:61:09:9f:b8:05:0e:cc:23: 52:5e:cd:79:1f:dc:e6:b1:87:30:a5:9d:ba:74:e9:ca: 3a:19:0b:11:5a:3b:e5:df:ef:25:26:d5:b4:9c:8b:d8: bc:bd:73:0b:64:21:99:97:29:9f:f7:22:f1:ee:d5:2f: 3a:6b:3f:a1:90:15:32:bb:3e:3e:ad:6e:bf:9d:11:3c: 32:ea:21:9e:45:b2:b6:f5:40:93:96:59:b7:ca:e6:dc: 42:19:36:81:72:4c:7a:01:e9:17:67:6c:47:c1:fc:e8: 57:63:14:ac:ab:a5:c3:39:3c:68:2f:10:62:80:4c:b0: 10:28:10:81:30:ec:57:14:41:91:f1:c5:90:a8:ee:43: 5e:72:36:51:d3:99:e5:ef:1a:6d:42:ec:05:ab:a9:eb: 2b:63:a8:41:27:f3:d3:2a:cf:5e:8d:3e:91:a5:7d:7c: 3c:5a:a4:06:d0:61:c0:77:17:f8:75:8c:f8:b1:ea:e7 Fingerprint (SHA-256): 60:CA:3C:6F:CC:E3:49:E6:95:81:E9:3B:06:45:79:AB:57:E7:71:C5:37:C6:C7:CD:84:F9:0A:13:68:6C:25:42 Fingerprint (SHA1): D2:DA:35:F8:F3:5C:D2:52:0B:8E:DC:76:09:F3:C8:D9:E9:DF:00:3F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7705: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7706: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7707: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173497 (0x1957a1f9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:53:30 2016 Not After : Sun Apr 25 17:53:30 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:e6:38:3b:d4:07:0a:33:86:87:dd:99:e7:37:0e:13: 3c:05:79:44:19:02:55:ba:39:52:3e:9f:c1:b8:cc:40: 57:29:d8:16:33:5d:b7:e0:e9:60:f2:06:6a:ef:c9:b9: 0c:94:1b:1b:9e:83:e5:20:2a:64:62:cd:c7:39:6b:1b: 7e:7e:4a:a3:c8:aa:b3:bf:dc:ca:7c:62:03:e9:2b:1b: 42:ab:33:89:dd:13:49:38:b0:68:67:88:b7:de:e1:bf: a7:df:2d:d9:ea:c5:15:2a:9c:0b:2e:f2:6d:82:4f:79: b0:0f:5d:48:35:4f:59:d3:02:63:d0:87:3f:2f:56:d7: a3:85:1e:2e:41:d0:88:45:f2:1a:0d:55:3c:18:2e:0d: a5:b1:33:8f:5e:62:41:e0:71:71:46:2b:96:1e:db:a5: bd:c5:5f:23:3b:15:20:ae:d7:7c:23:51:ce:46:16:17: a0:3e:d1:62:2e:4e:01:0b:fd:0f:c7:86:3a:f8:1d:54: b4:1e:53:0c:b1:b8:e7:1e:d9:df:e4:5a:c3:6d:1d:b8: 53:5d:25:df:bf:c0:1d:77:f3:b2:5e:f0:10:aa:4a:3d: f4:8a:87:00:77:b4:11:0d:e3:03:bb:65:4e:9b:a9:14: 15:10:85:4f:aa:d6:8a:04:34:30:d3:3e:93:5b:1e:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cc:6b:71:8b:13:23:c6:11:9e:45:e5:47:74:d0:72:f7: 65:f0:b1:9e:2b:26:ae:b8:4a:e6:81:6d:78:33:d6:7f: 5d:52:c3:e5:61:11:6e:dc:46:c5:f0:79:bd:fd:d7:c4: fd:e8:72:ef:9f:82:65:a5:93:6e:5c:8a:49:f1:61:4a: 7c:e9:ca:64:c9:2b:6a:e4:60:8b:aa:04:19:4d:fb:64: ec:4c:ed:93:da:83:70:bf:3b:9f:b7:4d:4a:1f:35:a9: 47:e6:14:13:03:c9:3b:00:a7:c3:67:36:b4:df:ab:f8: 42:bc:d8:e8:84:4c:f2:28:0c:b1:0b:dd:1f:a9:1d:22: 8a:20:6f:aa:45:1e:96:f3:8f:e3:62:93:25:50:9c:d8: 3c:49:b9:67:6b:93:65:f1:25:9b:43:32:85:ef:0b:58: 88:ac:85:8b:1b:6c:7e:1e:1a:52:a9:82:45:d9:82:d1: 9c:09:8e:27:df:5a:cf:7d:e7:0e:83:29:6c:ef:e4:b8: 7d:a8:a2:03:54:26:de:5e:8c:21:63:3a:98:83:8b:0d: 3b:0c:f8:68:f7:30:c7:b6:bf:af:d9:5a:7e:18:34:e8: e8:9a:1b:17:aa:ff:36:40:58:dc:02:82:72:92:6a:30: ae:f6:fe:e0:e9:61:e1:46:37:21:92:5b:22:1c:3d:1e Fingerprint (SHA-256): AA:CE:09:C8:14:D5:32:F0:4F:EB:58:AE:63:DE:3A:F8:B2:C0:95:EF:89:F5:49:7F:BA:D7:09:43:5C:24:12:D7 Fingerprint (SHA1): 6D:A2:4B:E6:59:46:39:A0:7B:C3:55:0D:95:39:E1:08:9F:5C:D2:34 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7708: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7709: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173498 (0x1957a1fa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 17:53:52 2016 Not After : Sun Apr 25 17:53:52 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:d0:cf:8a:0a:1e:da:91:57:8f:3e:d5:a2:d3:5b:bf: ce:ef:a4:3c:05:dc:9a:cf:69:bb:2d:53:69:6a:50:49: 22:93:6d:aa:bf:d3:c8:30:24:c0:4c:5c:fd:4e:21:e5: 10:c2:f4:9c:44:42:61:29:83:1a:9d:c8:d0:ff:92:ff: 03:cc:ac:55:b4:f5:e2:c7:19:fc:de:da:77:25:e8:bd: f3:2f:95:27:7b:be:09:6a:96:2a:8f:54:75:ba:41:a6: 0d:0b:a7:d0:85:5c:20:fa:8f:0c:a4:8e:2a:b2:9b:9d: e2:a1:5d:c1:c7:b3:7f:ff:4a:0b:a8:ad:f8:f2:91:1f: a2:1c:d4:e6:01:74:cd:31:7c:5d:44:7b:6b:28:0b:98: 1e:d8:4a:67:5e:0e:b3:5c:fd:4f:f2:8d:af:8a:56:eb: 3f:c1:01:15:f2:55:4a:1c:1c:5f:46:52:ad:25:0c:91: 9a:3a:48:64:ae:58:38:9b:d8:b3:b7:79:93:e6:3d:50: 58:0b:8d:85:a3:ad:12:c6:a3:c4:b4:f3:98:a6:99:2b: a5:ab:56:99:c5:27:20:9d:54:51:4c:d6:7a:68:c4:c3: e2:13:fb:59:70:64:5b:e4:02:8c:44:cb:1c:6f:f9:9a: 5f:5b:c5:b9:bd:a1:2c:f7:72:e7:3a:ae:7a:41:84:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:81:13:59:4c:80:f3:0f:00:e5:b6:d6:27:c3:eb:a7: a3:5a:0f:6e:6a:8a:d4:1a:22:b9:6d:88:07:7d:46:e9: 09:3e:f1:d1:3d:8b:7b:2f:02:34:3f:71:40:85:d5:29: c4:65:f5:3e:b2:24:39:93:72:ff:f5:65:a5:40:7d:6b: 15:6f:23:2e:22:c1:89:58:9d:3b:8a:97:63:aa:6e:fc: 79:09:2c:53:70:51:e6:df:4a:80:fe:78:d2:1f:34:2e: 0e:bc:ce:8b:aa:e9:cc:86:46:51:86:fa:f7:e2:4d:ec: b6:2e:e8:e0:0a:64:f2:4d:83:a3:65:8a:0d:85:bf:5d: 8f:c6:5a:bd:d3:31:36:ee:be:58:ad:48:fa:8d:01:48: 1a:13:cf:5c:86:ff:55:91:f0:44:11:de:0b:d9:16:2c: e0:87:aa:70:1f:3e:4c:99:2e:af:6d:7b:14:11:c7:52: 74:60:32:2d:a3:9d:ba:c9:57:60:bf:55:00:dd:06:cf: bf:b1:9e:0e:34:8f:8f:e4:09:c5:71:68:72:75:51:fc: 76:00:56:12:66:33:a2:aa:f0:72:cc:c4:98:6c:b8:44: 83:5e:3e:b3:29:54:5d:f3:21:75:6e:26:ea:76:42:99: 19:ea:ea:86:b2:fa:f1:d0:eb:05:63:ff:88:ef:7f:3c Fingerprint (SHA-256): 8F:C2:BB:93:EF:78:48:F9:86:BB:58:8F:2D:72:1E:F5:DB:3E:FF:00:5A:A4:B1:DC:C6:EC:35:E5:D5:95:48:3D Fingerprint (SHA1): 99:B9:98:51:59:33:23:5C:53:5F:11:EC:2A:0A:31:90:8E:E0:92:B8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #7710: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7711: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173500 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7712: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7713: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7714: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7715: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173501 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7716: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7717: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7718: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7719: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173502 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7720: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7721: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #7722: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7723: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 425173503 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7724: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7725: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7726: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7727: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 425173504 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7728: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7729: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7730: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #7731: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #7732: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #7733: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #7734: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173500 (0x1957a1fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:54:45 2016 Not After : Sun Apr 25 17:54:45 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:59:4d:8d:5a:18:fa:62:ec:18:d5:c1:3f:32:a8:5b: e6:a4:89:ad:4e:17:1c:76:fc:64:2c:fe:bc:0a:73:0d: fe:f2:60:01:af:26:a6:17:f2:f0:a0:2b:0b:30:b0:74: 04:b8:bd:16:12:28:2d:72:9f:bb:f1:ec:b1:32:89:e2: 1d:c6:e9:65:db:ee:38:31:9e:91:da:64:68:e3:09:3d: 3c:f4:6e:1d:e7:3b:3b:a1:bd:48:9d:f6:e3:b4:e4:39: 3d:74:c5:cf:58:20:15:98:68:14:0d:fc:f9:9c:c0:e1: e1:90:80:90:42:35:a6:74:0d:a9:18:ad:ba:7e:48:70: 5c:a3:4e:16:94:22:2f:f7:e4:99:b1:03:7c:53:1f:d2: 2e:7c:a5:95:4b:44:9e:80:38:dc:c6:c4:e3:2c:b9:2d: 8d:a7:df:a9:c2:90:5f:4c:b3:df:c6:a4:cb:26:ec:7d: 6f:26:de:c1:83:0d:43:3d:21:0a:05:a9:9d:90:ed:b7: 3a:a5:ee:98:27:f9:e2:e1:19:8e:86:1f:43:2f:e8:dc: b1:8b:29:75:84:da:c8:f0:c7:d6:61:1c:78:2f:29:3d: 89:50:44:f3:a3:08:9a:f0:2d:c7:91:1a:3c:d2:72:67: cb:b9:8b:4e:10:99:2a:0d:9a:d1:00:d3:7b:77:c9:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:f9:9f:32:e4:a5:2f:ca:a8:56:63:2a:2e:b1:4a:6a: d9:95:e0:60:3b:37:1a:a9:d2:ca:bb:17:ef:11:3b:e4: 42:87:a5:19:0a:59:ca:7c:e0:8b:1f:21:1d:f3:8e:1d: b5:14:d7:0a:5e:da:65:11:11:ac:f4:87:91:77:0c:34: 82:6a:0d:84:12:97:c6:d4:4c:d2:47:f8:d2:4c:af:ea: 99:67:88:a3:d5:ea:64:a7:dc:75:6b:51:59:4a:7b:a2: f7:15:22:7c:e1:40:1a:94:85:70:2f:40:59:6c:9c:74: 0e:78:d1:89:20:c8:0d:8a:f4:ab:04:25:1f:91:e5:1e: bc:33:ae:fb:21:3b:a6:b6:c7:00:e6:de:ae:d3:2a:9b: b5:dc:f7:a5:9c:13:74:cb:97:54:72:8a:45:a6:5f:07: fc:3c:43:73:d4:f8:66:84:a5:21:e9:b7:b1:0d:a9:38: 0d:3b:8e:1f:0f:e5:2d:a7:4e:01:bd:43:ca:d7:3e:7e: 17:8f:75:e8:d5:e1:51:09:11:2e:31:97:52:80:9b:db: 77:27:6d:dc:33:56:00:7a:a4:f8:86:71:9e:7d:14:c7: 0b:d2:b2:ca:47:1b:51:da:c5:e7:1a:aa:8f:80:c9:13: 72:08:39:4f:99:78:05:9c:3f:b1:bd:b7:d0:ff:23:93 Fingerprint (SHA-256): A8:49:69:9B:82:45:10:A0:83:72:B9:94:3F:64:12:5F:01:BF:3A:30:B1:0F:70:42:BA:B2:E3:E6:44:93:D5:AB Fingerprint (SHA1): DD:4B:0F:F3:DD:B6:2A:AF:4D:21:FF:DE:79:54:ED:47:AB:2D:EE:6F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7735: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7736: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173501 (0x1957a1fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:54:56 2016 Not After : Sun Apr 25 17:54:56 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:65:8a:20:19:df:23:2e:6c:56:5c:39:53:d1:37:e7: b0:f0:66:14:65:a4:55:0b:90:51:64:27:24:0a:66:d6: 9e:e7:e8:d1:27:7a:cb:16:48:f4:00:87:15:75:d0:9f: f5:ef:43:2f:a1:1c:f0:c3:a5:0b:e5:7b:21:72:c0:a3: 3d:2c:de:46:55:81:d5:df:39:23:a5:d5:a7:0d:85:4b: 2e:2c:67:dd:91:3c:ff:4e:f9:15:74:2f:30:b5:07:6b: 85:2c:6f:fa:96:cc:4c:50:cf:c9:80:7c:06:cd:46:05: 8c:67:a4:12:74:8c:8a:f8:f4:00:4e:3a:02:e3:ed:d1: 88:66:bb:fc:02:8c:27:94:bc:ae:51:50:31:3f:dc:7a: a6:f2:78:dc:11:e4:a7:0e:8e:86:d5:ae:7f:5c:74:2a: fd:9b:af:3b:38:51:e7:d2:35:b2:50:65:e9:86:46:68: 48:50:8b:28:cd:67:9c:f9:85:91:d1:78:e1:92:26:77: 0e:5e:7f:09:ea:02:07:1f:d5:f8:5e:3d:6b:68:f5:72: 19:17:f8:dc:11:f0:ee:cc:5b:d2:12:bb:7a:0a:b2:38: 17:85:3e:41:e1:e6:af:07:c5:33:68:57:97:0c:99:81: 3f:57:65:3b:53:d4:5d:27:2a:a6:14:e8:cb:6a:9f:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:5e:c8:47:70:b3:27:bf:15:1b:58:75:eb:64:d6:5e: 1b:9c:56:d5:87:fd:fc:1f:6e:28:d5:0d:bf:d5:a5:33: 1a:d7:48:b8:68:6b:23:45:21:82:56:04:5b:4d:41:59: e2:d1:bc:63:c3:fb:95:16:3a:68:d9:8e:27:d3:72:d8: 7f:fb:7d:91:e8:a9:56:bf:cd:0c:17:90:2d:aa:29:0e: 44:65:55:d5:89:de:65:41:a0:72:84:e0:14:fc:bb:80: 2b:cc:4c:29:93:19:0e:21:af:90:bc:fb:55:a5:93:3c: 47:64:29:3a:2a:82:84:af:26:d4:46:bd:75:9e:00:76: 6c:09:bb:e2:31:24:a7:9f:3b:37:81:38:c8:b2:93:f1: f9:9b:e2:1d:5c:ac:88:e4:f0:91:56:d0:87:d8:84:fd: a0:b4:0e:c1:55:77:79:08:c3:cd:ff:c9:d4:8f:64:71: a6:9a:7b:6c:81:68:40:a7:22:c2:4e:fa:82:4f:25:4f: 7d:7b:79:31:01:72:87:80:76:f2:2d:c9:e5:8d:0c:42: f5:4a:3f:ba:0a:fc:93:ef:cd:0f:be:fe:c2:13:70:c4: ab:14:68:82:19:22:ab:57:a7:5e:58:15:d3:ec:7c:3e: 5e:a7:d4:5b:0e:b5:21:3d:65:7e:ae:36:44:37:de:f6 Fingerprint (SHA-256): 18:D3:9E:86:C8:50:6A:A3:80:39:9C:AC:4D:F3:98:09:8B:65:57:F3:1C:50:A7:54:E3:0E:F0:3C:0F:37:C3:75 Fingerprint (SHA1): 11:56:D8:CF:60:D0:FC:DF:61:E5:36:7A:1D:D7:EF:B6:7B:E2:27:7F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7737: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7738: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7739: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173502 (0x1957a1fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 17:55:27 2016 Not After : Sun Apr 25 17:55:27 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:de:21:ae:d9:de:5c:ad:d1:49:99:55:d7:0f:a5:dd: 07:f5:09:43:73:26:2c:e7:92:89:47:be:52:50:40:ac: 9b:da:14:43:bf:e4:a1:4a:39:77:59:07:73:8d:1f:a2: c3:f0:27:ed:81:75:3d:3b:90:c9:d2:cd:28:64:0a:a2: 58:ed:3d:26:3d:d1:3e:7c:2a:ad:a3:11:d5:83:3c:9c: 2b:4f:55:d7:df:86:30:71:87:b3:74:60:4c:ed:ca:c2: e8:55:2e:88:bb:e2:7f:d1:97:3c:be:f3:6a:f2:85:b4: 8d:e2:f1:a3:55:43:3d:96:95:60:7b:14:99:c5:20:a4: 5d:eb:07:b0:2b:de:0e:d6:e7:cb:21:70:5a:07:87:78: 02:49:b3:6f:2f:c9:da:57:80:7c:51:93:c8:fe:35:8b: 5d:29:f7:00:df:74:dd:2c:ac:66:77:58:ef:86:6d:3b: 4e:37:a1:b1:ec:eb:62:51:cb:2e:bc:48:6b:dd:0e:40: 01:50:05:de:b3:28:f4:93:3b:02:4e:cf:b2:f9:5f:ce: 79:d7:86:4d:bc:15:2b:9d:b0:b5:ef:11:65:7f:77:9f: c5:c5:a0:31:79:27:0f:ec:f8:1f:cf:a4:f2:a2:73:5c: d9:ab:d5:7e:f2:fd:a7:7f:8c:60:98:c1:6f:f8:80:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:c3:67:08:f3:dd:3d:f8:70:7c:fb:17:09:39:21:a1: 43:16:91:b8:79:94:0f:bb:ea:e5:55:b0:1e:07:ac:df: 46:62:98:da:29:f6:5b:a5:c8:ed:62:ee:43:71:83:41: 83:03:2d:47:34:87:40:e5:26:fe:9a:79:af:5c:55:d3: 76:77:56:56:84:43:67:41:62:47:da:c4:9c:e3:90:57: 3c:d5:05:ca:1d:10:1d:fe:86:b4:c9:a2:92:ad:6b:c9: ae:ad:3e:a5:31:38:7f:fd:5e:2e:a8:4a:bf:f7:1d:76: c7:40:64:c3:8a:2a:40:19:1f:e8:a0:bf:82:ec:90:f3: 71:1a:cb:4c:37:9d:eb:3c:4b:4d:f8:42:2c:c8:1e:0e: 71:03:1f:bc:a6:3c:28:19:6e:d1:65:d4:63:be:e0:cf: 45:31:80:2d:e1:fa:4e:cf:30:59:1b:90:50:e9:37:e1: f9:fc:f9:00:fc:94:71:f7:63:30:e8:32:a1:d0:71:75: f7:19:f8:c3:e2:3f:b4:67:38:dc:99:d4:65:a8:e4:ee: f1:7b:26:45:4f:54:19:e0:84:b0:ba:df:c8:a3:6c:a7: 80:d4:53:30:30:3e:35:36:b2:3c:c0:29:49:cf:da:ec: d0:05:fe:a0:fa:54:64:27:97:db:16:25:5f:82:39:3b Fingerprint (SHA-256): 71:CB:D3:19:6D:91:BE:53:8C:49:CC:A1:D0:F2:41:AB:9D:27:38:A7:EE:E3:DF:C7:F3:9D:EE:D7:59:C8:D2:66 Fingerprint (SHA1): 05:8A:87:06:84:A7:FE:E2:2F:16:EB:79:42:57:00:4F:83:CD:7C:7E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #7740: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7741: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173505 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7742: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7743: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7744: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7745: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173506 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7746: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7747: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7748: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7749: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173507 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA1Root-425173414.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7750: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7751: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #7752: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7753: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425173508 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7754: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7755: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #7756: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173505 (0x1957a201) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 17:55:52 2016 Not After : Sun Apr 25 17:55:52 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:2e:c2:ba:f8:26:53:ed:22:63:c8:89:3f:bf:06:e3: 6a:06:93:0f:28:42:71:89:f4:8a:aa:54:5f:f4:42:f2: fb:12:9a:d1:2e:3b:d8:32:66:99:dc:e6:de:88:ce:33: 97:19:e7:c7:8f:9b:8d:60:1a:7d:e6:0a:99:65:91:bb: 30:6b:81:f3:bd:f0:74:d9:1a:91:80:83:53:c3:c9:57: 33:b1:53:51:77:d4:c0:97:b3:ea:06:f9:1a:61:16:49: d0:84:b2:bb:b0:23:92:0c:62:16:01:11:a5:cc:00:c7: 8d:66:15:a3:42:41:81:29:d7:26:0c:f3:5c:15:0c:58: 9f:84:80:99:18:bd:03:7a:cc:f9:01:27:93:77:71:26: 13:6f:77:0c:24:18:0a:19:92:3c:7f:89:ba:84:e6:8f: 3a:98:f2:5d:66:d3:a5:e3:ab:8c:92:61:e5:87:0c:5b: 41:91:05:b8:75:ff:10:43:7e:b4:1f:75:34:8e:33:f5: 0d:c5:cb:09:4c:1c:95:42:4e:44:d5:05:a2:fc:16:d2: 7e:4b:31:43:8e:85:cf:46:c8:e8:a7:b7:cd:a9:c2:56: 84:3d:c4:27:eb:bc:0c:12:31:1b:3d:51:c5:97:2b:cc: 06:41:12:75:f8:83:bd:9b:67:34:db:72:eb:b8:2e:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:6e:9f:2a:99:eb:56:f7:46:95:26:d2:c3:9f:79:12: 5d:59:f8:37:5e:fa:2a:e6:b5:1d:2d:3e:16:79:30:e7: 71:b4:c5:39:95:c7:dd:99:9f:10:e8:48:f9:dc:f2:f3: 66:e3:44:94:44:25:72:b2:74:29:d7:a3:77:97:a4:d8: c7:c3:2f:02:7e:12:cf:4e:7c:47:eb:b3:21:dc:a6:8e: 88:45:77:a1:f4:37:7b:cf:96:d2:4a:b0:d3:de:74:4d: 57:5a:45:7b:f1:48:9f:a8:00:04:92:ef:37:a4:ea:c6: c9:56:a4:9c:92:c4:a2:f1:95:b8:a3:e9:df:e3:f7:a1: 41:1b:3d:6d:26:46:e9:88:d9:1b:e1:e8:3e:d7:92:00: f8:5e:67:98:c2:51:53:8b:c0:91:53:0a:80:19:19:00: c5:54:2f:bc:75:7a:b7:fb:16:54:d2:10:3c:61:9a:04: d8:1d:d5:de:9e:91:3f:97:7a:4b:d7:0d:37:ce:03:fb: 07:6f:fc:a8:38:54:99:f3:42:95:12:7e:89:9d:05:2a: 0e:71:be:2e:8b:5b:e6:c8:9e:e4:e9:6b:89:a6:3c:87: 11:ab:b2:6b:6b:55:a9:cc:ec:67:75:5a:ba:3c:61:ff: d0:12:1a:23:8d:2c:f0:a6:92:5b:33:ca:e2:f5:bf:67 Fingerprint (SHA-256): 20:D9:BA:BD:45:97:B0:59:47:FE:50:6B:2E:62:C2:FC:7D:E3:E6:05:A6:7A:F7:85:0E:1F:6A:74:D1:90:96:CC Fingerprint (SHA1): 07:C4:71:4D:B4:9D:AE:07:61:8D:71:1E:37:FA:01:23:09:AB:0B:E7 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7757: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7758: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173509 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7759: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7760: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7761: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173510 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7762: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7763: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7764: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7765: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425173511 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7766: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7767: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425173512 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7768: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7769: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #7770: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7771: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7772: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425173513 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425173415.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7773: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7774: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7775: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7776: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173514 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7777: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7778: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7779: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7780: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173510 (0x1957a206) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:56:34 2016 Not After : Sun Apr 25 17:56:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:37:4e:4d:1c:14:14:2a:d7:5a:0d:1a:7c:33:e1:d2: 53:d3:ee:69:b7:43:d4:81:f0:73:31:45:96:2e:c4:3f: 07:c8:08:25:58:62:aa:56:ba:61:29:41:fe:01:4e:72: 42:2e:aa:0e:cd:dd:e5:92:5b:12:a8:3c:8f:2c:bb:14: da:67:0b:1e:dc:68:58:c9:74:c0:84:d0:3f:d3:0e:5e: 19:c5:c0:a6:62:f5:f2:16:48:a3:dd:a5:7e:66:e5:0b: df:62:e9:2e:28:a4:e2:c8:1a:d0:46:95:ab:27:10:03: 4d:2b:45:83:c6:99:56:45:f5:08:60:19:39:59:fa:14: ab:86:03:54:f6:8a:50:3e:62:3d:b6:7b:40:98:e2:66: 2a:2f:67:3c:d3:76:a7:78:11:4a:00:8b:23:51:dc:3e: 5a:4b:c0:f1:0d:a4:b3:50:21:6c:66:b6:9e:c4:be:60: 2f:e1:d4:ed:92:97:91:da:ef:3f:fc:ab:c1:47:f2:0f: 21:2f:c5:ec:e8:76:3f:41:0d:a9:3d:a0:19:c7:fc:3d: 80:3d:d4:18:c8:fc:2d:d9:51:76:ea:6d:2e:d9:1a:74: 22:2f:45:38:b6:be:32:14:df:c9:f6:6f:79:c5:27:77: f2:14:c5:47:10:81:da:6b:87:22:00:68:2c:4a:97:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:33:2e:f2:14:79:6f:78:b4:d6:95:6d:e8:40:f7:0e: be:1a:80:dd:a7:46:cf:be:1c:80:dc:8a:79:4a:04:51: 44:b5:6f:00:4f:eb:77:60:5f:ad:bd:c2:85:3f:0e:89: da:92:93:8f:34:9b:dd:19:fc:dc:5f:78:a5:eb:71:62: f3:7b:e7:de:fb:8e:7c:25:d7:49:01:b3:dc:53:6c:39: 83:4f:2d:f6:61:cd:87:a9:74:79:35:46:6e:c5:8a:ef: e7:55:00:b9:e0:10:ec:6c:fb:a2:ce:22:cc:8f:60:c7: 5d:63:6c:82:83:fb:88:45:81:36:01:ed:97:78:9e:02: 1b:47:e0:07:c8:1a:ac:a6:b6:82:20:7c:b2:55:02:5e: 58:9c:b0:bb:3b:75:1b:90:35:e8:0b:2b:03:81:51:98: 03:11:aa:ae:aa:ac:08:5c:be:7b:f4:bc:d8:17:9a:b8: 04:e1:2e:26:49:26:04:37:37:3c:7f:f1:99:21:97:29: cd:ec:ec:61:07:9c:e5:77:24:63:cc:01:22:32:74:ad: 65:37:64:78:94:f9:39:e2:39:1a:7b:4e:62:ed:54:b4: d4:4a:54:f4:74:42:bc:e4:5a:27:19:dc:00:03:46:9f: 57:ef:2a:08:8a:8e:b4:c3:45:ff:ec:50:a4:62:d4:91 Fingerprint (SHA-256): 1A:76:14:DE:40:7C:51:2C:00:B5:C8:D8:9A:D6:4E:4D:C1:33:33:4F:26:63:A1:1C:3F:F6:75:F9:A6:B7:B8:2E Fingerprint (SHA1): 66:B7:9D:87:67:D5:60:5E:A4:57:C7:7C:D8:AF:16:36:D0:BB:CA:28 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7781: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173510 (0x1957a206) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:56:34 2016 Not After : Sun Apr 25 17:56:34 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:37:4e:4d:1c:14:14:2a:d7:5a:0d:1a:7c:33:e1:d2: 53:d3:ee:69:b7:43:d4:81:f0:73:31:45:96:2e:c4:3f: 07:c8:08:25:58:62:aa:56:ba:61:29:41:fe:01:4e:72: 42:2e:aa:0e:cd:dd:e5:92:5b:12:a8:3c:8f:2c:bb:14: da:67:0b:1e:dc:68:58:c9:74:c0:84:d0:3f:d3:0e:5e: 19:c5:c0:a6:62:f5:f2:16:48:a3:dd:a5:7e:66:e5:0b: df:62:e9:2e:28:a4:e2:c8:1a:d0:46:95:ab:27:10:03: 4d:2b:45:83:c6:99:56:45:f5:08:60:19:39:59:fa:14: ab:86:03:54:f6:8a:50:3e:62:3d:b6:7b:40:98:e2:66: 2a:2f:67:3c:d3:76:a7:78:11:4a:00:8b:23:51:dc:3e: 5a:4b:c0:f1:0d:a4:b3:50:21:6c:66:b6:9e:c4:be:60: 2f:e1:d4:ed:92:97:91:da:ef:3f:fc:ab:c1:47:f2:0f: 21:2f:c5:ec:e8:76:3f:41:0d:a9:3d:a0:19:c7:fc:3d: 80:3d:d4:18:c8:fc:2d:d9:51:76:ea:6d:2e:d9:1a:74: 22:2f:45:38:b6:be:32:14:df:c9:f6:6f:79:c5:27:77: f2:14:c5:47:10:81:da:6b:87:22:00:68:2c:4a:97:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:33:2e:f2:14:79:6f:78:b4:d6:95:6d:e8:40:f7:0e: be:1a:80:dd:a7:46:cf:be:1c:80:dc:8a:79:4a:04:51: 44:b5:6f:00:4f:eb:77:60:5f:ad:bd:c2:85:3f:0e:89: da:92:93:8f:34:9b:dd:19:fc:dc:5f:78:a5:eb:71:62: f3:7b:e7:de:fb:8e:7c:25:d7:49:01:b3:dc:53:6c:39: 83:4f:2d:f6:61:cd:87:a9:74:79:35:46:6e:c5:8a:ef: e7:55:00:b9:e0:10:ec:6c:fb:a2:ce:22:cc:8f:60:c7: 5d:63:6c:82:83:fb:88:45:81:36:01:ed:97:78:9e:02: 1b:47:e0:07:c8:1a:ac:a6:b6:82:20:7c:b2:55:02:5e: 58:9c:b0:bb:3b:75:1b:90:35:e8:0b:2b:03:81:51:98: 03:11:aa:ae:aa:ac:08:5c:be:7b:f4:bc:d8:17:9a:b8: 04:e1:2e:26:49:26:04:37:37:3c:7f:f1:99:21:97:29: cd:ec:ec:61:07:9c:e5:77:24:63:cc:01:22:32:74:ad: 65:37:64:78:94:f9:39:e2:39:1a:7b:4e:62:ed:54:b4: d4:4a:54:f4:74:42:bc:e4:5a:27:19:dc:00:03:46:9f: 57:ef:2a:08:8a:8e:b4:c3:45:ff:ec:50:a4:62:d4:91 Fingerprint (SHA-256): 1A:76:14:DE:40:7C:51:2C:00:B5:C8:D8:9A:D6:4E:4D:C1:33:33:4F:26:63:A1:1C:3F:F6:75:F9:A6:B7:B8:2E Fingerprint (SHA1): 66:B7:9D:87:67:D5:60:5E:A4:57:C7:7C:D8:AF:16:36:D0:BB:CA:28 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7782: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7783: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173515 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7784: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7785: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7786: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173516 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7787: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7788: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7789: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7790: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425173517 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7791: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7792: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425173518 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7793: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7794: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #7795: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7796: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7797: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425173519 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425173416.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7798: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7799: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7800: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7801: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173520 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7802: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7803: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7804: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7805: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425173521 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-BridgeNavy-425173417.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7806: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7807: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7808: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7809: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425173522 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7810: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7811: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #7812: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #7813: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173516 (0x1957a20c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:57:40 2016 Not After : Sun Apr 25 17:57:40 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:6a:e5:ee:81:6c:49:31:72:8d:20:18:4b:ed:6b:3d: e4:93:d5:1e:f6:0a:35:f2:51:e6:d0:29:16:69:af:a7: ca:fb:dc:e3:a2:10:18:79:70:c0:f5:72:e3:c9:4f:e2: c3:fd:c3:7b:cf:8d:78:c6:e3:26:c0:c7:c6:bd:3b:de: ba:32:9f:d1:26:af:18:ed:b1:b8:cc:0c:b7:0a:bc:1b: 85:bf:14:d5:19:3e:a7:0c:41:4c:5e:bf:d6:c7:1a:97: 56:39:ec:d2:94:11:0f:5c:5e:aa:5b:f0:8e:23:2c:a3: 01:4e:44:48:aa:ff:cf:57:6c:92:06:e1:25:d7:ff:4c: 23:c4:51:52:c4:10:ef:ed:58:78:80:f8:16:a4:35:b8: cb:ba:9c:ba:1a:27:3d:6e:37:f8:1d:d1:47:02:cd:8d: 6f:b9:8c:cb:27:02:e1:31:2f:bd:11:3f:13:71:d9:ab: a9:b4:0a:71:6f:85:34:3a:50:03:00:51:4c:14:99:12: 6a:22:8a:49:7b:3d:f7:38:28:4d:e1:1b:b6:93:c0:05: ae:07:29:7c:f2:bc:07:12:cc:83:3f:52:72:a3:f1:47: bb:c3:28:b2:f9:e8:b6:a0:68:2f:bc:e0:ce:c0:8b:98: 3d:d9:f9:30:5b:84:dd:e9:2a:80:15:35:38:19:b8:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:2c:d0:cf:98:3a:70:ff:32:cd:27:ec:4c:d3:66:fd: b5:ad:07:59:7e:ef:9b:ef:f6:a9:5b:ec:ee:17:01:da: 81:cd:a9:21:aa:89:4f:20:4e:55:ae:f6:f7:66:2d:91: cb:c1:42:92:79:0c:24:62:89:b2:e3:ff:31:a5:08:5a: a2:0a:10:b3:bd:6c:11:fa:c1:72:7b:23:25:06:39:46: 1c:a5:06:e8:66:d7:8a:de:fa:ae:71:55:b0:11:fc:fd: e7:9d:7b:e7:24:82:7a:20:ec:ed:a5:8e:68:d9:61:d4: ea:e1:b3:8f:9c:ac:cc:68:2e:10:a2:ae:99:c7:e1:fa: a8:d1:71:6a:23:46:46:e5:a6:2b:58:de:6f:ad:37:de: 75:2b:02:c6:32:57:04:d8:88:28:ef:3b:e9:f2:71:d7: e0:5b:e6:8e:ee:43:ed:4a:31:42:81:38:6c:00:5c:a3: 3d:34:b5:e4:34:70:82:b1:0f:d6:cd:87:f4:0e:23:38: 82:8a:ee:73:c3:39:bc:bb:ad:a6:02:91:06:f8:1d:10: 2b:07:45:04:d3:6b:2c:6a:60:32:c7:3e:d5:48:09:fd: 9a:ae:9c:3e:3a:0b:72:41:c1:78:a1:cc:1f:5b:5f:1e: 00:15:e0:e7:71:7e:94:70:92:5e:a7:05:58:f0:24:1c Fingerprint (SHA-256): C3:28:AB:7F:EB:8F:9C:54:F7:1E:B0:9F:56:42:21:B4:C0:72:8E:BD:D6:37:A4:8C:30:B7:F7:6F:18:10:4E:51 Fingerprint (SHA1): 54:2B:1E:5C:16:AC:95:31:22:10:81:BD:BA:CC:3E:90:E5:19:A0:E8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7814: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173516 (0x1957a20c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:57:40 2016 Not After : Sun Apr 25 17:57:40 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:6a:e5:ee:81:6c:49:31:72:8d:20:18:4b:ed:6b:3d: e4:93:d5:1e:f6:0a:35:f2:51:e6:d0:29:16:69:af:a7: ca:fb:dc:e3:a2:10:18:79:70:c0:f5:72:e3:c9:4f:e2: c3:fd:c3:7b:cf:8d:78:c6:e3:26:c0:c7:c6:bd:3b:de: ba:32:9f:d1:26:af:18:ed:b1:b8:cc:0c:b7:0a:bc:1b: 85:bf:14:d5:19:3e:a7:0c:41:4c:5e:bf:d6:c7:1a:97: 56:39:ec:d2:94:11:0f:5c:5e:aa:5b:f0:8e:23:2c:a3: 01:4e:44:48:aa:ff:cf:57:6c:92:06:e1:25:d7:ff:4c: 23:c4:51:52:c4:10:ef:ed:58:78:80:f8:16:a4:35:b8: cb:ba:9c:ba:1a:27:3d:6e:37:f8:1d:d1:47:02:cd:8d: 6f:b9:8c:cb:27:02:e1:31:2f:bd:11:3f:13:71:d9:ab: a9:b4:0a:71:6f:85:34:3a:50:03:00:51:4c:14:99:12: 6a:22:8a:49:7b:3d:f7:38:28:4d:e1:1b:b6:93:c0:05: ae:07:29:7c:f2:bc:07:12:cc:83:3f:52:72:a3:f1:47: bb:c3:28:b2:f9:e8:b6:a0:68:2f:bc:e0:ce:c0:8b:98: 3d:d9:f9:30:5b:84:dd:e9:2a:80:15:35:38:19:b8:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:2c:d0:cf:98:3a:70:ff:32:cd:27:ec:4c:d3:66:fd: b5:ad:07:59:7e:ef:9b:ef:f6:a9:5b:ec:ee:17:01:da: 81:cd:a9:21:aa:89:4f:20:4e:55:ae:f6:f7:66:2d:91: cb:c1:42:92:79:0c:24:62:89:b2:e3:ff:31:a5:08:5a: a2:0a:10:b3:bd:6c:11:fa:c1:72:7b:23:25:06:39:46: 1c:a5:06:e8:66:d7:8a:de:fa:ae:71:55:b0:11:fc:fd: e7:9d:7b:e7:24:82:7a:20:ec:ed:a5:8e:68:d9:61:d4: ea:e1:b3:8f:9c:ac:cc:68:2e:10:a2:ae:99:c7:e1:fa: a8:d1:71:6a:23:46:46:e5:a6:2b:58:de:6f:ad:37:de: 75:2b:02:c6:32:57:04:d8:88:28:ef:3b:e9:f2:71:d7: e0:5b:e6:8e:ee:43:ed:4a:31:42:81:38:6c:00:5c:a3: 3d:34:b5:e4:34:70:82:b1:0f:d6:cd:87:f4:0e:23:38: 82:8a:ee:73:c3:39:bc:bb:ad:a6:02:91:06:f8:1d:10: 2b:07:45:04:d3:6b:2c:6a:60:32:c7:3e:d5:48:09:fd: 9a:ae:9c:3e:3a:0b:72:41:c1:78:a1:cc:1f:5b:5f:1e: 00:15:e0:e7:71:7e:94:70:92:5e:a7:05:58:f0:24:1c Fingerprint (SHA-256): C3:28:AB:7F:EB:8F:9C:54:F7:1E:B0:9F:56:42:21:B4:C0:72:8E:BD:D6:37:A4:8C:30:B7:F7:6F:18:10:4E:51 Fingerprint (SHA1): 54:2B:1E:5C:16:AC:95:31:22:10:81:BD:BA:CC:3E:90:E5:19:A0:E8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7815: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #7816: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173515 (0x1957a20b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 17:57:29 2016 Not After : Sun Apr 25 17:57:29 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:36:78:69:7c:fb:87:2c:60:02:e1:f2:2f:8b:fa:b7: 1e:fc:06:89:63:3f:5a:98:75:a7:90:ef:f0:83:d4:a2: 77:a3:01:02:bd:b8:ae:6d:e4:e9:2f:a4:b5:b2:ef:bb: a0:10:f5:61:48:81:10:c1:7c:fc:f8:91:c7:e0:bb:a6: ac:2e:d9:60:7c:97:5f:e7:6d:5a:37:3c:f0:73:c1:34: 09:99:8f:a0:77:4f:30:71:91:95:33:b0:63:05:16:32: ad:c7:72:2c:b9:85:fd:e8:ac:5a:27:7d:5d:cb:00:62: 6d:17:68:cc:0a:3b:e8:e8:c9:94:31:5d:2d:ae:a8:eb: c0:08:ac:a2:2e:c3:d7:dd:6e:32:30:fd:06:71:2a:9e: 0f:c5:fd:04:f7:aa:ec:a3:7f:0f:9f:4f:11:e8:86:43: 7e:89:ae:5a:3f:50:53:98:30:9a:9a:c1:69:6d:5d:bb: f6:fc:65:98:b8:84:f0:01:44:40:61:60:d6:3f:56:7e: 48:75:0a:0b:b5:84:d0:ec:c2:83:0d:ad:5d:b0:a3:a4: 36:37:9d:6b:98:eb:12:1f:de:e3:41:87:1f:d9:5c:a9: 19:22:5e:8e:4e:15:9e:23:f3:86:74:e0:2f:14:62:15: 3c:70:27:b2:da:8a:f8:88:8b:b9:cf:a1:b1:b2:fa:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:2f:af:33:fa:d0:2a:ee:02:e6:7b:87:15:69:b3:ea: 87:1c:fd:3a:b1:e0:9c:c3:9b:eb:49:28:e9:0c:2a:bd: c3:6f:7a:26:ae:0c:eb:03:a5:c7:9c:ff:fd:ad:f5:9c: d1:6d:f8:6d:3a:8d:44:03:ba:e2:28:e9:e1:7f:a3:d8: 1d:b2:da:f8:76:24:64:d4:fa:51:e7:0f:ab:4b:2a:e0: 4c:df:8e:af:e8:4d:fa:a6:be:77:2c:75:a9:39:36:bd: 13:c2:4d:f4:4b:0c:5d:1a:3c:75:01:0e:8f:c6:70:12: 25:70:f5:de:12:48:9d:92:6a:5f:de:39:43:68:6d:cd: 04:35:36:1e:cc:47:70:76:a7:82:ba:e0:d6:74:db:d1: ef:ce:3d:bc:f7:50:3b:d4:67:93:2f:cf:51:d5:43:8b: ef:91:c8:73:60:33:e5:26:fe:0a:71:92:b1:1f:35:24: ca:1b:d7:ff:10:58:6a:e2:e8:1b:e8:9e:72:1c:32:bd: 81:bc:b1:af:d7:e2:4d:87:c5:c0:b4:7c:90:2c:c8:17: 2e:31:8f:bd:b2:69:26:6d:de:21:a7:1d:42:59:14:b1: 47:25:de:62:3a:2e:7f:dd:60:01:b0:b0:88:74:a5:d3: e3:44:9d:1d:aa:8e:b4:75:c1:f2:9a:fe:d4:6a:a2:a8 Fingerprint (SHA-256): 16:8D:58:CD:B5:94:93:94:46:2E:E0:3D:C8:A2:80:A1:15:28:A4:D3:6A:B5:5A:45:12:CA:6F:7E:91:CF:B7:7A Fingerprint (SHA1): 18:09:63:E4:89:C2:84:D6:BA:A2:21:AE:C4:79:4B:75:0B:70:51:7F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7817: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173516 (0x1957a20c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:57:40 2016 Not After : Sun Apr 25 17:57:40 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:6a:e5:ee:81:6c:49:31:72:8d:20:18:4b:ed:6b:3d: e4:93:d5:1e:f6:0a:35:f2:51:e6:d0:29:16:69:af:a7: ca:fb:dc:e3:a2:10:18:79:70:c0:f5:72:e3:c9:4f:e2: c3:fd:c3:7b:cf:8d:78:c6:e3:26:c0:c7:c6:bd:3b:de: ba:32:9f:d1:26:af:18:ed:b1:b8:cc:0c:b7:0a:bc:1b: 85:bf:14:d5:19:3e:a7:0c:41:4c:5e:bf:d6:c7:1a:97: 56:39:ec:d2:94:11:0f:5c:5e:aa:5b:f0:8e:23:2c:a3: 01:4e:44:48:aa:ff:cf:57:6c:92:06:e1:25:d7:ff:4c: 23:c4:51:52:c4:10:ef:ed:58:78:80:f8:16:a4:35:b8: cb:ba:9c:ba:1a:27:3d:6e:37:f8:1d:d1:47:02:cd:8d: 6f:b9:8c:cb:27:02:e1:31:2f:bd:11:3f:13:71:d9:ab: a9:b4:0a:71:6f:85:34:3a:50:03:00:51:4c:14:99:12: 6a:22:8a:49:7b:3d:f7:38:28:4d:e1:1b:b6:93:c0:05: ae:07:29:7c:f2:bc:07:12:cc:83:3f:52:72:a3:f1:47: bb:c3:28:b2:f9:e8:b6:a0:68:2f:bc:e0:ce:c0:8b:98: 3d:d9:f9:30:5b:84:dd:e9:2a:80:15:35:38:19:b8:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:2c:d0:cf:98:3a:70:ff:32:cd:27:ec:4c:d3:66:fd: b5:ad:07:59:7e:ef:9b:ef:f6:a9:5b:ec:ee:17:01:da: 81:cd:a9:21:aa:89:4f:20:4e:55:ae:f6:f7:66:2d:91: cb:c1:42:92:79:0c:24:62:89:b2:e3:ff:31:a5:08:5a: a2:0a:10:b3:bd:6c:11:fa:c1:72:7b:23:25:06:39:46: 1c:a5:06:e8:66:d7:8a:de:fa:ae:71:55:b0:11:fc:fd: e7:9d:7b:e7:24:82:7a:20:ec:ed:a5:8e:68:d9:61:d4: ea:e1:b3:8f:9c:ac:cc:68:2e:10:a2:ae:99:c7:e1:fa: a8:d1:71:6a:23:46:46:e5:a6:2b:58:de:6f:ad:37:de: 75:2b:02:c6:32:57:04:d8:88:28:ef:3b:e9:f2:71:d7: e0:5b:e6:8e:ee:43:ed:4a:31:42:81:38:6c:00:5c:a3: 3d:34:b5:e4:34:70:82:b1:0f:d6:cd:87:f4:0e:23:38: 82:8a:ee:73:c3:39:bc:bb:ad:a6:02:91:06:f8:1d:10: 2b:07:45:04:d3:6b:2c:6a:60:32:c7:3e:d5:48:09:fd: 9a:ae:9c:3e:3a:0b:72:41:c1:78:a1:cc:1f:5b:5f:1e: 00:15:e0:e7:71:7e:94:70:92:5e:a7:05:58:f0:24:1c Fingerprint (SHA-256): C3:28:AB:7F:EB:8F:9C:54:F7:1E:B0:9F:56:42:21:B4:C0:72:8E:BD:D6:37:A4:8C:30:B7:F7:6F:18:10:4E:51 Fingerprint (SHA1): 54:2B:1E:5C:16:AC:95:31:22:10:81:BD:BA:CC:3E:90:E5:19:A0:E8 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7818: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173516 (0x1957a20c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:57:40 2016 Not After : Sun Apr 25 17:57:40 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:6a:e5:ee:81:6c:49:31:72:8d:20:18:4b:ed:6b:3d: e4:93:d5:1e:f6:0a:35:f2:51:e6:d0:29:16:69:af:a7: ca:fb:dc:e3:a2:10:18:79:70:c0:f5:72:e3:c9:4f:e2: c3:fd:c3:7b:cf:8d:78:c6:e3:26:c0:c7:c6:bd:3b:de: ba:32:9f:d1:26:af:18:ed:b1:b8:cc:0c:b7:0a:bc:1b: 85:bf:14:d5:19:3e:a7:0c:41:4c:5e:bf:d6:c7:1a:97: 56:39:ec:d2:94:11:0f:5c:5e:aa:5b:f0:8e:23:2c:a3: 01:4e:44:48:aa:ff:cf:57:6c:92:06:e1:25:d7:ff:4c: 23:c4:51:52:c4:10:ef:ed:58:78:80:f8:16:a4:35:b8: cb:ba:9c:ba:1a:27:3d:6e:37:f8:1d:d1:47:02:cd:8d: 6f:b9:8c:cb:27:02:e1:31:2f:bd:11:3f:13:71:d9:ab: a9:b4:0a:71:6f:85:34:3a:50:03:00:51:4c:14:99:12: 6a:22:8a:49:7b:3d:f7:38:28:4d:e1:1b:b6:93:c0:05: ae:07:29:7c:f2:bc:07:12:cc:83:3f:52:72:a3:f1:47: bb:c3:28:b2:f9:e8:b6:a0:68:2f:bc:e0:ce:c0:8b:98: 3d:d9:f9:30:5b:84:dd:e9:2a:80:15:35:38:19:b8:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:2c:d0:cf:98:3a:70:ff:32:cd:27:ec:4c:d3:66:fd: b5:ad:07:59:7e:ef:9b:ef:f6:a9:5b:ec:ee:17:01:da: 81:cd:a9:21:aa:89:4f:20:4e:55:ae:f6:f7:66:2d:91: cb:c1:42:92:79:0c:24:62:89:b2:e3:ff:31:a5:08:5a: a2:0a:10:b3:bd:6c:11:fa:c1:72:7b:23:25:06:39:46: 1c:a5:06:e8:66:d7:8a:de:fa:ae:71:55:b0:11:fc:fd: e7:9d:7b:e7:24:82:7a:20:ec:ed:a5:8e:68:d9:61:d4: ea:e1:b3:8f:9c:ac:cc:68:2e:10:a2:ae:99:c7:e1:fa: a8:d1:71:6a:23:46:46:e5:a6:2b:58:de:6f:ad:37:de: 75:2b:02:c6:32:57:04:d8:88:28:ef:3b:e9:f2:71:d7: e0:5b:e6:8e:ee:43:ed:4a:31:42:81:38:6c:00:5c:a3: 3d:34:b5:e4:34:70:82:b1:0f:d6:cd:87:f4:0e:23:38: 82:8a:ee:73:c3:39:bc:bb:ad:a6:02:91:06:f8:1d:10: 2b:07:45:04:d3:6b:2c:6a:60:32:c7:3e:d5:48:09:fd: 9a:ae:9c:3e:3a:0b:72:41:c1:78:a1:cc:1f:5b:5f:1e: 00:15:e0:e7:71:7e:94:70:92:5e:a7:05:58:f0:24:1c Fingerprint (SHA-256): C3:28:AB:7F:EB:8F:9C:54:F7:1E:B0:9F:56:42:21:B4:C0:72:8E:BD:D6:37:A4:8C:30:B7:F7:6F:18:10:4E:51 Fingerprint (SHA1): 54:2B:1E:5C:16:AC:95:31:22:10:81:BD:BA:CC:3E:90:E5:19:A0:E8 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #7819: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #7820: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173523 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7821: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #7822: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #7823: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173524 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7824: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #7825: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #7826: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7827: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 425173525 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7828: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7829: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #7830: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7831: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 425173526 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7832: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7833: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #7834: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7835: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 425173527 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7836: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7837: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 425173528 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #7838: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7839: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #7840: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7841: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7842: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425173529 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7843: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7844: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7845: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7846: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425173530 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7847: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7848: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7849: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7850: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173531 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7851: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7852: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7853: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7854: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425173532 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #7855: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7856: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7857: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173523 (0x1957a213) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 17:59:05 2016 Not After : Sun Apr 25 17:59:05 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:82:fc:69:9c:86:02:31:37:e5:32:1b:78:5b:23:dd: c6:d8:c5:1b:63:71:c5:83:9e:51:f5:ef:98:5d:3f:02: 0d:b9:7c:09:bd:c2:00:1f:af:79:97:76:9b:2c:41:9e: 8c:3b:00:1f:ae:a2:08:82:30:5f:27:4a:e6:e9:16:58: 85:06:c8:f7:e0:46:1a:e3:ca:2a:f1:ee:5e:b3:c0:97: 86:fb:29:7d:33:7b:e0:d6:78:06:a5:bd:9f:d9:88:2d: d6:6d:e0:00:e5:60:e3:c2:a1:64:a4:eb:88:fb:67:c2: f4:04:93:c3:1d:18:a0:d0:29:59:10:3e:e0:14:3f:18: 16:8a:6c:ed:7a:31:bd:53:37:9b:65:56:bc:e3:06:88: e8:eb:5b:64:0a:0b:18:86:d9:69:bc:97:45:58:90:57: 5d:fe:77:2f:73:f4:3f:30:d4:32:1a:c7:b7:24:50:fa: f1:f3:9a:ee:d5:e9:dd:5d:37:d6:74:cb:e9:41:19:ec: c2:15:f6:12:da:25:4c:a3:b5:b9:21:02:85:b6:97:c1: 31:a9:bb:bc:bc:7c:9f:65:d4:42:f3:fa:58:7b:ba:51: 4f:d1:ab:af:8d:6d:41:50:02:06:1f:07:e9:c1:e6:12: 6b:35:a5:21:b0:73:dd:2f:d3:59:95:20:21:f1:f4:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:95:50:5b:99:53:2a:7c:bf:5f:ee:ca:e7:46:24:e6: 10:68:61:b3:b1:b6:a4:a5:33:bc:1b:12:2d:68:2b:d0: 82:65:bd:2c:bf:fc:9b:18:a3:1b:d1:ba:30:15:e3:bc: 26:24:7c:9c:a3:b7:61:f6:4e:ac:6e:d4:71:44:8b:ea: 7d:b9:cb:8e:5c:3d:9e:de:75:a3:f9:bf:44:4f:da:e2: 17:b9:e7:d6:7f:59:20:27:40:97:d3:4c:1a:28:c5:96: d5:11:13:55:74:4d:b6:aa:e9:5c:a0:04:83:d8:2d:04: 36:7a:8c:fa:dc:d6:54:ab:ac:2e:34:57:dd:31:bc:bc: a7:ca:2a:4c:40:74:80:71:36:05:3a:31:7f:51:30:65: 9a:ac:92:c2:99:4a:ec:e0:cf:7e:7d:20:d0:01:84:73: 87:18:5c:35:bc:68:b5:25:a2:e6:a9:ee:94:f3:cf:ae: e1:33:a9:f0:ed:80:23:42:c8:9c:15:b4:62:a2:53:96: af:22:56:a4:05:bf:66:68:ef:ac:d9:2d:df:17:90:45: eb:ab:08:f2:2a:91:d7:5b:0f:16:6a:ae:9c:f7:eb:c4: e8:b8:4f:77:b7:8e:8b:1b:c0:e1:d8:eb:c8:a1:c3:c9: 01:d9:f9:0e:2a:b4:33:55:72:ca:e0:75:a6:8c:d7:da Fingerprint (SHA-256): 2C:7D:1F:E4:B8:D4:A6:EC:12:B2:59:8B:F7:85:E4:47:56:58:5E:76:2A:75:21:35:0E:28:93:9B:BA:25:8E:6B Fingerprint (SHA1): 40:85:71:1C:F4:45:00:84:78:2E:94:CE:CB:EB:06:FD:93:2A:A8:32 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #7858: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7859: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7860: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7861: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7862: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7863: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7864: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7865: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7866: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173524 (0x1957a214) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 17:59:13 2016 Not After : Sun Apr 25 17:59:13 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:67:48:fb:6f:a1:c7:5d:81:0d:6b:82:1c:b0:04:8a: 45:8f:64:e9:f7:08:df:f6:67:6b:07:36:94:f0:c2:9a: 27:14:3e:b5:52:2a:d6:7f:83:9f:78:b8:a1:75:52:35: 1a:8c:12:3f:35:1a:54:ef:41:8a:b9:f7:06:78:d1:9a: 88:56:ef:3a:81:2c:58:10:d5:63:f0:db:c5:28:bc:56: 53:92:61:15:89:ee:2b:eb:52:b6:07:f9:af:98:a2:01: 44:21:80:d5:79:f0:01:6d:6f:c4:a4:44:ae:64:75:c1: 39:5b:49:43:02:93:ac:8c:a5:0a:8f:94:5d:a1:ef:3f: 86:49:aa:23:57:74:8f:94:36:1e:45:99:8f:af:6d:e3: 3a:6b:5b:7b:54:a3:96:75:5a:3a:1d:04:66:ac:71:3e: 90:c7:d9:6e:ea:16:d6:37:0a:29:04:ff:f8:c7:00:c3: 2b:ac:c2:31:c3:c9:1e:36:c8:85:3e:e9:7c:36:48:b1: 38:e2:b5:83:ca:5c:fb:0b:58:90:08:76:37:d5:9e:31: 22:75:ef:aa:a7:e5:18:31:61:29:e5:7c:d6:40:3b:89: 5c:a4:70:5c:5e:84:81:46:79:97:61:42:40:87:1d:9e: 39:45:f4:50:b0:41:f3:9c:c2:f7:3a:d5:13:15:ae:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:ee:76:aa:a6:41:3d:74:f9:6e:d8:a5:d0:a2:9d:21: ec:13:12:28:ce:cd:ea:96:be:be:50:3f:58:de:2e:46: 04:5a:54:c9:ec:62:ed:f1:d8:a7:cd:62:0b:b1:1d:56: db:2f:4d:92:76:81:8a:95:93:b2:e8:e5:04:4e:b1:58: c6:04:43:c2:57:d5:21:9b:cd:cc:d1:69:cc:1b:9b:e6: b4:a6:7d:61:62:6a:17:c0:6f:d9:28:e5:96:af:f6:20: e6:5a:b2:57:c3:64:0c:40:eb:99:e9:8d:46:46:4f:47: 02:90:e7:72:d7:b1:27:e0:be:c5:ff:8b:9a:47:a9:1d: 3f:c7:45:e9:82:78:f2:e3:57:d2:ae:2e:68:56:50:02: a9:a9:54:54:c4:67:1c:e6:c4:7f:a3:95:b8:6c:9f:b4: 8d:11:49:17:12:e1:4a:35:4f:9d:a0:54:df:c0:51:27: d8:5a:83:04:62:b9:fb:73:f7:8f:e5:a8:5f:9a:f5:a1: 8e:59:0b:75:8d:3a:3f:5a:d0:ad:17:9b:79:b1:bf:7f: aa:fd:d5:cf:63:ea:da:b8:43:a6:70:d4:ad:ca:a0:7d: 7b:e1:cc:67:4f:a9:f2:a0:66:9e:c7:d6:31:fd:f2:9c: 57:39:74:b1:65:b9:78:6b:d7:fa:6c:24:6d:b8:ce:d9 Fingerprint (SHA-256): 7A:39:7D:89:55:E6:82:3F:52:00:CB:82:A2:C6:4F:6E:D2:7E:0C:F1:89:3E:4F:E2:75:35:57:C0:4A:15:2F:01 Fingerprint (SHA1): 1A:F8:CE:27:33:50:F6:AA:20:C6:90:F1:51:71:30:EC:9F:D1:6E:9A Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #7867: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7868: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7869: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7870: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7871: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #7872: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7873: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #7874: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #7875: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #7876: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #7877: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #7878: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #7879: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #7880: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #7881: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #7882: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #7883: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #7884: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7885: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173533 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7886: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7887: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7888: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7889: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173534 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7890: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7891: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7892: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7893: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173535 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7894: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7895: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7896: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7897: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 425173536 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7898: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7899: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7900: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7901: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425173537 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7902: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7903: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #7904: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7905: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 425173538 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7906: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7907: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #7908: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7909: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 425173539 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7910: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7911: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #7912: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7913: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 425173540 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7914: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7915: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #7916: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7917: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 425173541 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7918: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7919: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7920: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173533 (0x1957a21d) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:00:37 2016 Not After : Sun Apr 25 18:00:37 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8c:17:75:29:e5:4c:f2:7a:cd:1b:e7:93:4b:63:5d:5f: 37:7b:06:89:76:39:dd:bd:e3:24:13:38:c9:46:27:40: 38:c2:13:98:d5:d7:7a:0a:f6:f2:86:09:3d:3d:ce:59: 06:19:9b:e7:be:e5:7f:bc:08:f0:2b:43:22:68:4f:f5: 4b:fb:5c:7d:5b:c6:82:3d:1c:de:59:be:1b:77:79:6e: 77:48:97:f2:28:33:8d:16:46:1a:3c:85:79:39:01:58: e3:94:b3:97:69:37:93:ae:f1:f7:08:db:ca:08:30:df: 45:f4:61:a4:57:3a:cd:1a:f9:40:59:66:ff:60:52:ca: 43:aa:41:e2:03:4e:3c:68:e7:94:d6:5e:b7:f4:17:d0: 06:2d:53:ac:aa:60:eb:cb:e9:b7:19:ec:05:48:c1:62: 13:cd:07:a6:83:21:22:35:26:2e:cd:68:78:14:86:0a: 01:80:17:de:13:27:05:3e:04:0b:ec:38:ba:af:56:e5: 4c:a8:4f:48:6c:b2:62:ef:7d:94:ad:78:a6:eb:ca:82: 2a:00:36:5a:3b:29:f8:bd:ff:23:0a:a3:f4:52:32:ee: 14:bd:f0:2b:4a:fe:43:6e:d1:7f:74:fc:44:a5:68:28: 6a:93:cc:59:16:41:ce:db:42:73:b1:12:18:be:cc:2f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:bf:8e:d4:82:cd:5b:39:a1:1f:c6:99: ae:92:37:55:25:f0:50:3c:15:5b:9c:53:82:cb:73:61: cb:02:1d:00:b9:42:a5:2d:80:37:4e:06:a8:ab:1f:5d: b2:1d:07:d3:c5:e9:d2:db:f0:56:78:d3:ec:7b:ae:7f Fingerprint (SHA-256): 6F:0C:69:DB:47:7A:FF:18:7A:19:3B:66:22:04:20:27:4D:0F:CD:A0:50:D9:DE:7C:DA:9F:5B:E4:B3:31:FD:6E Fingerprint (SHA1): 89:87:DF:94:F6:52:72:66:A2:0F:6B:34:92:43:CE:B2:69:4F:E8:BE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #7921: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173533 (0x1957a21d) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:00:37 2016 Not After : Sun Apr 25 18:00:37 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8c:17:75:29:e5:4c:f2:7a:cd:1b:e7:93:4b:63:5d:5f: 37:7b:06:89:76:39:dd:bd:e3:24:13:38:c9:46:27:40: 38:c2:13:98:d5:d7:7a:0a:f6:f2:86:09:3d:3d:ce:59: 06:19:9b:e7:be:e5:7f:bc:08:f0:2b:43:22:68:4f:f5: 4b:fb:5c:7d:5b:c6:82:3d:1c:de:59:be:1b:77:79:6e: 77:48:97:f2:28:33:8d:16:46:1a:3c:85:79:39:01:58: e3:94:b3:97:69:37:93:ae:f1:f7:08:db:ca:08:30:df: 45:f4:61:a4:57:3a:cd:1a:f9:40:59:66:ff:60:52:ca: 43:aa:41:e2:03:4e:3c:68:e7:94:d6:5e:b7:f4:17:d0: 06:2d:53:ac:aa:60:eb:cb:e9:b7:19:ec:05:48:c1:62: 13:cd:07:a6:83:21:22:35:26:2e:cd:68:78:14:86:0a: 01:80:17:de:13:27:05:3e:04:0b:ec:38:ba:af:56:e5: 4c:a8:4f:48:6c:b2:62:ef:7d:94:ad:78:a6:eb:ca:82: 2a:00:36:5a:3b:29:f8:bd:ff:23:0a:a3:f4:52:32:ee: 14:bd:f0:2b:4a:fe:43:6e:d1:7f:74:fc:44:a5:68:28: 6a:93:cc:59:16:41:ce:db:42:73:b1:12:18:be:cc:2f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:bf:8e:d4:82:cd:5b:39:a1:1f:c6:99: ae:92:37:55:25:f0:50:3c:15:5b:9c:53:82:cb:73:61: cb:02:1d:00:b9:42:a5:2d:80:37:4e:06:a8:ab:1f:5d: b2:1d:07:d3:c5:e9:d2:db:f0:56:78:d3:ec:7b:ae:7f Fingerprint (SHA-256): 6F:0C:69:DB:47:7A:FF:18:7A:19:3B:66:22:04:20:27:4D:0F:CD:A0:50:D9:DE:7C:DA:9F:5B:E4:B3:31:FD:6E Fingerprint (SHA1): 89:87:DF:94:F6:52:72:66:A2:0F:6B:34:92:43:CE:B2:69:4F:E8:BE Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #7922: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173533 (0x1957a21d) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:00:37 2016 Not After : Sun Apr 25 18:00:37 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8c:17:75:29:e5:4c:f2:7a:cd:1b:e7:93:4b:63:5d:5f: 37:7b:06:89:76:39:dd:bd:e3:24:13:38:c9:46:27:40: 38:c2:13:98:d5:d7:7a:0a:f6:f2:86:09:3d:3d:ce:59: 06:19:9b:e7:be:e5:7f:bc:08:f0:2b:43:22:68:4f:f5: 4b:fb:5c:7d:5b:c6:82:3d:1c:de:59:be:1b:77:79:6e: 77:48:97:f2:28:33:8d:16:46:1a:3c:85:79:39:01:58: e3:94:b3:97:69:37:93:ae:f1:f7:08:db:ca:08:30:df: 45:f4:61:a4:57:3a:cd:1a:f9:40:59:66:ff:60:52:ca: 43:aa:41:e2:03:4e:3c:68:e7:94:d6:5e:b7:f4:17:d0: 06:2d:53:ac:aa:60:eb:cb:e9:b7:19:ec:05:48:c1:62: 13:cd:07:a6:83:21:22:35:26:2e:cd:68:78:14:86:0a: 01:80:17:de:13:27:05:3e:04:0b:ec:38:ba:af:56:e5: 4c:a8:4f:48:6c:b2:62:ef:7d:94:ad:78:a6:eb:ca:82: 2a:00:36:5a:3b:29:f8:bd:ff:23:0a:a3:f4:52:32:ee: 14:bd:f0:2b:4a:fe:43:6e:d1:7f:74:fc:44:a5:68:28: 6a:93:cc:59:16:41:ce:db:42:73:b1:12:18:be:cc:2f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:bf:8e:d4:82:cd:5b:39:a1:1f:c6:99: ae:92:37:55:25:f0:50:3c:15:5b:9c:53:82:cb:73:61: cb:02:1d:00:b9:42:a5:2d:80:37:4e:06:a8:ab:1f:5d: b2:1d:07:d3:c5:e9:d2:db:f0:56:78:d3:ec:7b:ae:7f Fingerprint (SHA-256): 6F:0C:69:DB:47:7A:FF:18:7A:19:3B:66:22:04:20:27:4D:0F:CD:A0:50:D9:DE:7C:DA:9F:5B:E4:B3:31:FD:6E Fingerprint (SHA1): 89:87:DF:94:F6:52:72:66:A2:0F:6B:34:92:43:CE:B2:69:4F:E8:BE Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #7923: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173533 (0x1957a21d) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:00:37 2016 Not After : Sun Apr 25 18:00:37 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8c:17:75:29:e5:4c:f2:7a:cd:1b:e7:93:4b:63:5d:5f: 37:7b:06:89:76:39:dd:bd:e3:24:13:38:c9:46:27:40: 38:c2:13:98:d5:d7:7a:0a:f6:f2:86:09:3d:3d:ce:59: 06:19:9b:e7:be:e5:7f:bc:08:f0:2b:43:22:68:4f:f5: 4b:fb:5c:7d:5b:c6:82:3d:1c:de:59:be:1b:77:79:6e: 77:48:97:f2:28:33:8d:16:46:1a:3c:85:79:39:01:58: e3:94:b3:97:69:37:93:ae:f1:f7:08:db:ca:08:30:df: 45:f4:61:a4:57:3a:cd:1a:f9:40:59:66:ff:60:52:ca: 43:aa:41:e2:03:4e:3c:68:e7:94:d6:5e:b7:f4:17:d0: 06:2d:53:ac:aa:60:eb:cb:e9:b7:19:ec:05:48:c1:62: 13:cd:07:a6:83:21:22:35:26:2e:cd:68:78:14:86:0a: 01:80:17:de:13:27:05:3e:04:0b:ec:38:ba:af:56:e5: 4c:a8:4f:48:6c:b2:62:ef:7d:94:ad:78:a6:eb:ca:82: 2a:00:36:5a:3b:29:f8:bd:ff:23:0a:a3:f4:52:32:ee: 14:bd:f0:2b:4a:fe:43:6e:d1:7f:74:fc:44:a5:68:28: 6a:93:cc:59:16:41:ce:db:42:73:b1:12:18:be:cc:2f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3e:02:1d:00:bf:8e:d4:82:cd:5b:39:a1:1f:c6:99: ae:92:37:55:25:f0:50:3c:15:5b:9c:53:82:cb:73:61: cb:02:1d:00:b9:42:a5:2d:80:37:4e:06:a8:ab:1f:5d: b2:1d:07:d3:c5:e9:d2:db:f0:56:78:d3:ec:7b:ae:7f Fingerprint (SHA-256): 6F:0C:69:DB:47:7A:FF:18:7A:19:3B:66:22:04:20:27:4D:0F:CD:A0:50:D9:DE:7C:DA:9F:5B:E4:B3:31:FD:6E Fingerprint (SHA1): 89:87:DF:94:F6:52:72:66:A2:0F:6B:34:92:43:CE:B2:69:4F:E8:BE Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #7924: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7925: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7926: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7927: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #7928: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7929: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7930: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7931: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7932: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7933: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7934: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7935: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #7936: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7937: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7938: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7939: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #7940: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7941: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7942: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7943: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7944: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7945: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7946: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7947: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #7948: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7949: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7950: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7951: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425180216Z nextupdate=20170425180216Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 18:02:16 2016 Next Update: Tue Apr 25 18:02:16 2017 CRL Extensions: chains.sh: #7952: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425180217Z nextupdate=20170425180217Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:02:17 2016 Next Update: Tue Apr 25 18:02:17 2017 CRL Extensions: chains.sh: #7953: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425180217Z nextupdate=20170425180217Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 18:02:17 2016 Next Update: Tue Apr 25 18:02:17 2017 CRL Extensions: chains.sh: #7954: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425180218Z nextupdate=20170425180218Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 18:02:18 2016 Next Update: Tue Apr 25 18:02:18 2017 CRL Extensions: chains.sh: #7955: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425180219Z addcert 14 20160425180219Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 18:02:19 2016 Next Update: Tue Apr 25 18:02:17 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Apr 25 18:02:19 2016 CRL Extensions: chains.sh: #7956: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425180220Z addcert 15 20160425180220Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:02:20 2016 Next Update: Tue Apr 25 18:02:17 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Apr 25 18:02:20 2016 CRL Extensions: chains.sh: #7957: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #7958: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7959: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #7960: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #7961: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #7962: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #7963: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #7964: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #7965: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #7966: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:01:25 2016 Not After : Sun Apr 25 18:01:25 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:35:2b:f0:b6:4c:da:99:c3:53:35:ac:f2:82:94:05: cb:77:ba:67:1b:95:bb:89:ae:f6:4e:fe:88:f4:2d:47: 8f:e5:b4:02:3b:7f:36:eb:a5:a1:22:c3:17:38:29:99: bf:c3:cc:bd:a1:53:de:7f:83:0d:56:bc:70:97:d7:bf: f8:ec:4a:ce:23:51:46:b9:8e:6a:f2:ec:83:63:06:0d: 55:35:f0:0b:04:74:56:e3:24:fb:b3:49:dd:24:0e:31: 7f:c6:bb:b3:1d:a2:2e:fd:9b:d5:15:b1:4c:fe:4f:54: 6e:bd:e2:f6:eb:4a:93:77:08:5e:40:aa:3d:a9:ae:2a: 82:e1:eb:bd:0c:24:43:fc:cf:64:1d:96:35:ef:e8:fd: 22:4f:33:f4:35:66:79:6c:fb:1f:b9:ba:ee:f8:dd:c9: a2:cd:85:90:5a:ac:0d:6d:89:5b:2a:09:2e:1d:77:b2: 13:62:cc:de:39:28:1a:b8:99:e5:9b:04:e3:52:a4:9e: 21:42:62:0e:03:b3:6f:7e:c1:d7:19:fc:dd:ea:e7:87: 41:1f:cb:c8:85:2e:44:63:cf:74:9e:1d:81:0a:1f:2d: 7e:80:d2:b4:6d:fb:52:98:4a:63:d8:36:6b:8e:9a:59: a2:d3:04:b0:da:32:32:86:42:7f:42:ba:34:81:8a:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:49:6b:da:15:ea:84:fa:7f:35:99:ba:fd:02:12:06: 15:fd:f6:68:a4:f1:3c:e7:1c:21:29:a1:60:28:58:a1: 04:60:44:f1:4c:4d:77:f3:c0:13:3a:0e:f6:d5:55:47: c0:c8:6e:0f:97:b6:20:d4:3a:aa:d4:32:c6:05:e9:05: 0b:1d:32:34:61:04:dc:86:68:59:72:25:3d:b7:de:68: ae:34:30:c6:01:fa:03:f2:0e:53:ea:a6:4d:0e:25:5c: 5c:8c:88:c9:5f:e9:d7:b6:bd:ae:47:f0:06:40:4d:87: 0f:9f:a4:35:90:c6:78:ce:2d:fb:38:ee:d8:0d:3c:f7: 73:4f:cb:d3:1f:fa:cb:25:fe:3b:57:b8:e0:84:16:2c: fb:e8:61:3d:e2:a4:a7:f6:36:d0:58:d6:85:61:85:54: 9e:08:c9:d8:9d:44:34:7f:56:36:b3:e7:54:d3:35:9f: cd:86:59:ec:09:47:de:37:07:2f:e4:05:d3:49:a8:0b: 41:55:ab:e8:9f:42:19:23:ee:b5:02:6e:11:87:d4:a3: 32:32:d0:0d:71:8e:76:2f:8d:2a:69:bf:14:17:30:ca: 6c:ab:55:1e:23:3f:db:77:35:c2:b2:ec:36:64:60:ee: 2a:eb:9a:25:45:9f:4b:c9:78:4e:4e:f1:a0:0d:f2:e8 Fingerprint (SHA-256): 2B:58:1F:25:32:B3:E3:C1:EE:E8:21:7C:EF:3C:A5:A1:33:BA:FD:D4:03:FB:AA:A5:1F:71:20:50:CF:24:DC:9A Fingerprint (SHA1): FA:DE:4B:CB:50:00:97:5A:28:DA:A4:E2:DA:66:D0:D8:3A:DF:11:24 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #7967: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7968: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:01:25 2016 Not After : Sun Apr 25 18:01:25 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:35:2b:f0:b6:4c:da:99:c3:53:35:ac:f2:82:94:05: cb:77:ba:67:1b:95:bb:89:ae:f6:4e:fe:88:f4:2d:47: 8f:e5:b4:02:3b:7f:36:eb:a5:a1:22:c3:17:38:29:99: bf:c3:cc:bd:a1:53:de:7f:83:0d:56:bc:70:97:d7:bf: f8:ec:4a:ce:23:51:46:b9:8e:6a:f2:ec:83:63:06:0d: 55:35:f0:0b:04:74:56:e3:24:fb:b3:49:dd:24:0e:31: 7f:c6:bb:b3:1d:a2:2e:fd:9b:d5:15:b1:4c:fe:4f:54: 6e:bd:e2:f6:eb:4a:93:77:08:5e:40:aa:3d:a9:ae:2a: 82:e1:eb:bd:0c:24:43:fc:cf:64:1d:96:35:ef:e8:fd: 22:4f:33:f4:35:66:79:6c:fb:1f:b9:ba:ee:f8:dd:c9: a2:cd:85:90:5a:ac:0d:6d:89:5b:2a:09:2e:1d:77:b2: 13:62:cc:de:39:28:1a:b8:99:e5:9b:04:e3:52:a4:9e: 21:42:62:0e:03:b3:6f:7e:c1:d7:19:fc:dd:ea:e7:87: 41:1f:cb:c8:85:2e:44:63:cf:74:9e:1d:81:0a:1f:2d: 7e:80:d2:b4:6d:fb:52:98:4a:63:d8:36:6b:8e:9a:59: a2:d3:04:b0:da:32:32:86:42:7f:42:ba:34:81:8a:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:49:6b:da:15:ea:84:fa:7f:35:99:ba:fd:02:12:06: 15:fd:f6:68:a4:f1:3c:e7:1c:21:29:a1:60:28:58:a1: 04:60:44:f1:4c:4d:77:f3:c0:13:3a:0e:f6:d5:55:47: c0:c8:6e:0f:97:b6:20:d4:3a:aa:d4:32:c6:05:e9:05: 0b:1d:32:34:61:04:dc:86:68:59:72:25:3d:b7:de:68: ae:34:30:c6:01:fa:03:f2:0e:53:ea:a6:4d:0e:25:5c: 5c:8c:88:c9:5f:e9:d7:b6:bd:ae:47:f0:06:40:4d:87: 0f:9f:a4:35:90:c6:78:ce:2d:fb:38:ee:d8:0d:3c:f7: 73:4f:cb:d3:1f:fa:cb:25:fe:3b:57:b8:e0:84:16:2c: fb:e8:61:3d:e2:a4:a7:f6:36:d0:58:d6:85:61:85:54: 9e:08:c9:d8:9d:44:34:7f:56:36:b3:e7:54:d3:35:9f: cd:86:59:ec:09:47:de:37:07:2f:e4:05:d3:49:a8:0b: 41:55:ab:e8:9f:42:19:23:ee:b5:02:6e:11:87:d4:a3: 32:32:d0:0d:71:8e:76:2f:8d:2a:69:bf:14:17:30:ca: 6c:ab:55:1e:23:3f:db:77:35:c2:b2:ec:36:64:60:ee: 2a:eb:9a:25:45:9f:4b:c9:78:4e:4e:f1:a0:0d:f2:e8 Fingerprint (SHA-256): 2B:58:1F:25:32:B3:E3:C1:EE:E8:21:7C:EF:3C:A5:A1:33:BA:FD:D4:03:FB:AA:A5:1F:71:20:50:CF:24:DC:9A Fingerprint (SHA1): FA:DE:4B:CB:50:00:97:5A:28:DA:A4:E2:DA:66:D0:D8:3A:DF:11:24 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #7969: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #7970: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #7971: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173542 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #7972: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #7973: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #7974: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #7975: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 425173543 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7976: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7977: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #7978: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173433.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7979: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425173418.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7980: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7981: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #7982: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173433.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7983: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 425173544 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7984: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7985: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #7986: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173433.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7987: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425173419.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7988: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7989: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #7990: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #7991: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 425173545 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #7992: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7993: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #7994: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173433.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7995: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425173420.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7996: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #7997: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #7998: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173433.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #7999: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425173421.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8000: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8001: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425180427Z nextupdate=20170425180427Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 18:04:27 2016 Next Update: Tue Apr 25 18:04:27 2017 CRL Extensions: chains.sh: #8002: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425180428Z nextupdate=20170425180428Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:04:28 2016 Next Update: Tue Apr 25 18:04:28 2017 CRL Extensions: chains.sh: #8003: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425180428Z nextupdate=20170425180428Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 18:04:28 2016 Next Update: Tue Apr 25 18:04:28 2017 CRL Extensions: chains.sh: #8004: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425180429Z nextupdate=20170425180429Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 18:04:29 2016 Next Update: Tue Apr 25 18:04:29 2017 CRL Extensions: chains.sh: #8005: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425180430Z addcert 20 20160425180430Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:04:30 2016 Next Update: Tue Apr 25 18:04:28 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 18:04:30 2016 CRL Extensions: chains.sh: #8006: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425180431Z addcert 40 20160425180431Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:04:31 2016 Next Update: Tue Apr 25 18:04:28 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 18:04:30 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Apr 25 18:04:31 2016 CRL Extensions: chains.sh: #8007: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8008: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8009: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #8010: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173542 (0x1957a226) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:02:53 2016 Not After : Sun Apr 25 18:02:53 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:3b:c1:75:0d:bf:a1:d9:de:8c:3b:3d:3f:51:c6:c4: 33:d9:13:ac:ff:0f:fc:e8:f2:20:b6:21:9d:68:a0:b1: 46:ce:3b:ad:81:27:45:1f:10:a5:f0:d1:2b:68:66:fe: b6:f8:11:39:d3:3c:5c:c1:be:b5:ba:d5:e9:1c:43:66: d1:a3:30:d1:dc:e2:44:6f:a3:39:51:27:ab:f2:f4:38: 55:bd:4e:d0:b3:5d:d2:2d:e6:c9:49:27:1d:9a:f1:a4: 53:8e:a9:7a:92:8f:e9:4b:c8:be:42:5b:ef:93:df:11: 2b:a5:23:3c:00:f7:82:0c:56:61:43:f3:21:56:86:66: 49:dc:cf:92:9e:9d:f5:bb:0d:6c:44:5f:1a:70:cf:e3: e4:d3:07:9e:b8:09:00:6a:40:fe:a0:05:77:54:ba:06: 46:9c:31:9d:41:a6:51:bd:ad:ca:1d:1b:b0:ab:60:0e: d3:03:ca:fc:1e:e9:87:9a:4e:aa:50:07:9e:25:8a:30: 2e:cf:93:a6:be:b3:22:f0:9e:c8:ea:9f:92:1f:5a:57: 51:68:53:f2:52:aa:8e:f2:73:f1:e8:b5:5b:83:21:94: e3:8d:8b:02:b2:fa:fc:47:ed:30:43:f2:05:98:f7:4b: 53:b5:37:57:70:ec:e3:27:e6:01:50:9e:2d:02:3d:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:4f:f4:8d:4c:09:e1:3f:1a:d1:e2:f8:1c:b3:78:59: 2d:59:20:61:95:06:59:6f:e2:80:61:1f:2c:da:f1:ea: 19:cb:5a:bd:1f:8e:5f:e4:ef:30:04:d4:96:6f:c5:74: 86:3e:5a:8c:35:82:49:2b:c6:3f:2a:f4:08:ae:78:d2: 5a:f4:89:9b:bb:d3:25:d0:b1:2b:93:49:54:44:42:5d: 4d:e5:6e:27:c2:0d:7a:c8:d7:6c:19:9b:ff:55:1b:ff: 38:42:ed:92:30:20:22:c5:ee:cc:67:e2:20:b3:b3:18: 6f:63:71:37:c2:d8:7e:5f:b0:e3:35:03:93:2e:6f:eb: 97:47:07:c2:9e:a2:22:68:4d:4f:1b:24:28:da:77:ba: 62:45:22:dd:06:1d:ac:ce:32:88:9d:a2:a3:5f:4d:70: 11:71:4b:86:3f:d3:e0:cb:68:67:24:73:f3:4c:0e:16: 75:df:e1:bb:e9:3f:b5:b0:e6:c1:2e:27:01:7c:fb:6c: a4:97:85:a4:d1:82:f2:69:6c:63:65:46:1e:db:c0:1c: eb:bc:9c:63:78:4b:22:cd:f3:6f:4d:8d:d4:35:42:cc: cb:da:fa:c8:e6:f4:56:a6:70:1b:df:45:2b:36:44:22: 2f:f9:8d:a1:da:28:ea:b5:fe:38:a7:df:d0:1e:a4:35 Fingerprint (SHA-256): 4B:63:04:B7:95:DA:9D:5D:95:81:98:6E:80:F0:FE:FF:D0:FA:60:33:ED:27:E0:07:FC:11:09:BB:CA:7B:C5:4F Fingerprint (SHA1): 79:17:E6:2E:1D:9F:01:00:30:CB:11:D4:6C:66:E5:C9:72:80:53:DC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8011: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8012: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173542 (0x1957a226) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:02:53 2016 Not After : Sun Apr 25 18:02:53 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:3b:c1:75:0d:bf:a1:d9:de:8c:3b:3d:3f:51:c6:c4: 33:d9:13:ac:ff:0f:fc:e8:f2:20:b6:21:9d:68:a0:b1: 46:ce:3b:ad:81:27:45:1f:10:a5:f0:d1:2b:68:66:fe: b6:f8:11:39:d3:3c:5c:c1:be:b5:ba:d5:e9:1c:43:66: d1:a3:30:d1:dc:e2:44:6f:a3:39:51:27:ab:f2:f4:38: 55:bd:4e:d0:b3:5d:d2:2d:e6:c9:49:27:1d:9a:f1:a4: 53:8e:a9:7a:92:8f:e9:4b:c8:be:42:5b:ef:93:df:11: 2b:a5:23:3c:00:f7:82:0c:56:61:43:f3:21:56:86:66: 49:dc:cf:92:9e:9d:f5:bb:0d:6c:44:5f:1a:70:cf:e3: e4:d3:07:9e:b8:09:00:6a:40:fe:a0:05:77:54:ba:06: 46:9c:31:9d:41:a6:51:bd:ad:ca:1d:1b:b0:ab:60:0e: d3:03:ca:fc:1e:e9:87:9a:4e:aa:50:07:9e:25:8a:30: 2e:cf:93:a6:be:b3:22:f0:9e:c8:ea:9f:92:1f:5a:57: 51:68:53:f2:52:aa:8e:f2:73:f1:e8:b5:5b:83:21:94: e3:8d:8b:02:b2:fa:fc:47:ed:30:43:f2:05:98:f7:4b: 53:b5:37:57:70:ec:e3:27:e6:01:50:9e:2d:02:3d:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:4f:f4:8d:4c:09:e1:3f:1a:d1:e2:f8:1c:b3:78:59: 2d:59:20:61:95:06:59:6f:e2:80:61:1f:2c:da:f1:ea: 19:cb:5a:bd:1f:8e:5f:e4:ef:30:04:d4:96:6f:c5:74: 86:3e:5a:8c:35:82:49:2b:c6:3f:2a:f4:08:ae:78:d2: 5a:f4:89:9b:bb:d3:25:d0:b1:2b:93:49:54:44:42:5d: 4d:e5:6e:27:c2:0d:7a:c8:d7:6c:19:9b:ff:55:1b:ff: 38:42:ed:92:30:20:22:c5:ee:cc:67:e2:20:b3:b3:18: 6f:63:71:37:c2:d8:7e:5f:b0:e3:35:03:93:2e:6f:eb: 97:47:07:c2:9e:a2:22:68:4d:4f:1b:24:28:da:77:ba: 62:45:22:dd:06:1d:ac:ce:32:88:9d:a2:a3:5f:4d:70: 11:71:4b:86:3f:d3:e0:cb:68:67:24:73:f3:4c:0e:16: 75:df:e1:bb:e9:3f:b5:b0:e6:c1:2e:27:01:7c:fb:6c: a4:97:85:a4:d1:82:f2:69:6c:63:65:46:1e:db:c0:1c: eb:bc:9c:63:78:4b:22:cd:f3:6f:4d:8d:d4:35:42:cc: cb:da:fa:c8:e6:f4:56:a6:70:1b:df:45:2b:36:44:22: 2f:f9:8d:a1:da:28:ea:b5:fe:38:a7:df:d0:1e:a4:35 Fingerprint (SHA-256): 4B:63:04:B7:95:DA:9D:5D:95:81:98:6E:80:F0:FE:FF:D0:FA:60:33:ED:27:E0:07:FC:11:09:BB:CA:7B:C5:4F Fingerprint (SHA1): 79:17:E6:2E:1D:9F:01:00:30:CB:11:D4:6C:66:E5:C9:72:80:53:DC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8013: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8014: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8015: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173546 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8016: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8017: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8018: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8019: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425173547 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8020: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8021: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8022: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8023: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173548 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8024: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8025: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8026: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8027: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 425173549 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8028: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8029: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #8030: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173550 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8031: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #8032: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #8033: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8034: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 425173551 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8035: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8036: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8037: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8038: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 425173552 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8039: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8040: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #8041: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #8042: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #8043: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173546 (0x1957a22a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:04:55 2016 Not After : Sun Apr 25 18:04:55 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:e1:0d:eb:2a:3e:11:f8:a9:8c:f7:d0:5e:5c:b2:4b: a4:63:c3:ef:ce:2b:fe:fa:fa:bf:79:73:59:f9:e0:73: 17:b7:ae:05:e3:5d:45:94:59:18:70:05:78:3e:4a:50: a0:b4:14:cc:6f:11:a0:79:75:9a:77:47:42:d1:ee:6b: e8:86:d5:ad:0d:15:0b:11:26:a2:4f:77:4c:22:fa:01: 07:04:1b:43:5a:6e:1d:5f:31:0c:af:8f:a1:03:5a:85: 65:ac:02:60:bf:81:31:15:80:52:fb:e2:0f:66:59:70: a3:cb:6f:bf:09:25:a1:a2:e5:94:b7:7c:03:61:06:62: 30:2b:b8:35:d3:fd:a9:e3:cf:7f:35:36:8a:b1:79:b2: cc:64:72:28:26:71:cd:c4:12:54:84:47:8b:23:e9:e7: cf:ed:6f:08:f8:c0:80:88:88:2a:21:58:78:09:9b:05: 40:6e:cf:a4:e2:60:56:74:01:18:8f:13:c1:4e:c5:a3: 20:94:8e:ec:b9:b0:9c:09:48:a3:59:1d:c1:ee:10:e1: ce:23:73:2d:dd:78:f9:fb:18:97:41:0e:5f:1e:80:9b: 0b:c3:6f:8c:0a:25:bb:7b:1f:f5:c3:c7:c8:0a:f0:b3: 9f:b3:2a:31:23:d6:f2:f4:97:94:6e:b7:30:b4:51:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:8c:35:81:e4:d1:bb:1d:1f:0d:eb:3d:e0:09:fe:3e: d9:40:eb:15:21:8b:8b:3e:e7:33:8b:b1:1f:39:2b:52: b2:ea:8f:11:3e:1e:c0:14:44:22:8e:89:bf:b1:30:35: f6:82:d1:45:36:27:84:41:ae:7e:ee:81:be:66:7a:35: 38:9f:ad:32:c9:e9:11:00:50:da:54:4a:5d:78:a9:1b: 68:9c:e4:ca:92:4f:fb:e1:ef:92:fc:0d:c3:cd:37:49: 71:cc:11:37:4e:e6:0c:60:b1:05:b8:4a:b9:6b:ab:46: f9:ea:7e:ab:f5:29:b6:94:c2:41:2f:60:f2:6e:dd:da: 39:4e:f6:f8:6f:63:c3:8a:7e:f3:94:d6:c1:64:96:81: 69:c5:9e:f2:d0:78:04:28:14:fe:58:2a:06:9e:38:b7: 88:16:78:de:9d:d8:b7:4c:65:36:77:27:0e:5b:b2:5f: ea:85:09:7f:07:9c:37:a4:4f:fc:4b:e6:77:23:6d:b8: f5:06:f2:be:75:22:31:0b:1e:bb:01:83:53:c9:7a:a3: f8:ca:06:62:0c:b8:44:f8:63:eb:d5:ad:65:ed:fd:ca: 43:8e:2e:f9:39:4a:97:44:08:f6:bc:8f:01:cd:03:20: 33:91:27:15:d0:4f:46:a8:85:cc:7a:5c:37:a9:67:8c Fingerprint (SHA-256): BA:EF:33:CB:95:37:A3:DE:AA:18:CE:74:24:3A:75:AE:52:7C:04:96:BC:49:E7:FF:91:3F:00:99:92:7A:D9:03 Fingerprint (SHA1): 59:39:81:4D:F3:29:86:FF:A9:5E:A0:4C:3A:E0:A2:ED:E6:26:A6:8E Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8044: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173548 (0x1957a22c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:05:42 2016 Not After : Sun Apr 25 18:05:42 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:0a:8e:72:97:34:fb:d2:de:b4:1b:16:e2:bf:cd:78: f3:fc:63:85:71:32:8e:bd:75:94:e7:47:6f:8c:db:56: 2e:b3:06:fc:67:34:d5:fd:07:60:d3:c6:96:96:dc:3e: ce:75:f9:f2:9e:86:68:e6:d3:ea:a4:17:2f:16:c8:b0: 18:ef:e4:5f:10:5d:38:ab:3e:3c:84:9b:e3:c1:a4:2d: d2:0c:9f:19:eb:81:5c:a5:2a:fa:c6:ba:20:27:94:e2: ea:fa:cb:f4:2c:0a:25:ba:84:51:6b:0f:b2:a1:3c:c9: 6e:27:91:76:96:39:ce:52:16:83:9a:9e:a8:cb:da:06: 1f:73:c9:79:a4:2e:d6:d9:17:f5:c3:90:c2:7e:af:de: ee:b0:3c:cd:b0:72:b4:f0:53:23:c9:21:99:74:f9:fc: aa:bf:f6:0f:2d:ae:21:e7:3f:8d:03:72:c6:b6:eb:6a: 84:31:4a:83:a5:d9:05:ff:2b:6e:05:1a:7b:66:75:90: cc:fd:db:6c:52:c9:a5:57:af:25:5d:02:3f:fa:50:32: ad:43:9e:17:20:e0:9a:b5:fc:76:d6:90:11:3f:7f:af: 87:e4:db:00:0e:b0:84:0f:3c:9a:38:c0:9b:5d:30:0c: de:b8:1d:64:0f:51:a7:f7:cd:f4:27:80:fa:a7:0a:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:fd:43:7c:19:ae:a1:46:ae:ff:d1:e0:37:04:2a:80: a9:b4:72:90:c6:c2:57:b4:e2:06:6b:24:5c:e9:cb:c2: 7e:74:ad:e3:59:f3:f6:ec:ef:ef:39:bc:4f:07:0e:46: 30:7f:67:e5:cb:81:84:bc:88:ad:08:f5:fb:82:6d:a3: 02:9b:2d:a1:7b:d9:94:01:37:51:a7:43:9a:0e:f4:b3: 39:3f:80:dd:7b:ce:25:87:02:bf:66:ec:f0:fc:45:54: 22:ee:be:81:7b:3a:e6:f4:27:e6:a3:aa:cb:8b:de:5b: fc:e3:80:1a:2b:ac:06:2d:33:c8:0d:1b:b9:76:47:8e: 01:7c:c8:bc:0a:7b:5b:f5:92:66:66:63:b2:1c:b1:c6: 88:93:8e:a2:a2:20:07:62:ae:a0:e3:bf:29:e4:55:8d: da:66:97:52:f0:c6:2e:43:96:33:11:6c:66:e8:5d:3a: c7:1e:58:2b:3c:e9:2c:ac:dc:3e:2c:68:2d:6a:2f:63: bc:fc:ba:8e:8b:aa:78:07:4a:41:11:e3:ef:b8:13:02: 89:db:6b:92:2b:32:86:9c:39:e7:c7:e2:d9:37:01:2a: 21:a8:d3:e5:74:b4:fd:31:70:cf:49:23:83:f7:d6:94: 12:6a:60:14:6d:79:af:48:92:e2:9d:c8:3b:32:20:d4 Fingerprint (SHA-256): FD:0F:03:54:15:07:0D:D1:73:5B:C9:77:DA:6F:E6:87:56:91:36:66:0D:30:EE:BE:F7:91:11:28:89:D1:42:89 Fingerprint (SHA1): 40:A7:6D:91:20:E4:88:F5:9E:E2:68:78:F8:4A:40:DE:43:A1:8B:A4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #8045: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173546 (0x1957a22a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:04:55 2016 Not After : Sun Apr 25 18:04:55 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:e1:0d:eb:2a:3e:11:f8:a9:8c:f7:d0:5e:5c:b2:4b: a4:63:c3:ef:ce:2b:fe:fa:fa:bf:79:73:59:f9:e0:73: 17:b7:ae:05:e3:5d:45:94:59:18:70:05:78:3e:4a:50: a0:b4:14:cc:6f:11:a0:79:75:9a:77:47:42:d1:ee:6b: e8:86:d5:ad:0d:15:0b:11:26:a2:4f:77:4c:22:fa:01: 07:04:1b:43:5a:6e:1d:5f:31:0c:af:8f:a1:03:5a:85: 65:ac:02:60:bf:81:31:15:80:52:fb:e2:0f:66:59:70: a3:cb:6f:bf:09:25:a1:a2:e5:94:b7:7c:03:61:06:62: 30:2b:b8:35:d3:fd:a9:e3:cf:7f:35:36:8a:b1:79:b2: cc:64:72:28:26:71:cd:c4:12:54:84:47:8b:23:e9:e7: cf:ed:6f:08:f8:c0:80:88:88:2a:21:58:78:09:9b:05: 40:6e:cf:a4:e2:60:56:74:01:18:8f:13:c1:4e:c5:a3: 20:94:8e:ec:b9:b0:9c:09:48:a3:59:1d:c1:ee:10:e1: ce:23:73:2d:dd:78:f9:fb:18:97:41:0e:5f:1e:80:9b: 0b:c3:6f:8c:0a:25:bb:7b:1f:f5:c3:c7:c8:0a:f0:b3: 9f:b3:2a:31:23:d6:f2:f4:97:94:6e:b7:30:b4:51:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:8c:35:81:e4:d1:bb:1d:1f:0d:eb:3d:e0:09:fe:3e: d9:40:eb:15:21:8b:8b:3e:e7:33:8b:b1:1f:39:2b:52: b2:ea:8f:11:3e:1e:c0:14:44:22:8e:89:bf:b1:30:35: f6:82:d1:45:36:27:84:41:ae:7e:ee:81:be:66:7a:35: 38:9f:ad:32:c9:e9:11:00:50:da:54:4a:5d:78:a9:1b: 68:9c:e4:ca:92:4f:fb:e1:ef:92:fc:0d:c3:cd:37:49: 71:cc:11:37:4e:e6:0c:60:b1:05:b8:4a:b9:6b:ab:46: f9:ea:7e:ab:f5:29:b6:94:c2:41:2f:60:f2:6e:dd:da: 39:4e:f6:f8:6f:63:c3:8a:7e:f3:94:d6:c1:64:96:81: 69:c5:9e:f2:d0:78:04:28:14:fe:58:2a:06:9e:38:b7: 88:16:78:de:9d:d8:b7:4c:65:36:77:27:0e:5b:b2:5f: ea:85:09:7f:07:9c:37:a4:4f:fc:4b:e6:77:23:6d:b8: f5:06:f2:be:75:22:31:0b:1e:bb:01:83:53:c9:7a:a3: f8:ca:06:62:0c:b8:44:f8:63:eb:d5:ad:65:ed:fd:ca: 43:8e:2e:f9:39:4a:97:44:08:f6:bc:8f:01:cd:03:20: 33:91:27:15:d0:4f:46:a8:85:cc:7a:5c:37:a9:67:8c Fingerprint (SHA-256): BA:EF:33:CB:95:37:A3:DE:AA:18:CE:74:24:3A:75:AE:52:7C:04:96:BC:49:E7:FF:91:3F:00:99:92:7A:D9:03 Fingerprint (SHA1): 59:39:81:4D:F3:29:86:FF:A9:5E:A0:4C:3A:E0:A2:ED:E6:26:A6:8E Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8046: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #8047: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173546 (0x1957a22a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:04:55 2016 Not After : Sun Apr 25 18:04:55 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:e1:0d:eb:2a:3e:11:f8:a9:8c:f7:d0:5e:5c:b2:4b: a4:63:c3:ef:ce:2b:fe:fa:fa:bf:79:73:59:f9:e0:73: 17:b7:ae:05:e3:5d:45:94:59:18:70:05:78:3e:4a:50: a0:b4:14:cc:6f:11:a0:79:75:9a:77:47:42:d1:ee:6b: e8:86:d5:ad:0d:15:0b:11:26:a2:4f:77:4c:22:fa:01: 07:04:1b:43:5a:6e:1d:5f:31:0c:af:8f:a1:03:5a:85: 65:ac:02:60:bf:81:31:15:80:52:fb:e2:0f:66:59:70: a3:cb:6f:bf:09:25:a1:a2:e5:94:b7:7c:03:61:06:62: 30:2b:b8:35:d3:fd:a9:e3:cf:7f:35:36:8a:b1:79:b2: cc:64:72:28:26:71:cd:c4:12:54:84:47:8b:23:e9:e7: cf:ed:6f:08:f8:c0:80:88:88:2a:21:58:78:09:9b:05: 40:6e:cf:a4:e2:60:56:74:01:18:8f:13:c1:4e:c5:a3: 20:94:8e:ec:b9:b0:9c:09:48:a3:59:1d:c1:ee:10:e1: ce:23:73:2d:dd:78:f9:fb:18:97:41:0e:5f:1e:80:9b: 0b:c3:6f:8c:0a:25:bb:7b:1f:f5:c3:c7:c8:0a:f0:b3: 9f:b3:2a:31:23:d6:f2:f4:97:94:6e:b7:30:b4:51:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:8c:35:81:e4:d1:bb:1d:1f:0d:eb:3d:e0:09:fe:3e: d9:40:eb:15:21:8b:8b:3e:e7:33:8b:b1:1f:39:2b:52: b2:ea:8f:11:3e:1e:c0:14:44:22:8e:89:bf:b1:30:35: f6:82:d1:45:36:27:84:41:ae:7e:ee:81:be:66:7a:35: 38:9f:ad:32:c9:e9:11:00:50:da:54:4a:5d:78:a9:1b: 68:9c:e4:ca:92:4f:fb:e1:ef:92:fc:0d:c3:cd:37:49: 71:cc:11:37:4e:e6:0c:60:b1:05:b8:4a:b9:6b:ab:46: f9:ea:7e:ab:f5:29:b6:94:c2:41:2f:60:f2:6e:dd:da: 39:4e:f6:f8:6f:63:c3:8a:7e:f3:94:d6:c1:64:96:81: 69:c5:9e:f2:d0:78:04:28:14:fe:58:2a:06:9e:38:b7: 88:16:78:de:9d:d8:b7:4c:65:36:77:27:0e:5b:b2:5f: ea:85:09:7f:07:9c:37:a4:4f:fc:4b:e6:77:23:6d:b8: f5:06:f2:be:75:22:31:0b:1e:bb:01:83:53:c9:7a:a3: f8:ca:06:62:0c:b8:44:f8:63:eb:d5:ad:65:ed:fd:ca: 43:8e:2e:f9:39:4a:97:44:08:f6:bc:8f:01:cd:03:20: 33:91:27:15:d0:4f:46:a8:85:cc:7a:5c:37:a9:67:8c Fingerprint (SHA-256): BA:EF:33:CB:95:37:A3:DE:AA:18:CE:74:24:3A:75:AE:52:7C:04:96:BC:49:E7:FF:91:3F:00:99:92:7A:D9:03 Fingerprint (SHA1): 59:39:81:4D:F3:29:86:FF:A9:5E:A0:4C:3A:E0:A2:ED:E6:26:A6:8E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8048: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173548 (0x1957a22c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:05:42 2016 Not After : Sun Apr 25 18:05:42 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:0a:8e:72:97:34:fb:d2:de:b4:1b:16:e2:bf:cd:78: f3:fc:63:85:71:32:8e:bd:75:94:e7:47:6f:8c:db:56: 2e:b3:06:fc:67:34:d5:fd:07:60:d3:c6:96:96:dc:3e: ce:75:f9:f2:9e:86:68:e6:d3:ea:a4:17:2f:16:c8:b0: 18:ef:e4:5f:10:5d:38:ab:3e:3c:84:9b:e3:c1:a4:2d: d2:0c:9f:19:eb:81:5c:a5:2a:fa:c6:ba:20:27:94:e2: ea:fa:cb:f4:2c:0a:25:ba:84:51:6b:0f:b2:a1:3c:c9: 6e:27:91:76:96:39:ce:52:16:83:9a:9e:a8:cb:da:06: 1f:73:c9:79:a4:2e:d6:d9:17:f5:c3:90:c2:7e:af:de: ee:b0:3c:cd:b0:72:b4:f0:53:23:c9:21:99:74:f9:fc: aa:bf:f6:0f:2d:ae:21:e7:3f:8d:03:72:c6:b6:eb:6a: 84:31:4a:83:a5:d9:05:ff:2b:6e:05:1a:7b:66:75:90: cc:fd:db:6c:52:c9:a5:57:af:25:5d:02:3f:fa:50:32: ad:43:9e:17:20:e0:9a:b5:fc:76:d6:90:11:3f:7f:af: 87:e4:db:00:0e:b0:84:0f:3c:9a:38:c0:9b:5d:30:0c: de:b8:1d:64:0f:51:a7:f7:cd:f4:27:80:fa:a7:0a:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:fd:43:7c:19:ae:a1:46:ae:ff:d1:e0:37:04:2a:80: a9:b4:72:90:c6:c2:57:b4:e2:06:6b:24:5c:e9:cb:c2: 7e:74:ad:e3:59:f3:f6:ec:ef:ef:39:bc:4f:07:0e:46: 30:7f:67:e5:cb:81:84:bc:88:ad:08:f5:fb:82:6d:a3: 02:9b:2d:a1:7b:d9:94:01:37:51:a7:43:9a:0e:f4:b3: 39:3f:80:dd:7b:ce:25:87:02:bf:66:ec:f0:fc:45:54: 22:ee:be:81:7b:3a:e6:f4:27:e6:a3:aa:cb:8b:de:5b: fc:e3:80:1a:2b:ac:06:2d:33:c8:0d:1b:b9:76:47:8e: 01:7c:c8:bc:0a:7b:5b:f5:92:66:66:63:b2:1c:b1:c6: 88:93:8e:a2:a2:20:07:62:ae:a0:e3:bf:29:e4:55:8d: da:66:97:52:f0:c6:2e:43:96:33:11:6c:66:e8:5d:3a: c7:1e:58:2b:3c:e9:2c:ac:dc:3e:2c:68:2d:6a:2f:63: bc:fc:ba:8e:8b:aa:78:07:4a:41:11:e3:ef:b8:13:02: 89:db:6b:92:2b:32:86:9c:39:e7:c7:e2:d9:37:01:2a: 21:a8:d3:e5:74:b4:fd:31:70:cf:49:23:83:f7:d6:94: 12:6a:60:14:6d:79:af:48:92:e2:9d:c8:3b:32:20:d4 Fingerprint (SHA-256): FD:0F:03:54:15:07:0D:D1:73:5B:C9:77:DA:6F:E6:87:56:91:36:66:0D:30:EE:BE:F7:91:11:28:89:D1:42:89 Fingerprint (SHA1): 40:A7:6D:91:20:E4:88:F5:9E:E2:68:78:F8:4A:40:DE:43:A1:8B:A4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #8049: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #8050: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #8051: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #8052: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173546 (0x1957a22a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:04:55 2016 Not After : Sun Apr 25 18:04:55 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:e1:0d:eb:2a:3e:11:f8:a9:8c:f7:d0:5e:5c:b2:4b: a4:63:c3:ef:ce:2b:fe:fa:fa:bf:79:73:59:f9:e0:73: 17:b7:ae:05:e3:5d:45:94:59:18:70:05:78:3e:4a:50: a0:b4:14:cc:6f:11:a0:79:75:9a:77:47:42:d1:ee:6b: e8:86:d5:ad:0d:15:0b:11:26:a2:4f:77:4c:22:fa:01: 07:04:1b:43:5a:6e:1d:5f:31:0c:af:8f:a1:03:5a:85: 65:ac:02:60:bf:81:31:15:80:52:fb:e2:0f:66:59:70: a3:cb:6f:bf:09:25:a1:a2:e5:94:b7:7c:03:61:06:62: 30:2b:b8:35:d3:fd:a9:e3:cf:7f:35:36:8a:b1:79:b2: cc:64:72:28:26:71:cd:c4:12:54:84:47:8b:23:e9:e7: cf:ed:6f:08:f8:c0:80:88:88:2a:21:58:78:09:9b:05: 40:6e:cf:a4:e2:60:56:74:01:18:8f:13:c1:4e:c5:a3: 20:94:8e:ec:b9:b0:9c:09:48:a3:59:1d:c1:ee:10:e1: ce:23:73:2d:dd:78:f9:fb:18:97:41:0e:5f:1e:80:9b: 0b:c3:6f:8c:0a:25:bb:7b:1f:f5:c3:c7:c8:0a:f0:b3: 9f:b3:2a:31:23:d6:f2:f4:97:94:6e:b7:30:b4:51:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:8c:35:81:e4:d1:bb:1d:1f:0d:eb:3d:e0:09:fe:3e: d9:40:eb:15:21:8b:8b:3e:e7:33:8b:b1:1f:39:2b:52: b2:ea:8f:11:3e:1e:c0:14:44:22:8e:89:bf:b1:30:35: f6:82:d1:45:36:27:84:41:ae:7e:ee:81:be:66:7a:35: 38:9f:ad:32:c9:e9:11:00:50:da:54:4a:5d:78:a9:1b: 68:9c:e4:ca:92:4f:fb:e1:ef:92:fc:0d:c3:cd:37:49: 71:cc:11:37:4e:e6:0c:60:b1:05:b8:4a:b9:6b:ab:46: f9:ea:7e:ab:f5:29:b6:94:c2:41:2f:60:f2:6e:dd:da: 39:4e:f6:f8:6f:63:c3:8a:7e:f3:94:d6:c1:64:96:81: 69:c5:9e:f2:d0:78:04:28:14:fe:58:2a:06:9e:38:b7: 88:16:78:de:9d:d8:b7:4c:65:36:77:27:0e:5b:b2:5f: ea:85:09:7f:07:9c:37:a4:4f:fc:4b:e6:77:23:6d:b8: f5:06:f2:be:75:22:31:0b:1e:bb:01:83:53:c9:7a:a3: f8:ca:06:62:0c:b8:44:f8:63:eb:d5:ad:65:ed:fd:ca: 43:8e:2e:f9:39:4a:97:44:08:f6:bc:8f:01:cd:03:20: 33:91:27:15:d0:4f:46:a8:85:cc:7a:5c:37:a9:67:8c Fingerprint (SHA-256): BA:EF:33:CB:95:37:A3:DE:AA:18:CE:74:24:3A:75:AE:52:7C:04:96:BC:49:E7:FF:91:3F:00:99:92:7A:D9:03 Fingerprint (SHA1): 59:39:81:4D:F3:29:86:FF:A9:5E:A0:4C:3A:E0:A2:ED:E6:26:A6:8E Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8053: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173550 (0x1957a22e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 18:05:58 2016 Not After : Sun Apr 25 18:05:58 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:bb:0b:aa:da:e8:de:5f:88:23:f9:0e:ab:97:a5:53: ce:a3:13:b1:b7:fe:e9:c0:b7:25:ee:8d:56:f5:36:b5: c6:05:de:2f:32:ff:30:92:2c:04:67:07:cd:fd:4c:fe: 38:ce:36:a6:44:69:9c:b5:d9:a1:8c:a4:58:ef:5d:d2: 35:ac:a1:43:36:ff:51:9f:4d:d8:d1:a7:bf:e0:30:06: 9e:94:a5:4a:11:3f:c1:13:12:1a:84:d8:cf:ed:79:b1: a5:a8:c0:8b:27:f5:10:ce:a2:59:c1:3f:ac:aa:86:4d: 12:0e:72:0d:a4:56:7b:b9:78:f2:f2:f9:cc:05:43:7a: df:98:4f:fa:75:1c:a3:ff:a9:d8:b4:94:71:02:71:5d: ed:ab:57:1e:2d:24:00:60:e4:44:a5:7b:04:cb:99:8a: d5:11:a7:e7:eb:32:40:77:ce:82:d5:3d:fe:89:bb:8e: 22:d9:46:01:e7:1d:1a:a8:06:b8:08:47:1b:a1:0d:e6: c6:e4:97:8a:53:b3:33:43:ed:55:e2:fd:f4:ed:c8:29: 24:6f:91:52:3c:cc:d6:df:79:0c:24:6f:57:70:bb:7c: 6b:06:ca:b6:4a:25:e6:f1:70:c6:95:87:d9:68:e2:1f: c0:fb:05:23:10:ad:81:1a:88:67:bc:a6:e1:dc:27:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:29:d4:29:cf:01:6a:9d:f3:66:a6:a9:ad:6e:c8:13: 66:c6:6b:77:93:29:b8:c6:ff:f7:9f:a7:d5:e1:b6:a2: 38:9f:cd:62:b3:03:1c:4c:50:82:5b:fc:8e:78:76:a6: 43:75:86:84:57:89:15:7d:4e:71:cd:dd:23:f4:bc:f4: b9:be:a4:5b:0e:dc:39:96:04:be:fc:80:16:b6:67:78: 9d:4a:d9:8b:8f:bf:7c:e0:19:13:ca:85:aa:c5:32:df: 25:30:85:1e:96:85:d3:52:f1:27:2d:eb:31:18:a4:e0: 35:20:64:44:35:c3:61:e8:b7:05:21:36:e9:2f:76:8b: 10:0c:a4:f7:97:d1:bf:6c:70:24:3c:f5:20:5f:53:16: 65:80:f1:f8:f7:da:cf:49:25:7a:43:55:f8:31:48:e8: 66:cf:36:47:df:c3:07:18:e6:0d:56:4b:5f:10:a8:fd: 42:d2:2f:90:75:5c:4e:c2:e8:28:d1:85:24:79:87:db: 9d:8f:f1:ff:be:92:3d:68:17:c3:74:25:76:4d:f4:35: 43:ae:46:cb:83:60:2f:59:1b:5b:1d:a2:be:95:54:bc: f8:aa:3e:e3:a7:de:93:c5:9c:4a:d2:66:1c:3d:7d:f0: 49:89:22:3d:99:49:06:c1:fd:46:17:6c:a8:ff:6c:35 Fingerprint (SHA-256): 23:79:8F:49:0C:B9:0F:79:15:30:A6:E8:FF:03:2F:A3:13:98:B3:00:22:20:6B:97:E8:38:F5:F0:7D:8C:1B:19 Fingerprint (SHA1): 3B:BD:1F:24:63:95:43:49:03:5E:13:77:ED:E2:33:29:29:DE:D7:47 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #8054: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173546 (0x1957a22a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:04:55 2016 Not After : Sun Apr 25 18:04:55 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:e1:0d:eb:2a:3e:11:f8:a9:8c:f7:d0:5e:5c:b2:4b: a4:63:c3:ef:ce:2b:fe:fa:fa:bf:79:73:59:f9:e0:73: 17:b7:ae:05:e3:5d:45:94:59:18:70:05:78:3e:4a:50: a0:b4:14:cc:6f:11:a0:79:75:9a:77:47:42:d1:ee:6b: e8:86:d5:ad:0d:15:0b:11:26:a2:4f:77:4c:22:fa:01: 07:04:1b:43:5a:6e:1d:5f:31:0c:af:8f:a1:03:5a:85: 65:ac:02:60:bf:81:31:15:80:52:fb:e2:0f:66:59:70: a3:cb:6f:bf:09:25:a1:a2:e5:94:b7:7c:03:61:06:62: 30:2b:b8:35:d3:fd:a9:e3:cf:7f:35:36:8a:b1:79:b2: cc:64:72:28:26:71:cd:c4:12:54:84:47:8b:23:e9:e7: cf:ed:6f:08:f8:c0:80:88:88:2a:21:58:78:09:9b:05: 40:6e:cf:a4:e2:60:56:74:01:18:8f:13:c1:4e:c5:a3: 20:94:8e:ec:b9:b0:9c:09:48:a3:59:1d:c1:ee:10:e1: ce:23:73:2d:dd:78:f9:fb:18:97:41:0e:5f:1e:80:9b: 0b:c3:6f:8c:0a:25:bb:7b:1f:f5:c3:c7:c8:0a:f0:b3: 9f:b3:2a:31:23:d6:f2:f4:97:94:6e:b7:30:b4:51:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:8c:35:81:e4:d1:bb:1d:1f:0d:eb:3d:e0:09:fe:3e: d9:40:eb:15:21:8b:8b:3e:e7:33:8b:b1:1f:39:2b:52: b2:ea:8f:11:3e:1e:c0:14:44:22:8e:89:bf:b1:30:35: f6:82:d1:45:36:27:84:41:ae:7e:ee:81:be:66:7a:35: 38:9f:ad:32:c9:e9:11:00:50:da:54:4a:5d:78:a9:1b: 68:9c:e4:ca:92:4f:fb:e1:ef:92:fc:0d:c3:cd:37:49: 71:cc:11:37:4e:e6:0c:60:b1:05:b8:4a:b9:6b:ab:46: f9:ea:7e:ab:f5:29:b6:94:c2:41:2f:60:f2:6e:dd:da: 39:4e:f6:f8:6f:63:c3:8a:7e:f3:94:d6:c1:64:96:81: 69:c5:9e:f2:d0:78:04:28:14:fe:58:2a:06:9e:38:b7: 88:16:78:de:9d:d8:b7:4c:65:36:77:27:0e:5b:b2:5f: ea:85:09:7f:07:9c:37:a4:4f:fc:4b:e6:77:23:6d:b8: f5:06:f2:be:75:22:31:0b:1e:bb:01:83:53:c9:7a:a3: f8:ca:06:62:0c:b8:44:f8:63:eb:d5:ad:65:ed:fd:ca: 43:8e:2e:f9:39:4a:97:44:08:f6:bc:8f:01:cd:03:20: 33:91:27:15:d0:4f:46:a8:85:cc:7a:5c:37:a9:67:8c Fingerprint (SHA-256): BA:EF:33:CB:95:37:A3:DE:AA:18:CE:74:24:3A:75:AE:52:7C:04:96:BC:49:E7:FF:91:3F:00:99:92:7A:D9:03 Fingerprint (SHA1): 59:39:81:4D:F3:29:86:FF:A9:5E:A0:4C:3A:E0:A2:ED:E6:26:A6:8E Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8055: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #8056: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #8057: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #8058: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #8059: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #8060: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173551 (0x1957a22f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 18:06:02 2016 Not After : Sun Apr 25 18:06:02 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:35:85:a4:35:83:48:de:1e:54:7b:6f:d7:1c:73:93: 97:54:d8:c5:9f:00:55:86:14:fd:e6:8d:d2:33:5f:2a: e1:64:7f:32:b1:bb:02:a5:c8:62:95:82:75:a7:4a:6f: 9c:07:b9:de:79:07:a6:d0:8e:0c:92:05:65:12:ba:db: 07:6f:ee:4e:9f:10:a6:bd:7c:0b:c2:bc:86:e2:1e:80: e5:2e:bf:1c:be:6c:88:07:12:f1:5f:cd:cc:6c:38:fe: 48:9d:02:6c:00:16:57:91:e5:32:40:dd:2a:d6:49:61: b5:3a:18:64:af:21:6a:4f:86:6f:72:25:f0:c7:f2:f3: a2:c1:76:0d:9c:eb:20:44:ac:11:44:c1:a3:64:b7:2f: ec:f3:f7:5c:e6:9b:e3:2b:34:02:2c:d5:96:d4:b7:c9: 4f:dd:6f:ef:03:13:f3:ea:c9:11:6a:da:69:91:17:27: 1d:64:b3:38:07:bb:b3:17:b9:2f:f2:7b:46:69:69:92: 81:d2:eb:d2:f8:ad:fc:00:c9:65:eb:50:fc:94:22:d5: 4d:8c:20:c6:73:3e:c5:e8:00:a8:3f:ba:be:54:cc:27: 9e:97:7e:35:a1:72:e0:fa:d9:f6:db:a6:ec:d8:90:80: 81:99:92:2d:23:b1:26:a6:2d:a0:4d:7f:35:b7:e5:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:f3:93:63:95:52:ba:4b:1d:26:50:10:8f:01:c8:10: e2:63:93:c4:05:10:8f:d7:73:34:fa:d8:89:c2:47:3b: 09:87:3d:f4:44:a0:27:85:40:61:af:73:a9:c3:cf:fd: bb:6f:b2:8c:eb:f4:2e:ea:26:6b:10:ea:44:e9:f4:a8: 6f:7a:bc:b6:71:44:5b:ec:64:8e:e4:58:86:5f:78:b8: b9:54:3f:e3:9c:e8:5d:0d:ec:58:6b:c7:25:29:50:98: ec:05:e8:e3:5d:de:50:d5:f6:d1:05:d0:1c:48:4b:b0: 23:dd:0a:eb:3d:33:11:47:75:e4:d0:7f:3b:8a:a7:4f: 4b:98:72:56:a0:af:29:d9:d7:fc:69:6a:85:6e:dc:4f: a2:29:e6:fc:2f:3b:c2:24:8a:45:dd:da:11:ee:03:07: 84:00:13:cf:e9:a7:53:4e:42:2e:8d:7b:52:bb:c4:2d: 97:92:a0:06:7c:11:3d:27:31:69:3d:ca:ca:79:94:76: f9:5b:a3:ca:54:1e:11:dc:6b:ba:c6:0d:3d:2b:21:58: 14:37:d8:0c:80:89:10:a2:70:61:44:74:e1:11:79:bc: 90:e7:49:79:2f:2a:69:55:8a:88:75:d6:ec:f7:b4:10: 49:d0:17:b7:b2:ee:dc:fd:50:6e:01:57:61:f7:aa:c4 Fingerprint (SHA-256): 7B:A0:22:54:51:86:AF:9A:C6:10:AA:EE:E7:96:00:A9:AF:DF:73:D0:46:74:7F:00:D4:D8:C8:62:79:04:85:87 Fingerprint (SHA1): 91:EB:F3:ED:33:DF:59:86:C9:42:E7:D0:E2:29:25:7B:DF:B1:7B:21 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #8061: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #8062: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #8063: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #8064: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #8065: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8066: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8067: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #8068: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8069: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8070: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #8071: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8072: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8073: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8074: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8075: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8076: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8077: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8078: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8079: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #8080: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8081: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #8082: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8083: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #8084: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 19365 at Mon Apr 25 18:06:39 UTC 2016 kill -USR1 19365 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 19365 killed at Mon Apr 25 18:06:39 UTC 2016 httpserv starting at Mon Apr 25 18:06:39 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 18:06:39 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 2923 >/dev/null 2>/dev/null httpserv with PID 2923 found at Mon Apr 25 18:06:40 UTC 2016 httpserv with PID 2923 started at Mon Apr 25 18:06:40 UTC 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8085: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173553 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8086: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8087: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8088: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173554 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8089: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8090: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8091: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8092: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425173555 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8093: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8094: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425173556 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8095: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8096: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #8097: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8098: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8099: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 425173557 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8100: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8101: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8102: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #8103: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #8104: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173554 (0x1957a232) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:06:56 2016 Not After : Sun Apr 25 18:06:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0b:27:a0:25:a7:43:19:fb:da:74:8d:91:31:6f:d1: 5d:eb:51:52:53:3a:ec:b6:01:bf:1d:cb:0f:c5:99:65: 52:d6:f7:e9:65:96:3b:fb:f0:7a:1b:2e:7e:85:f1:c4: 3e:e8:53:74:0f:3a:5c:d0:69:2c:ac:32:41:6e:5e:5a: 3f:49:f9:6d:8f:fd:3f:28:cb:e8:f5:95:cd:7f:7a:8c: d6:1a:2b:c2:26:c5:7b:0e:33:b5:72:4a:2e:bc:12:5f: 6f:47:56:31:c9:5e:2b:2d:7e:e3:a7:ca:6d:0d:6e:09: f0:6d:31:2c:5f:71:3e:50:ef:74:b9:d9:b0:c3:2e:4b: b1:ad:d4:fe:42:3f:e2:55:52:fb:3e:ed:79:ea:c0:fa: d5:74:3b:a7:18:85:42:5e:94:47:6b:69:f7:e2:70:35: 81:5a:7d:51:49:09:ca:96:23:99:bc:51:db:43:43:e8: 4f:e8:92:5c:43:b1:50:87:7e:83:c5:c6:17:6f:83:6a: c6:8a:89:bd:70:f1:7e:7d:0f:07:28:f5:41:bd:6b:9c: 04:37:84:28:f9:cd:97:ca:c6:63:06:7f:29:77:b4:d8: bb:ca:12:21:b1:83:8b:b4:44:4b:b4:83:e5:4a:02:b6: 0c:20:0e:f7:72:73:d1:81:e4:eb:5a:d2:71:1e:7a:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:f5:40:92:ad:cf:5f:ce:e1:6f:30:3c:68:11:0a:97: f6:28:34:a7:73:ae:ce:d6:18:03:87:c7:21:16:f7:f5: 53:83:db:49:53:b8:15:09:ac:d9:42:83:7e:e5:fd:47: 51:2a:61:78:bc:18:14:a1:e0:eb:e7:35:06:1f:04:5d: 07:10:cc:f5:32:e5:5f:a3:64:4d:41:73:f8:36:36:c9: 5f:b2:41:85:d3:a6:85:86:ca:28:75:f2:9f:9a:14:68: 08:ea:8e:72:6a:eb:15:c0:51:10:ef:6a:1b:5b:48:cd: df:df:8f:b3:66:4f:99:5b:2a:c6:0d:54:0b:9f:69:83: 7a:5d:e9:37:27:d2:7c:a6:8e:6d:a4:4a:6f:25:50:49: 56:36:60:55:43:20:93:0a:b2:18:95:97:00:4f:c7:d3: f4:22:de:3c:fd:24:89:b3:a4:c6:c4:fe:aa:5e:de:c4: 44:dc:75:d7:a8:03:0b:b3:78:4f:0c:01:6a:16:fc:35: 0b:7c:54:77:d2:3c:af:4b:c1:81:4f:bb:ec:d6:19:bb: 51:83:61:46:51:af:81:2f:cf:27:ab:42:e7:dd:d8:17: cf:09:7e:a5:f6:a9:5d:25:20:60:96:58:91:60:7c:f1: 8d:a0:fc:e3:56:8b:01:dd:c9:67:74:72:47:1b:63:7e Fingerprint (SHA-256): 0A:39:E9:03:C7:C4:66:F6:39:51:84:C9:CB:96:1D:05:94:32:8E:4A:28:9D:1F:0C:DD:6E:F8:14:62:1D:14:6F Fingerprint (SHA1): DE:A2:95:01:25:36:D9:48:D0:99:42:61:DA:47:46:DD:E7:32:EE:8D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8105: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173553 (0x1957a231) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 18:06:51 2016 Not After : Sun Apr 25 18:06:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:13:dd:4b:5e:88:6c:12:93:ca:29:17:eb:6d:50:59: e8:39:2e:dc:89:67:79:e3:8e:cd:cc:b3:42:4e:c6:71: 90:ab:97:69:8a:c5:eb:ce:26:a4:38:0e:65:01:8e:fa: 70:06:a5:22:91:90:42:0d:7b:df:0b:1a:4e:4a:2c:45: e2:b8:6b:e6:d5:c3:36:53:24:05:fc:e1:81:20:82:99: 62:a0:c0:ee:ef:f8:6f:64:8b:c7:46:0e:eb:b1:46:b2: 50:15:d8:80:e0:ed:80:27:42:38:80:a5:0e:66:7f:53: e6:0f:bd:48:79:b3:c4:c3:4d:0b:c4:ff:f6:af:29:a2: e7:93:36:e2:15:9f:bf:1b:dc:d1:dd:2c:8c:89:33:33: 05:34:e8:3b:a3:ce:65:ed:b4:8b:29:e6:c2:ee:05:9d: cb:e3:01:64:1a:02:bc:3f:85:b5:a5:81:d9:53:02:9d: 81:40:57:7e:11:1f:a1:9a:01:b5:2c:1d:98:2b:1d:66: 67:cc:92:86:44:15:d9:ae:b6:5f:63:1e:3d:75:1e:46: 43:71:e8:04:aa:cd:e5:34:ca:76:84:e3:e1:41:ae:4c: 07:2f:6b:ea:9a:5f:e5:77:6e:48:98:4b:70:1c:ea:c3: f1:5d:35:af:b4:da:93:02:e7:63:be:da:31:41:c2:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:84:6d:77:e0:0d:04:c5:74:dc:1f:50:aa:14:22:77: 25:c2:fa:07:7e:89:d0:2d:91:15:f7:14:0e:26:7d:59: 2e:4f:81:34:93:d2:ec:f3:9c:01:98:15:74:0d:d2:99: c2:b8:cf:c2:21:e3:c6:4d:7e:05:e5:8a:bc:53:1d:98: 6e:57:18:3b:e1:e1:09:05:13:57:63:b3:70:24:7a:7a: 65:60:91:ac:92:21:69:4e:eb:95:9e:01:b5:be:f7:41: 3c:fa:40:6d:f8:cb:7d:78:50:70:26:33:0a:22:3f:c6: 4c:f3:ff:cb:5a:8e:f0:13:81:0b:42:e6:96:82:8e:d7: 67:91:99:78:f8:78:33:8e:18:23:5e:57:e4:a0:33:61: 19:5e:bb:68:30:73:fa:66:55:1b:69:f5:3a:f2:c4:7e: d6:72:9b:f9:d0:7a:63:70:a8:be:fc:5f:21:12:69:9f: 5b:4c:d9:ec:11:b6:a0:a6:58:b6:fe:29:f3:59:dd:d1: 23:77:6f:6d:05:42:a4:8f:a6:d2:66:7f:0b:03:7a:7e: 1a:30:8c:89:87:7f:26:23:1e:2e:1c:89:33:1c:f7:7c: 66:c0:50:c3:d8:73:53:b1:d5:d4:09:b9:67:d3:d8:5e: d0:a9:36:0d:6e:21:84:75:65:c1:a0:7e:1f:83:9d:03 Fingerprint (SHA-256): 51:47:53:EE:C4:11:04:FB:0B:77:94:F0:03:B9:8C:08:7D:41:F6:6F:61:5E:FF:87:00:55:3A:27:25:1F:AC:19 Fingerprint (SHA1): D4:1F:9F:2E:27:B9:78:07:CE:D5:3B:22:0F:96:35:D6:DA:DA:11:5F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8106: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8107: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #8108: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #8109: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173553 (0x1957a231) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 18:06:51 2016 Not After : Sun Apr 25 18:06:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:13:dd:4b:5e:88:6c:12:93:ca:29:17:eb:6d:50:59: e8:39:2e:dc:89:67:79:e3:8e:cd:cc:b3:42:4e:c6:71: 90:ab:97:69:8a:c5:eb:ce:26:a4:38:0e:65:01:8e:fa: 70:06:a5:22:91:90:42:0d:7b:df:0b:1a:4e:4a:2c:45: e2:b8:6b:e6:d5:c3:36:53:24:05:fc:e1:81:20:82:99: 62:a0:c0:ee:ef:f8:6f:64:8b:c7:46:0e:eb:b1:46:b2: 50:15:d8:80:e0:ed:80:27:42:38:80:a5:0e:66:7f:53: e6:0f:bd:48:79:b3:c4:c3:4d:0b:c4:ff:f6:af:29:a2: e7:93:36:e2:15:9f:bf:1b:dc:d1:dd:2c:8c:89:33:33: 05:34:e8:3b:a3:ce:65:ed:b4:8b:29:e6:c2:ee:05:9d: cb:e3:01:64:1a:02:bc:3f:85:b5:a5:81:d9:53:02:9d: 81:40:57:7e:11:1f:a1:9a:01:b5:2c:1d:98:2b:1d:66: 67:cc:92:86:44:15:d9:ae:b6:5f:63:1e:3d:75:1e:46: 43:71:e8:04:aa:cd:e5:34:ca:76:84:e3:e1:41:ae:4c: 07:2f:6b:ea:9a:5f:e5:77:6e:48:98:4b:70:1c:ea:c3: f1:5d:35:af:b4:da:93:02:e7:63:be:da:31:41:c2:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:84:6d:77:e0:0d:04:c5:74:dc:1f:50:aa:14:22:77: 25:c2:fa:07:7e:89:d0:2d:91:15:f7:14:0e:26:7d:59: 2e:4f:81:34:93:d2:ec:f3:9c:01:98:15:74:0d:d2:99: c2:b8:cf:c2:21:e3:c6:4d:7e:05:e5:8a:bc:53:1d:98: 6e:57:18:3b:e1:e1:09:05:13:57:63:b3:70:24:7a:7a: 65:60:91:ac:92:21:69:4e:eb:95:9e:01:b5:be:f7:41: 3c:fa:40:6d:f8:cb:7d:78:50:70:26:33:0a:22:3f:c6: 4c:f3:ff:cb:5a:8e:f0:13:81:0b:42:e6:96:82:8e:d7: 67:91:99:78:f8:78:33:8e:18:23:5e:57:e4:a0:33:61: 19:5e:bb:68:30:73:fa:66:55:1b:69:f5:3a:f2:c4:7e: d6:72:9b:f9:d0:7a:63:70:a8:be:fc:5f:21:12:69:9f: 5b:4c:d9:ec:11:b6:a0:a6:58:b6:fe:29:f3:59:dd:d1: 23:77:6f:6d:05:42:a4:8f:a6:d2:66:7f:0b:03:7a:7e: 1a:30:8c:89:87:7f:26:23:1e:2e:1c:89:33:1c:f7:7c: 66:c0:50:c3:d8:73:53:b1:d5:d4:09:b9:67:d3:d8:5e: d0:a9:36:0d:6e:21:84:75:65:c1:a0:7e:1f:83:9d:03 Fingerprint (SHA-256): 51:47:53:EE:C4:11:04:FB:0B:77:94:F0:03:B9:8C:08:7D:41:F6:6F:61:5E:FF:87:00:55:3A:27:25:1F:AC:19 Fingerprint (SHA1): D4:1F:9F:2E:27:B9:78:07:CE:D5:3B:22:0F:96:35:D6:DA:DA:11:5F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8110: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173554 (0x1957a232) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:06:56 2016 Not After : Sun Apr 25 18:06:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0b:27:a0:25:a7:43:19:fb:da:74:8d:91:31:6f:d1: 5d:eb:51:52:53:3a:ec:b6:01:bf:1d:cb:0f:c5:99:65: 52:d6:f7:e9:65:96:3b:fb:f0:7a:1b:2e:7e:85:f1:c4: 3e:e8:53:74:0f:3a:5c:d0:69:2c:ac:32:41:6e:5e:5a: 3f:49:f9:6d:8f:fd:3f:28:cb:e8:f5:95:cd:7f:7a:8c: d6:1a:2b:c2:26:c5:7b:0e:33:b5:72:4a:2e:bc:12:5f: 6f:47:56:31:c9:5e:2b:2d:7e:e3:a7:ca:6d:0d:6e:09: f0:6d:31:2c:5f:71:3e:50:ef:74:b9:d9:b0:c3:2e:4b: b1:ad:d4:fe:42:3f:e2:55:52:fb:3e:ed:79:ea:c0:fa: d5:74:3b:a7:18:85:42:5e:94:47:6b:69:f7:e2:70:35: 81:5a:7d:51:49:09:ca:96:23:99:bc:51:db:43:43:e8: 4f:e8:92:5c:43:b1:50:87:7e:83:c5:c6:17:6f:83:6a: c6:8a:89:bd:70:f1:7e:7d:0f:07:28:f5:41:bd:6b:9c: 04:37:84:28:f9:cd:97:ca:c6:63:06:7f:29:77:b4:d8: bb:ca:12:21:b1:83:8b:b4:44:4b:b4:83:e5:4a:02:b6: 0c:20:0e:f7:72:73:d1:81:e4:eb:5a:d2:71:1e:7a:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:f5:40:92:ad:cf:5f:ce:e1:6f:30:3c:68:11:0a:97: f6:28:34:a7:73:ae:ce:d6:18:03:87:c7:21:16:f7:f5: 53:83:db:49:53:b8:15:09:ac:d9:42:83:7e:e5:fd:47: 51:2a:61:78:bc:18:14:a1:e0:eb:e7:35:06:1f:04:5d: 07:10:cc:f5:32:e5:5f:a3:64:4d:41:73:f8:36:36:c9: 5f:b2:41:85:d3:a6:85:86:ca:28:75:f2:9f:9a:14:68: 08:ea:8e:72:6a:eb:15:c0:51:10:ef:6a:1b:5b:48:cd: df:df:8f:b3:66:4f:99:5b:2a:c6:0d:54:0b:9f:69:83: 7a:5d:e9:37:27:d2:7c:a6:8e:6d:a4:4a:6f:25:50:49: 56:36:60:55:43:20:93:0a:b2:18:95:97:00:4f:c7:d3: f4:22:de:3c:fd:24:89:b3:a4:c6:c4:fe:aa:5e:de:c4: 44:dc:75:d7:a8:03:0b:b3:78:4f:0c:01:6a:16:fc:35: 0b:7c:54:77:d2:3c:af:4b:c1:81:4f:bb:ec:d6:19:bb: 51:83:61:46:51:af:81:2f:cf:27:ab:42:e7:dd:d8:17: cf:09:7e:a5:f6:a9:5d:25:20:60:96:58:91:60:7c:f1: 8d:a0:fc:e3:56:8b:01:dd:c9:67:74:72:47:1b:63:7e Fingerprint (SHA-256): 0A:39:E9:03:C7:C4:66:F6:39:51:84:C9:CB:96:1D:05:94:32:8E:4A:28:9D:1F:0C:DD:6E:F8:14:62:1D:14:6F Fingerprint (SHA1): DE:A2:95:01:25:36:D9:48:D0:99:42:61:DA:47:46:DD:E7:32:EE:8D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8111: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #8112: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #8113: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8114: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8115: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8116: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173554 (0x1957a232) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:06:56 2016 Not After : Sun Apr 25 18:06:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0b:27:a0:25:a7:43:19:fb:da:74:8d:91:31:6f:d1: 5d:eb:51:52:53:3a:ec:b6:01:bf:1d:cb:0f:c5:99:65: 52:d6:f7:e9:65:96:3b:fb:f0:7a:1b:2e:7e:85:f1:c4: 3e:e8:53:74:0f:3a:5c:d0:69:2c:ac:32:41:6e:5e:5a: 3f:49:f9:6d:8f:fd:3f:28:cb:e8:f5:95:cd:7f:7a:8c: d6:1a:2b:c2:26:c5:7b:0e:33:b5:72:4a:2e:bc:12:5f: 6f:47:56:31:c9:5e:2b:2d:7e:e3:a7:ca:6d:0d:6e:09: f0:6d:31:2c:5f:71:3e:50:ef:74:b9:d9:b0:c3:2e:4b: b1:ad:d4:fe:42:3f:e2:55:52:fb:3e:ed:79:ea:c0:fa: d5:74:3b:a7:18:85:42:5e:94:47:6b:69:f7:e2:70:35: 81:5a:7d:51:49:09:ca:96:23:99:bc:51:db:43:43:e8: 4f:e8:92:5c:43:b1:50:87:7e:83:c5:c6:17:6f:83:6a: c6:8a:89:bd:70:f1:7e:7d:0f:07:28:f5:41:bd:6b:9c: 04:37:84:28:f9:cd:97:ca:c6:63:06:7f:29:77:b4:d8: bb:ca:12:21:b1:83:8b:b4:44:4b:b4:83:e5:4a:02:b6: 0c:20:0e:f7:72:73:d1:81:e4:eb:5a:d2:71:1e:7a:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:f5:40:92:ad:cf:5f:ce:e1:6f:30:3c:68:11:0a:97: f6:28:34:a7:73:ae:ce:d6:18:03:87:c7:21:16:f7:f5: 53:83:db:49:53:b8:15:09:ac:d9:42:83:7e:e5:fd:47: 51:2a:61:78:bc:18:14:a1:e0:eb:e7:35:06:1f:04:5d: 07:10:cc:f5:32:e5:5f:a3:64:4d:41:73:f8:36:36:c9: 5f:b2:41:85:d3:a6:85:86:ca:28:75:f2:9f:9a:14:68: 08:ea:8e:72:6a:eb:15:c0:51:10:ef:6a:1b:5b:48:cd: df:df:8f:b3:66:4f:99:5b:2a:c6:0d:54:0b:9f:69:83: 7a:5d:e9:37:27:d2:7c:a6:8e:6d:a4:4a:6f:25:50:49: 56:36:60:55:43:20:93:0a:b2:18:95:97:00:4f:c7:d3: f4:22:de:3c:fd:24:89:b3:a4:c6:c4:fe:aa:5e:de:c4: 44:dc:75:d7:a8:03:0b:b3:78:4f:0c:01:6a:16:fc:35: 0b:7c:54:77:d2:3c:af:4b:c1:81:4f:bb:ec:d6:19:bb: 51:83:61:46:51:af:81:2f:cf:27:ab:42:e7:dd:d8:17: cf:09:7e:a5:f6:a9:5d:25:20:60:96:58:91:60:7c:f1: 8d:a0:fc:e3:56:8b:01:dd:c9:67:74:72:47:1b:63:7e Fingerprint (SHA-256): 0A:39:E9:03:C7:C4:66:F6:39:51:84:C9:CB:96:1D:05:94:32:8E:4A:28:9D:1F:0C:DD:6E:F8:14:62:1D:14:6F Fingerprint (SHA1): DE:A2:95:01:25:36:D9:48:D0:99:42:61:DA:47:46:DD:E7:32:EE:8D Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8117: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173554 (0x1957a232) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:06:56 2016 Not After : Sun Apr 25 18:06:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0b:27:a0:25:a7:43:19:fb:da:74:8d:91:31:6f:d1: 5d:eb:51:52:53:3a:ec:b6:01:bf:1d:cb:0f:c5:99:65: 52:d6:f7:e9:65:96:3b:fb:f0:7a:1b:2e:7e:85:f1:c4: 3e:e8:53:74:0f:3a:5c:d0:69:2c:ac:32:41:6e:5e:5a: 3f:49:f9:6d:8f:fd:3f:28:cb:e8:f5:95:cd:7f:7a:8c: d6:1a:2b:c2:26:c5:7b:0e:33:b5:72:4a:2e:bc:12:5f: 6f:47:56:31:c9:5e:2b:2d:7e:e3:a7:ca:6d:0d:6e:09: f0:6d:31:2c:5f:71:3e:50:ef:74:b9:d9:b0:c3:2e:4b: b1:ad:d4:fe:42:3f:e2:55:52:fb:3e:ed:79:ea:c0:fa: d5:74:3b:a7:18:85:42:5e:94:47:6b:69:f7:e2:70:35: 81:5a:7d:51:49:09:ca:96:23:99:bc:51:db:43:43:e8: 4f:e8:92:5c:43:b1:50:87:7e:83:c5:c6:17:6f:83:6a: c6:8a:89:bd:70:f1:7e:7d:0f:07:28:f5:41:bd:6b:9c: 04:37:84:28:f9:cd:97:ca:c6:63:06:7f:29:77:b4:d8: bb:ca:12:21:b1:83:8b:b4:44:4b:b4:83:e5:4a:02:b6: 0c:20:0e:f7:72:73:d1:81:e4:eb:5a:d2:71:1e:7a:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:f5:40:92:ad:cf:5f:ce:e1:6f:30:3c:68:11:0a:97: f6:28:34:a7:73:ae:ce:d6:18:03:87:c7:21:16:f7:f5: 53:83:db:49:53:b8:15:09:ac:d9:42:83:7e:e5:fd:47: 51:2a:61:78:bc:18:14:a1:e0:eb:e7:35:06:1f:04:5d: 07:10:cc:f5:32:e5:5f:a3:64:4d:41:73:f8:36:36:c9: 5f:b2:41:85:d3:a6:85:86:ca:28:75:f2:9f:9a:14:68: 08:ea:8e:72:6a:eb:15:c0:51:10:ef:6a:1b:5b:48:cd: df:df:8f:b3:66:4f:99:5b:2a:c6:0d:54:0b:9f:69:83: 7a:5d:e9:37:27:d2:7c:a6:8e:6d:a4:4a:6f:25:50:49: 56:36:60:55:43:20:93:0a:b2:18:95:97:00:4f:c7:d3: f4:22:de:3c:fd:24:89:b3:a4:c6:c4:fe:aa:5e:de:c4: 44:dc:75:d7:a8:03:0b:b3:78:4f:0c:01:6a:16:fc:35: 0b:7c:54:77:d2:3c:af:4b:c1:81:4f:bb:ec:d6:19:bb: 51:83:61:46:51:af:81:2f:cf:27:ab:42:e7:dd:d8:17: cf:09:7e:a5:f6:a9:5d:25:20:60:96:58:91:60:7c:f1: 8d:a0:fc:e3:56:8b:01:dd:c9:67:74:72:47:1b:63:7e Fingerprint (SHA-256): 0A:39:E9:03:C7:C4:66:F6:39:51:84:C9:CB:96:1D:05:94:32:8E:4A:28:9D:1F:0C:DD:6E:F8:14:62:1D:14:6F Fingerprint (SHA1): DE:A2:95:01:25:36:D9:48:D0:99:42:61:DA:47:46:DD:E7:32:EE:8D Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8118: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #8119: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #8120: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8121: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #8122: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #8123: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173553 (0x1957a231) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 18:06:51 2016 Not After : Sun Apr 25 18:06:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:13:dd:4b:5e:88:6c:12:93:ca:29:17:eb:6d:50:59: e8:39:2e:dc:89:67:79:e3:8e:cd:cc:b3:42:4e:c6:71: 90:ab:97:69:8a:c5:eb:ce:26:a4:38:0e:65:01:8e:fa: 70:06:a5:22:91:90:42:0d:7b:df:0b:1a:4e:4a:2c:45: e2:b8:6b:e6:d5:c3:36:53:24:05:fc:e1:81:20:82:99: 62:a0:c0:ee:ef:f8:6f:64:8b:c7:46:0e:eb:b1:46:b2: 50:15:d8:80:e0:ed:80:27:42:38:80:a5:0e:66:7f:53: e6:0f:bd:48:79:b3:c4:c3:4d:0b:c4:ff:f6:af:29:a2: e7:93:36:e2:15:9f:bf:1b:dc:d1:dd:2c:8c:89:33:33: 05:34:e8:3b:a3:ce:65:ed:b4:8b:29:e6:c2:ee:05:9d: cb:e3:01:64:1a:02:bc:3f:85:b5:a5:81:d9:53:02:9d: 81:40:57:7e:11:1f:a1:9a:01:b5:2c:1d:98:2b:1d:66: 67:cc:92:86:44:15:d9:ae:b6:5f:63:1e:3d:75:1e:46: 43:71:e8:04:aa:cd:e5:34:ca:76:84:e3:e1:41:ae:4c: 07:2f:6b:ea:9a:5f:e5:77:6e:48:98:4b:70:1c:ea:c3: f1:5d:35:af:b4:da:93:02:e7:63:be:da:31:41:c2:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:84:6d:77:e0:0d:04:c5:74:dc:1f:50:aa:14:22:77: 25:c2:fa:07:7e:89:d0:2d:91:15:f7:14:0e:26:7d:59: 2e:4f:81:34:93:d2:ec:f3:9c:01:98:15:74:0d:d2:99: c2:b8:cf:c2:21:e3:c6:4d:7e:05:e5:8a:bc:53:1d:98: 6e:57:18:3b:e1:e1:09:05:13:57:63:b3:70:24:7a:7a: 65:60:91:ac:92:21:69:4e:eb:95:9e:01:b5:be:f7:41: 3c:fa:40:6d:f8:cb:7d:78:50:70:26:33:0a:22:3f:c6: 4c:f3:ff:cb:5a:8e:f0:13:81:0b:42:e6:96:82:8e:d7: 67:91:99:78:f8:78:33:8e:18:23:5e:57:e4:a0:33:61: 19:5e:bb:68:30:73:fa:66:55:1b:69:f5:3a:f2:c4:7e: d6:72:9b:f9:d0:7a:63:70:a8:be:fc:5f:21:12:69:9f: 5b:4c:d9:ec:11:b6:a0:a6:58:b6:fe:29:f3:59:dd:d1: 23:77:6f:6d:05:42:a4:8f:a6:d2:66:7f:0b:03:7a:7e: 1a:30:8c:89:87:7f:26:23:1e:2e:1c:89:33:1c:f7:7c: 66:c0:50:c3:d8:73:53:b1:d5:d4:09:b9:67:d3:d8:5e: d0:a9:36:0d:6e:21:84:75:65:c1:a0:7e:1f:83:9d:03 Fingerprint (SHA-256): 51:47:53:EE:C4:11:04:FB:0B:77:94:F0:03:B9:8C:08:7D:41:F6:6F:61:5E:FF:87:00:55:3A:27:25:1F:AC:19 Fingerprint (SHA1): D4:1F:9F:2E:27:B9:78:07:CE:D5:3B:22:0F:96:35:D6:DA:DA:11:5F Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8124: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173553 (0x1957a231) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 18:06:51 2016 Not After : Sun Apr 25 18:06:51 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:13:dd:4b:5e:88:6c:12:93:ca:29:17:eb:6d:50:59: e8:39:2e:dc:89:67:79:e3:8e:cd:cc:b3:42:4e:c6:71: 90:ab:97:69:8a:c5:eb:ce:26:a4:38:0e:65:01:8e:fa: 70:06:a5:22:91:90:42:0d:7b:df:0b:1a:4e:4a:2c:45: e2:b8:6b:e6:d5:c3:36:53:24:05:fc:e1:81:20:82:99: 62:a0:c0:ee:ef:f8:6f:64:8b:c7:46:0e:eb:b1:46:b2: 50:15:d8:80:e0:ed:80:27:42:38:80:a5:0e:66:7f:53: e6:0f:bd:48:79:b3:c4:c3:4d:0b:c4:ff:f6:af:29:a2: e7:93:36:e2:15:9f:bf:1b:dc:d1:dd:2c:8c:89:33:33: 05:34:e8:3b:a3:ce:65:ed:b4:8b:29:e6:c2:ee:05:9d: cb:e3:01:64:1a:02:bc:3f:85:b5:a5:81:d9:53:02:9d: 81:40:57:7e:11:1f:a1:9a:01:b5:2c:1d:98:2b:1d:66: 67:cc:92:86:44:15:d9:ae:b6:5f:63:1e:3d:75:1e:46: 43:71:e8:04:aa:cd:e5:34:ca:76:84:e3:e1:41:ae:4c: 07:2f:6b:ea:9a:5f:e5:77:6e:48:98:4b:70:1c:ea:c3: f1:5d:35:af:b4:da:93:02:e7:63:be:da:31:41:c2:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:84:6d:77:e0:0d:04:c5:74:dc:1f:50:aa:14:22:77: 25:c2:fa:07:7e:89:d0:2d:91:15:f7:14:0e:26:7d:59: 2e:4f:81:34:93:d2:ec:f3:9c:01:98:15:74:0d:d2:99: c2:b8:cf:c2:21:e3:c6:4d:7e:05:e5:8a:bc:53:1d:98: 6e:57:18:3b:e1:e1:09:05:13:57:63:b3:70:24:7a:7a: 65:60:91:ac:92:21:69:4e:eb:95:9e:01:b5:be:f7:41: 3c:fa:40:6d:f8:cb:7d:78:50:70:26:33:0a:22:3f:c6: 4c:f3:ff:cb:5a:8e:f0:13:81:0b:42:e6:96:82:8e:d7: 67:91:99:78:f8:78:33:8e:18:23:5e:57:e4:a0:33:61: 19:5e:bb:68:30:73:fa:66:55:1b:69:f5:3a:f2:c4:7e: d6:72:9b:f9:d0:7a:63:70:a8:be:fc:5f:21:12:69:9f: 5b:4c:d9:ec:11:b6:a0:a6:58:b6:fe:29:f3:59:dd:d1: 23:77:6f:6d:05:42:a4:8f:a6:d2:66:7f:0b:03:7a:7e: 1a:30:8c:89:87:7f:26:23:1e:2e:1c:89:33:1c:f7:7c: 66:c0:50:c3:d8:73:53:b1:d5:d4:09:b9:67:d3:d8:5e: d0:a9:36:0d:6e:21:84:75:65:c1:a0:7e:1f:83:9d:03 Fingerprint (SHA-256): 51:47:53:EE:C4:11:04:FB:0B:77:94:F0:03:B9:8C:08:7D:41:F6:6F:61:5E:FF:87:00:55:3A:27:25:1F:AC:19 Fingerprint (SHA1): D4:1F:9F:2E:27:B9:78:07:CE:D5:3B:22:0F:96:35:D6:DA:DA:11:5F Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8125: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #8126: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173558 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8127: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #8128: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #8129: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173559 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8130: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #8131: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #8132: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173560 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8133: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #8134: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #8135: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173561 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8136: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #8137: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #8138: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173562 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8139: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #8140: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #8141: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173563 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8142: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #8143: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #8144: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173564 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8145: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #8146: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #8147: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173565 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8148: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #8149: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #8150: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173566 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8151: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #8152: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #8153: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8154: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 425173567 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8155: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8156: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 425173568 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8157: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8158: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 425173569 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8159: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8160: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #8161: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #8162: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8163: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 425173570 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8164: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8165: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 425173571 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8166: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8167: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 425173572 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8168: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8169: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #8170: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #8171: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8172: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 425173573 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8173: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8174: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 425173574 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8175: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8176: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 425173575 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8177: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8178: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #8179: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #8180: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8181: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 425173576 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8182: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8183: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 425173577 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8184: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8185: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 425173578 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8186: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8187: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #8188: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8189: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8190: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 425173579 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8191: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8192: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8193: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8194: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173580 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8195: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8196: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173558 (0x1957a236) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Apr 25 18:07:44 2016 Not After : Sun Apr 25 18:07:44 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:a0:4e:40:3b:ca:c8:ed:fe:60:8c:25:6e:e3:73:9f: cd:47:76:94:b0:63:c4:26:62:f4:85:23:a4:76:d5:f7: d8:5e:07:5a:2f:3f:cc:bd:f3:1a:f2:66:c2:35:62:68: cd:81:15:75:48:50:bb:bf:60:ec:49:0f:9c:11:b7:f9: 36:fb:7f:e1:16:ce:b3:2f:23:d6:bf:5e:5b:fb:76:20: 1a:00:6a:a0:f2:c5:5c:de:1b:f3:6e:f5:99:6a:ab:ae: 6f:cd:5c:86:9a:92:ac:d6:0b:33:d9:af:5e:b0:a4:22: 40:c5:1c:d1:96:92:a5:64:95:46:d5:d2:45:e6:21:c9: 5b:e4:b7:ad:e0:77:13:82:f9:43:a8:c6:c6:43:83:8a: 7a:43:fc:8e:58:ca:ae:25:f3:ac:4d:01:ed:8c:c6:f4: 70:94:04:6b:26:ca:0b:73:b7:e9:35:2b:51:5a:4a:96: a9:f7:90:aa:fa:80:36:52:ac:b8:2b:2e:ff:7c:a9:8c: 58:ad:fe:1c:5e:1b:91:b0:8e:6c:d6:df:23:1f:03:62: 01:d6:61:3d:49:14:0d:63:ae:a8:55:38:33:2d:4d:ff: f6:21:f6:83:f4:2a:50:7e:4b:15:bd:6f:af:00:57:0f: b4:51:47:dd:5f:f5:31:68:bc:c9:91:64:62:ee:b3:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:7f:a9:e9:62:51:d5:27:2c:95:8e:95:a5:d9:d0:ab: 2d:7f:09:e4:c6:a9:48:95:d0:ed:43:e6:49:93:48:e1: f9:25:50:61:12:bf:58:c4:ce:23:72:b2:10:d7:18:19: 9b:ba:b6:33:01:6b:83:95:ee:a3:f5:60:98:96:e7:84: ba:5c:c0:f2:f4:f7:e0:7a:b2:6e:5f:08:92:88:1f:70: 09:43:75:5f:6c:ab:a6:db:1e:73:6c:b1:40:b9:f7:83: a3:98:8b:53:ca:94:13:9e:b9:d7:0d:77:43:59:4e:04: 67:89:e5:78:ee:30:15:53:e1:0d:e6:63:6d:0a:70:73: c9:0a:df:e1:69:ae:51:fa:aa:b1:c4:f8:a5:50:74:5b: 04:46:3b:cc:a5:6d:1a:7a:b6:4f:78:f6:26:e7:69:47: 62:80:f1:d1:c2:57:5f:2e:3c:c2:79:44:f0:6f:b5:90: 6b:22:b4:4d:25:de:f7:27:f9:e3:42:36:33:fb:ab:e6: 2c:21:33:11:d9:40:0e:22:92:36:bd:5a:29:a6:22:f5: 9c:43:37:0c:8a:d2:f9:53:6e:58:9d:04:ab:d8:aa:1f: c5:f4:ff:12:0c:bc:d6:03:b2:40:39:cb:77:4a:b4:43: a4:1d:cd:f3:b0:61:d6:02:d3:3d:0b:51:f6:f2:f1:57 Fingerprint (SHA-256): BB:05:2C:53:3A:4D:E5:BD:B7:CB:DA:27:50:BC:0E:7C:37:6C:02:55:2A:E5:EC:61:E7:DA:5B:88:7F:87:C7:93 Fingerprint (SHA1): 25:33:DB:9B:EA:BD:42:95:52:B6:EA:2F:23:C7:E9:66:D5:2C:C9:66 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8197: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173559 (0x1957a237) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Apr 25 18:07:55 2016 Not After : Sun Apr 25 18:07:55 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:cf:29:e1:3f:12:8c:fd:f1:52:82:76:46:94:64:65: 7d:df:57:49:91:d6:d4:02:ea:3e:ea:ae:91:86:28:e5: 21:85:a7:c0:95:8d:2b:b3:c3:cf:19:3d:13:51:d7:43: 6e:95:99:b1:39:52:f1:11:ba:11:e2:f9:8e:45:27:33: 12:68:46:6e:a1:da:2c:39:0f:d3:c7:67:e3:c6:17:13: 24:20:28:44:00:59:b6:ff:c0:fc:eb:93:a1:b5:24:2c: 39:73:05:01:d7:1b:20:86:b1:1b:b3:b8:cc:fa:82:df: bb:e7:4c:9c:34:48:ea:00:04:66:13:25:8b:cb:91:c4: 07:d9:46:39:c6:a6:02:62:70:06:62:3b:1b:69:ab:0e: 67:b7:ab:35:1f:cd:6b:bd:1b:1f:03:0a:5e:d6:9d:1d: 44:03:8d:3a:30:6d:01:2e:45:8e:c0:3d:8e:3d:8b:5b: 1a:96:47:51:6d:9d:72:16:df:35:91:66:fb:2d:fe:7e: 5b:27:e5:4b:f2:49:77:74:b1:21:89:33:f5:01:40:71: 9c:69:a9:75:4b:1b:e6:0a:89:64:5e:71:10:aa:4b:4e: 89:5d:cc:9f:ca:e2:a2:e5:9d:ff:d3:18:4a:96:f5:c3: d7:0f:17:a4:e2:51:cd:ba:60:f6:ca:25:4c:70:ea:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:ce:13:0b:61:bb:50:8e:fa:3d:35:ac:53:58:9c:63: 5f:43:f6:1a:02:af:bf:0a:eb:79:da:6f:a9:a9:b9:06: e4:34:21:be:15:a0:f3:e1:a2:9e:c0:68:81:66:90:de: 9e:47:09:b5:6d:0d:d5:e6:de:13:7c:56:8b:3d:8a:24: 3f:88:a6:db:46:a1:39:ef:55:fc:ad:03:cc:fd:9e:50: da:57:b7:51:37:e0:db:14:63:fe:11:08:a6:46:8e:5f: 6f:f8:02:0b:30:28:2e:9e:ed:0f:4e:1b:f4:53:35:36: 90:9c:d3:39:ae:44:89:7d:cd:30:0c:c9:3d:c1:e1:02: df:55:31:40:a6:a6:51:4c:9f:8c:b5:33:db:44:47:76: 11:d3:65:dd:26:7c:e3:6c:a0:b4:44:d6:fb:10:9f:f4: 9a:c6:88:7f:12:95:d2:a0:e4:e6:c9:30:39:10:b7:cf: 7c:39:a2:c0:99:c2:ed:6b:fa:43:df:83:6c:ae:66:54: 76:eb:1c:cb:bb:67:f7:96:cc:4c:cd:7f:b7:4d:99:67: 7f:62:d9:be:bd:4d:f1:90:a5:75:62:5b:f4:82:b7:78: a6:ff:88:33:3d:0b:10:66:4f:dc:93:b2:0e:fa:88:15: c5:f6:b6:7e:5b:6e:63:62:ce:0f:04:7b:64:42:02:b4 Fingerprint (SHA-256): E8:AC:13:AE:B4:A7:3F:9A:7B:E2:4D:C0:D2:0E:69:17:54:97:2B:45:49:5C:C6:E2:90:DB:CF:3C:3D:A3:FC:D2 Fingerprint (SHA1): CE:29:E2:52:E2:A4:50:72:6D:28:F2:4B:A1:33:8C:DD:33:4D:C9:82 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8198: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173560 (0x1957a238) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Apr 25 18:07:59 2016 Not After : Sun Apr 25 18:07:59 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:2b:e9:8c:07:63:db:67:55:31:ac:4c:f0:54:64:ed: 98:e7:53:80:23:7d:1d:93:17:73:d5:ee:d9:b0:22:c1: 81:32:a8:59:33:13:8a:a2:87:b3:3f:1c:c7:19:13:67: 15:1c:2f:49:ad:55:04:d5:d1:f2:f4:d5:21:8a:8b:ff: c0:b7:11:c5:d8:f1:88:16:63:b4:a0:97:54:6e:c3:a7: d5:e6:0c:e2:80:d3:ff:24:2b:c9:a4:d0:14:b0:ca:b7: 3e:3a:1b:6a:bb:cf:45:31:fd:eb:15:80:bb:3f:55:be: b5:7f:2b:d0:1a:b6:65:86:b9:c7:9e:1f:c3:a5:e1:c7: 93:2c:82:55:6d:f9:45:4a:8d:b8:4b:07:74:b2:6a:6c: f4:5d:c8:79:a5:59:6e:09:c5:44:e1:40:6b:6c:f2:15: 6b:da:78:f8:da:62:4a:39:d0:a1:7d:50:1f:c8:3a:a8: 4a:e6:aa:aa:8b:82:76:40:dc:ea:10:04:a6:c2:70:e6: 5b:30:5c:74:92:18:d1:ff:92:2a:ba:09:9e:99:4c:95: 6e:14:8e:5f:70:e6:43:7c:9e:88:78:1d:cc:51:62:50: 03:51:12:8f:5b:d4:e2:9c:f8:14:07:77:19:f2:92:12: d5:13:a6:ed:61:4f:da:14:ba:66:9b:8c:27:ba:d9:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:9b:7a:b5:04:14:30:4a:d0:e0:54:0b:29:27:dc:43: b7:81:64:22:2e:12:13:e0:49:a9:73:22:3b:c6:c5:b3: 3c:91:b2:25:b3:cb:8a:57:94:3e:5e:0b:8d:17:14:44: 94:a3:db:09:ad:74:66:41:7e:83:7d:fa:07:6d:a4:17: e6:59:f6:83:72:65:ff:61:eb:e8:0e:36:de:0d:aa:22: cf:c2:73:91:97:0c:8f:37:7e:a9:dd:b9:13:2e:6d:d4: 0a:f3:fa:d2:3b:c9:7b:e7:23:ef:84:7a:18:0a:04:1e: ac:e5:28:6e:d5:3d:6e:00:42:75:80:26:15:65:9f:95: 19:2a:89:da:30:76:8b:db:ee:c5:13:85:44:33:d9:57: ec:c9:ee:ce:3a:5c:33:0c:bb:39:99:6a:3c:c9:04:48: cc:79:a1:73:f3:22:27:59:71:f3:26:0f:e6:ca:93:d2: 76:a7:78:04:ba:15:e8:4e:f5:76:d6:89:44:36:f0:28: f3:32:c5:e0:4a:85:a2:1a:7a:f1:e7:32:5d:19:82:7a: 9c:5c:fc:fa:0a:1a:d4:c9:89:02:d8:35:77:d0:65:18: 16:b1:b5:5e:17:3b:f9:78:9a:c5:86:8a:c6:f9:d9:14: 5b:6f:b2:ab:b4:88:4f:af:43:c0:2f:e3:aa:2c:21:eb Fingerprint (SHA-256): 89:69:4E:AF:9B:A0:9B:40:AB:8F:A6:40:74:9F:71:EE:8D:38:9A:5B:45:8D:5E:13:FC:7B:B7:86:5E:14:03:25 Fingerprint (SHA1): DF:15:C7:E3:F7:6E:B6:0A:6D:27:65:0B:D8:BA:D7:FE:A7:68:C0:61 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #8199: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173561 (0x1957a239) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Apr 25 18:08:08 2016 Not After : Sun Apr 25 18:08:08 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:c4:fd:0f:db:12:ec:6d:36:ea:8d:21:2f:21:8a:6c: eb:6f:47:3c:bc:52:60:db:ed:6d:f9:2c:4f:08:b6:f5: f8:06:5c:b0:29:2a:32:27:00:40:1b:93:d4:b5:9a:0f: 48:79:89:36:f7:4e:0a:de:3a:03:85:b5:71:20:1a:a2: b1:a9:15:7f:86:44:94:00:84:c2:69:4b:c2:1c:e7:07: 5d:e8:2e:6a:52:f0:c2:46:23:13:b7:c2:1c:7f:fc:47: 85:75:a3:8d:17:11:25:a3:90:e3:50:30:47:9c:3c:c8: 26:61:59:5e:ba:10:16:eb:35:fb:cc:71:ac:9d:9e:aa: ea:b1:a0:29:38:b9:2f:ae:56:fb:d0:7e:9e:a0:39:d0: 82:80:13:7d:f6:29:97:57:5d:6c:44:9e:9e:7e:e5:56: 84:63:5b:6b:00:8c:c5:e4:77:9a:0f:72:0c:2c:55:4d: bb:4e:7c:88:06:8e:86:d0:ec:70:5b:f7:0a:bc:5f:d7: 63:f2:1c:72:77:b6:67:75:30:64:80:6f:fb:25:14:57: 64:4c:4a:82:19:41:b0:89:2e:f1:5e:db:32:c6:8b:f1: 35:67:77:8b:eb:98:96:ae:04:75:23:ab:13:35:4b:76: c6:3f:2a:6e:07:29:bf:6b:c1:36:20:f2:65:cc:4d:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:48:cf:68:3c:cc:33:7e:43:8b:b1:78:a2:fa:10:b8: 1f:0e:d8:08:b5:f6:4c:c6:37:28:8f:b5:56:fc:1f:9c: 52:f2:a3:85:90:31:da:9f:51:57:45:6d:1a:90:44:2e: aa:ac:2f:d5:84:e4:95:af:dc:ad:ab:83:29:27:42:34: 18:35:38:cd:48:95:a0:1d:3a:21:03:c6:d0:b6:77:f1: b4:19:a6:00:07:7d:72:9e:17:85:ef:8e:50:fd:ae:8b: e8:95:97:ea:77:ee:f0:bb:0a:c2:d2:05:a3:c9:cf:45: 1c:ef:8d:46:91:e5:a7:45:db:55:ea:8c:b1:e5:96:6a: c8:9c:a5:98:0a:38:b7:a0:c4:18:13:79:61:99:85:28: 3e:3b:23:f0:b2:3f:ee:cc:7a:83:33:65:cb:26:74:ad: 71:8a:12:c7:94:0f:a3:19:b8:33:80:74:b4:1d:da:b7: 94:b3:9a:a2:0d:01:4c:94:ae:6a:72:25:da:02:af:94: 4f:cd:94:e4:09:7c:38:07:58:0c:1e:01:01:ea:b0:cf: e2:2d:1a:4a:ac:36:2e:2d:38:20:f6:05:f7:48:ec:f0: 4d:17:b9:cf:e9:fc:33:a7:ab:06:c8:dd:4c:46:d2:67: 41:24:18:36:6b:42:05:ac:b9:40:ab:26:3d:0b:b1:a0 Fingerprint (SHA-256): 5F:C9:D7:69:93:97:95:5C:52:40:B6:CC:3C:04:B1:15:C0:A8:32:3C:56:2F:7E:F1:17:A0:39:98:6E:39:FA:1B Fingerprint (SHA1): A9:21:01:FA:29:74:1C:D8:BA:4E:C9:99:26:A5:D1:33:D6:51:E7:60 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8200: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173562 (0x1957a23a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Apr 25 18:08:16 2016 Not After : Sun Apr 25 18:08:16 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:80:ee:20:65:c5:a1:cf:65:07:e5:3c:8a:f7:d5:dc: 4f:07:1e:43:56:88:b7:a2:b6:3b:64:39:52:40:a0:46: 1d:29:9f:fd:fb:ea:5d:93:53:81:75:4b:c3:97:52:b1: af:16:0e:33:f5:38:58:a0:19:bc:97:9a:2b:46:f9:8f: b1:95:80:32:6f:e1:93:b1:0a:f6:12:84:14:db:d9:f0: b5:a7:31:d4:e7:5c:58:ab:94:2e:ca:ec:fd:d4:c4:00: fe:fa:93:59:34:73:1a:ca:3c:a4:6d:b0:4f:1d:11:05: fd:99:c1:53:bd:77:2a:d4:e8:f4:e3:ad:a9:cd:d2:5c: 69:2e:33:ef:7a:6a:db:0d:85:8c:54:eb:82:4f:74:74: 73:92:44:b2:ce:d5:da:e2:74:7c:d0:b5:f1:72:b2:64: 8f:89:f4:0c:88:07:eb:98:ea:c3:7c:a5:79:1c:f0:4c: 28:0a:6c:5c:db:6c:2c:15:88:04:91:18:f6:45:14:cf: bc:4a:9c:d3:62:55:a8:33:c1:64:4a:e4:cf:32:01:e2: c7:86:ed:c0:bf:15:36:ba:d3:f5:ba:17:d9:d3:80:06: a0:5a:82:f9:69:83:66:32:5b:d2:33:43:fc:f2:90:d6: ca:8c:6f:da:15:a4:0a:44:ee:a8:be:be:7e:39:9d:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:97:70:fe:3c:33:3a:56:95:3a:17:8c:51:5d:7f:76: de:9f:f5:9a:6f:04:7f:5a:34:1b:78:05:1e:e5:33:04: 25:0e:11:24:00:62:72:a6:63:bc:ca:97:21:42:95:eb: e8:bf:4c:8b:06:fe:6d:aa:24:30:a7:bb:a9:19:dc:0e: bc:e2:7d:c9:ee:1c:05:f1:8b:27:b8:40:f8:91:10:17: c8:5f:da:fc:c0:9b:46:3b:73:ce:5f:d9:b9:a0:ae:76: dd:80:16:e2:db:f3:0f:16:d0:f1:55:a5:77:7b:f0:e8: 00:97:75:02:41:41:5c:f8:eb:69:07:bc:7a:e8:98:3e: fd:68:3b:6e:1f:87:8a:92:f5:1e:b0:22:b4:21:5b:9f: 32:bc:ad:6d:1e:57:ca:85:1c:0f:aa:93:91:83:49:b0: 38:c3:94:97:56:2d:92:53:9e:2d:eb:9c:ae:c7:2a:87: c3:cf:27:4d:75:4e:c1:4e:70:53:2f:af:6c:a3:1c:b6: df:90:1f:a5:5f:59:50:6e:61:d4:5f:80:dc:fe:e3:d4: b0:15:b9:58:24:23:43:93:47:f7:58:73:4a:dd:52:9f: eb:2a:1c:50:f1:bb:33:15:cc:d1:a5:2a:df:94:ea:51: 8a:a3:73:c0:1d:54:b5:33:ab:ac:27:a5:b5:fa:0b:7e Fingerprint (SHA-256): CB:AE:2F:94:CF:17:9D:C6:C6:9B:6C:CC:F3:87:4C:97:18:44:C7:0A:4E:5E:1D:4F:D9:1D:42:18:4C:5E:FB:81 Fingerprint (SHA1): 3A:EA:F1:0E:00:72:1A:EF:2E:6E:9A:82:45:B4:67:BF:8B:80:75:71 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8201: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173563 (0x1957a23b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Apr 25 18:08:26 2016 Not After : Sun Apr 25 18:08:26 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1b:f1:72:65:aa:af:df:84:8d:06:36:92:a5:14:f5: f9:63:0e:12:94:b5:78:ec:91:9e:54:b0:5c:3b:62:10: 8a:f5:dc:63:06:4d:cb:a4:26:d2:8c:02:ea:dc:4b:16: 34:98:6b:24:12:0d:a3:a4:2e:3b:bb:10:1b:8b:83:32: 02:ce:34:5b:5d:d8:d1:c3:c4:36:a2:06:a0:93:e5:85: a4:69:15:78:0e:a1:69:d0:0f:df:bd:5b:3f:62:06:6b: 89:89:59:84:fd:60:e5:bf:d8:80:cc:d3:92:9c:e9:31: 8b:a4:3e:2a:e7:41:09:cc:49:13:f5:82:0a:b1:28:2a: 32:fa:6d:0d:d1:f2:27:58:ea:c3:99:50:aa:89:95:71: ad:47:18:e5:fe:ae:d7:f0:26:93:37:e4:7b:8e:a4:90: 13:79:27:d4:a7:66:dc:2a:04:49:0b:c9:82:6d:3a:18: 67:4d:0e:5e:0a:5c:a0:11:d8:78:b1:10:9e:47:4e:8d: 54:b4:dc:f9:c6:5b:36:e4:98:1e:b5:64:f9:2b:d2:9a: 90:3f:c5:42:4a:ff:8e:b3:96:91:87:d5:f7:da:b1:6b: b7:26:2f:14:90:cd:90:64:18:17:d7:3c:7b:f4:6b:17: e7:4c:ed:12:a3:43:b2:21:da:b8:30:62:2f:6c:13:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:9c:ae:6f:6d:4d:ea:4b:f2:c4:29:a3:8b:d9:57:56: 11:c2:2b:85:47:72:23:1d:7f:19:81:55:f6:ed:93:9c: b4:64:79:93:d4:0d:35:c3:68:6f:e7:4a:bb:28:8e:e2: ac:11:c8:1e:96:87:59:53:17:1a:67:94:b2:c8:88:f6: 66:7a:5d:b8:16:19:89:16:a0:71:39:2d:4b:47:3b:90: 7c:bd:77:64:ae:c0:46:7d:7f:d4:24:af:f2:56:29:44: b8:20:41:08:13:bb:88:b7:44:9c:21:c2:72:76:98:b2: b8:79:2f:5e:81:18:6f:c9:c6:bd:59:38:84:c5:34:de: 37:db:fd:d2:72:57:89:b5:71:d1:96:af:c5:92:90:41: bd:79:88:54:49:66:c6:a5:e6:21:8b:dd:89:7d:88:85: d6:b3:c9:06:ea:f2:87:d3:1a:d2:8f:48:ce:28:46:91: 8b:80:1a:71:eb:f5:5c:02:16:72:b9:7b:24:d4:dd:11: bd:0d:1e:66:9e:dc:5a:a7:ea:27:6a:10:3f:4b:85:b1: a6:a8:54:bc:b6:5c:4f:1b:b7:ed:60:89:be:30:f7:43: 01:51:0f:dc:b5:4c:cd:14:4e:a1:1c:60:86:43:88:50: 5e:51:6b:28:68:b3:d7:70:9f:cf:7c:03:d8:0e:ad:44 Fingerprint (SHA-256): BA:45:40:70:D4:BE:E3:78:70:22:2A:B1:56:B5:BD:45:E1:F8:CA:EC:B2:AF:C4:C7:60:FC:72:DB:6E:3C:65:CB Fingerprint (SHA1): C5:26:17:31:54:38:1C:57:77:16:9B:9F:D6:16:69:3B:87:B9:02:0E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #8202: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173564 (0x1957a23c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Apr 25 18:08:39 2016 Not After : Sun Apr 25 18:08:39 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:54:3c:f8:db:d6:2c:e4:00:18:ab:d8:35:65:35:59: ab:61:e4:bc:27:0f:9d:b7:0b:a3:f0:ae:18:47:60:11: 72:59:dc:a5:bb:c4:8e:38:d0:ae:cb:8e:66:5a:13:3c: 58:a2:f1:06:f1:98:e1:de:51:f5:65:9b:ba:35:e0:39: 24:f8:4a:f9:3e:40:db:bd:ee:98:0e:67:6a:bb:7c:2b: e5:d5:c0:6b:d0:3c:23:fb:fd:7a:26:14:13:d3:47:96: 84:21:1c:22:07:c6:37:ab:87:29:d2:ad:b3:17:20:45: 29:79:3b:10:2a:bf:da:48:0d:ae:9a:f9:c2:36:06:44: 51:f4:e7:46:8d:e1:f2:63:1a:5e:51:9b:48:d6:c3:f0: c5:64:d3:4d:b9:7b:6b:b4:bd:e7:e1:06:f6:69:ae:e4: 31:b4:ad:28:3b:cb:a5:6c:fc:7d:95:b8:c8:57:b7:cd: a7:9d:b2:1e:18:da:50:cb:c7:23:05:4c:9c:99:49:f5: 25:ae:c1:99:f0:c7:44:c4:39:5a:a7:ad:d8:61:2f:54: 2c:6b:2e:cd:4c:df:b3:6b:34:62:e1:e7:bb:68:19:cb: 02:b3:10:18:04:05:ee:64:65:19:5f:cc:2a:e4:0b:27: 24:8c:d4:2f:29:85:0e:2e:e3:88:65:b1:65:69:03:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:50:b4:92:78:bf:48:cb:a9:da:a3:96:6f:71:46:04: 5e:7f:91:b5:56:ed:97:55:98:d4:06:eb:e8:e3:63:03: d2:a7:12:aa:56:f1:3f:41:39:d7:7c:fa:0e:a7:85:0d: 91:1b:5b:85:44:f5:d7:bd:fb:9c:a6:1d:95:b8:6b:95: ca:1d:4f:fb:bd:11:d9:52:fe:37:65:6b:36:35:59:33: cf:61:1a:8b:0b:0a:2d:ba:b0:d9:58:7d:46:1d:7f:f1: 71:ed:66:85:29:a4:44:66:f4:7c:47:13:b7:a1:dd:00: 5e:e2:21:1c:3b:c8:14:3c:ed:79:7b:53:10:5f:26:a7: cc:60:b4:d0:27:9f:16:41:b9:6c:48:85:12:af:b5:58: 86:7d:49:31:27:6c:b6:3d:cb:e1:a0:b6:cb:f9:2d:55: 48:3f:d1:a9:f6:1c:bf:e7:72:93:b8:9e:8c:bb:3f:db: 27:6f:1b:a9:7f:85:21:70:94:dd:d7:2f:68:c0:0b:0a: d9:42:07:63:96:5a:8f:0c:fb:5c:10:07:16:2d:44:50: f0:7b:ba:ef:7b:fa:2e:da:17:df:20:8a:fa:69:1c:a2: f2:6a:6d:7e:5c:84:b3:37:19:a5:cc:af:62:54:0b:b2: 46:f7:cd:7b:bb:5d:3a:6c:0b:e6:18:11:ad:48:84:86 Fingerprint (SHA-256): 93:9D:85:0E:51:C8:21:E2:DE:B2:04:9C:89:9A:68:5F:81:A6:EF:A3:5B:19:46:0D:13:7F:05:A1:19:07:58:88 Fingerprint (SHA1): 28:52:28:FE:77:18:D3:D7:76:C3:3A:EF:6A:45:6F:D0:E5:E5:37:93 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8203: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173565 (0x1957a23d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Apr 25 18:08:45 2016 Not After : Sun Apr 25 18:08:45 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:06:2d:17:09:3f:48:4d:65:dd:3d:b7:b4:2d:be:b4: 47:2c:62:02:cc:22:b0:88:7a:30:fd:4e:18:4f:23:df: 59:97:dc:e6:e4:eb:56:8d:da:52:c9:c5:bc:ba:08:1f: 7a:2c:b5:4b:38:6c:22:3c:c3:8f:38:06:53:d9:01:f2: d7:08:89:dd:0a:3a:3a:01:ba:f7:29:72:47:a6:21:b7: c9:dc:1c:64:30:6e:49:a5:33:9a:5e:ed:c3:19:67:de: c2:43:6b:7d:e8:44:e4:29:02:50:7a:c3:80:30:0d:fc: 2a:13:45:4e:88:87:7b:24:fb:5d:e5:4d:7a:2f:87:3d: a7:cb:ad:a1:7d:49:79:a2:4a:29:17:0d:db:2a:c6:40: 9c:e2:66:84:e4:38:46:0c:f1:0c:ae:72:86:30:3b:0b: c5:db:b1:74:72:74:a8:bd:73:33:fb:a5:5d:25:bd:47: fd:a8:cd:d5:41:20:2f:3a:c6:4e:81:b1:fb:bc:51:31: 16:99:0b:93:80:a5:71:50:5a:e3:b8:41:e1:75:15:79: 15:fb:4d:95:a5:75:4c:cb:3f:e5:15:b2:e1:84:88:02: 8e:a6:1b:83:95:1e:4a:e1:95:fe:9e:9e:ff:b5:2e:fd: d3:27:54:82:60:82:dc:d9:36:ea:0e:5e:ee:77:b0:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:2d:de:c6:cf:b6:11:58:07:e5:a9:24:13:3f:66:67: 91:88:5a:21:9d:7b:5e:65:90:5b:65:61:6c:51:84:87: 82:c2:2e:1d:15:77:bb:5c:b1:9e:ae:df:10:e5:12:68: cf:d4:76:8f:2c:61:d7:70:9b:96:79:3e:51:c6:45:71: 2e:5e:b1:06:0d:d2:bf:0e:44:36:1e:7f:01:3d:6a:f3: 7b:e7:af:cc:e5:bd:33:44:89:79:b0:73:82:c7:67:ad: 6c:18:3e:23:15:34:24:53:6c:42:93:87:09:b3:d4:59: 37:56:34:cf:6b:4f:f2:a6:ee:6c:91:30:ba:1b:62:06: 7a:87:c3:27:3b:76:3e:01:98:28:4f:db:95:7a:c9:20: ec:0a:a6:da:c8:a0:36:66:70:6a:ab:52:fa:73:d3:79: 73:a9:f9:9a:e2:32:a7:5c:46:38:2c:6e:bd:5d:43:d8: fe:31:08:b2:c1:5f:29:b9:78:ab:8c:bb:50:ce:bc:d2: d6:6d:fb:87:b1:7b:b6:40:ab:1c:39:1f:83:b0:d6:37: 37:32:d0:40:92:c3:8e:78:45:4b:48:bf:36:7a:7f:7a: 95:bb:f6:e9:6e:49:9a:f8:d6:18:57:c7:b8:0d:9a:67: 12:84:08:05:8d:82:4b:4f:db:00:f0:b0:dc:67:4c:94 Fingerprint (SHA-256): 10:3A:50:74:12:20:60:F4:D9:06:32:90:37:3A:72:B1:CF:FE:BE:E7:2F:D2:90:F6:9E:20:6E:A1:20:77:AB:5E Fingerprint (SHA1): 7E:57:9A:FE:68:AA:8A:46:AC:A5:14:47:EB:C5:A4:94:6F:17:6A:B1 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8204: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173566 (0x1957a23e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Apr 25 18:08:53 2016 Not After : Sun Apr 25 18:08:53 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e2:5b:79:8c:52:f8:0e:b0:88:0c:e5:0e:b8:7d:a2: ea:e1:e9:90:f3:e9:d1:51:fa:2c:a6:be:28:c7:07:62: 05:c2:8b:e0:3c:7c:c6:f6:63:92:51:de:ee:4c:43:64: 97:60:10:b2:00:7c:16:3e:2e:c0:e6:af:db:28:46:7b: c3:f4:ef:07:c7:aa:7e:87:0a:4e:b6:d5:bc:32:18:b8: df:a5:02:9d:d0:32:55:7a:47:14:4d:d8:04:7d:ff:37: 7f:fc:04:c8:ea:a0:47:05:93:81:c8:51:ba:4d:fe:d2: 38:ab:f9:4c:cd:72:9d:b0:fb:6e:82:74:98:5b:d1:26: b3:ae:16:50:db:50:05:1c:59:56:63:79:58:54:d0:dd: b4:a0:45:6b:88:94:f2:f0:b2:1a:ca:eb:f0:dd:c9:28: 5d:43:f5:ad:68:3b:86:3c:b5:e3:89:6f:94:85:4e:f3: f8:4c:b3:75:85:88:49:d5:71:f8:37:f5:ca:74:3f:fe: 1b:a7:f2:be:ab:fd:b4:b5:ed:78:29:8a:23:32:13:32: 2c:68:cc:8e:5b:2e:91:f8:37:01:70:b8:ba:5f:77:df: 77:31:d9:69:43:19:12:83:03:0e:48:9c:09:85:5e:c9: 12:c1:6f:cb:b3:0f:96:2f:40:e1:67:3f:5f:99:a1:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:2d:d6:d7:09:ad:85:aa:f7:a1:47:a8:3e:19:86:e1: ab:df:41:c9:fc:2c:2b:b3:7e:dc:5c:ba:ad:de:4f:a7: d2:2b:5f:a1:0d:5b:99:09:e4:30:48:40:5b:5f:80:b1: ee:e3:e2:f8:ee:5f:06:96:88:9c:64:72:8a:08:d9:14: 5a:81:3d:a2:54:56:d9:42:96:e9:02:2f:d4:2e:fb:86: b1:a8:db:76:44:b9:1c:89:e2:b3:4b:fb:f7:55:e7:1a: 04:7b:26:02:40:7c:13:a6:22:3e:85:1b:05:86:ad:1a: 51:4d:ed:b4:6b:ad:ba:b3:6f:e7:91:c2:20:04:ae:e8: 85:f7:2c:b4:5a:fa:2e:b8:62:40:48:81:94:0d:35:87: 5f:31:13:c1:91:6f:e4:8c:f8:91:1b:46:60:aa:92:52: 14:9b:d2:6e:85:bd:50:ca:c5:8e:40:8d:bd:fe:2e:58: b6:bc:92:61:8b:00:f2:25:db:a9:a1:30:0a:e8:92:60: 44:0a:cc:3c:d9:4a:a1:ed:c1:91:32:21:59:d5:c7:9e: 62:a4:ac:81:ec:55:58:37:60:88:cf:08:70:70:cd:d5: 86:7b:4e:95:90:49:d5:ba:df:7c:f3:cc:f1:e6:50:4b: 1f:2a:cb:7f:5f:09:e6:dc:70:59:da:e0:82:7d:b6:3f Fingerprint (SHA-256): BA:C9:9F:9C:50:C6:30:DF:E4:50:EC:2C:0E:5F:FC:47:D7:5E:FE:60:05:21:07:64:93:C3:E8:9D:65:CC:3F:91 Fingerprint (SHA1): 2C:FB:B3:01:25:37:BF:48:AD:EB:0F:53:64:31:7F:99:52:30:12:E9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #8205: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8206: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173581 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8207: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8208: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8209: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8210: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173582 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8211: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8212: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8213: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8214: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173583 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8215: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8216: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8217: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8218: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425173584 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8219: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8220: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8221: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173581 (0x1957a24d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:11:18 2016 Not After : Sun Apr 25 18:11:18 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:ed:85:94:b6:f1:80:03:73:1b:14:80:bb:d0:0d:ea: 5e:d9:5a:e8:66:47:d3:3f:46:79:35:17:c5:94:6e:e1: bb:6f:69:9f:d5:3c:bf:83:fe:c6:dd:c2:8c:b3:c8:19: 6f:78:4e:8e:a3:c9:9d:7c:c4:01:65:0e:f6:28:8a:93: 3a:6e:89:30:42:fe:81:b0:1c:57:c4:04:9a:e1:38:ef: 26:f8:53:99:62:69:a6:fd:6b:04:44:73:4a:56:2e:8d: 99:3f:ff:d4:f5:9a:f4:35:ec:33:8e:d0:5b:74:07:ff: 51:29:33:31:80:b1:1f:c5:5e:a9:62:47:87:46:18:7e: 6b:52:06:0b:41:28:c5:f2:7f:ec:e3:83:d8:ae:ed:a7: b9:1a:6c:4b:a4:48:55:c6:09:fe:a5:c6:fe:e8:77:ee: 23:0b:8d:66:6c:55:c2:6c:d2:7b:cf:86:6f:83:ad:f5: fd:c2:45:b6:28:8f:6b:a4:42:42:9f:46:d9:2f:ea:74: 3d:4a:85:0c:b9:cd:f0:76:cc:13:e8:cd:bb:3f:97:cf: ba:91:1d:52:8e:8b:3d:e0:bb:b4:80:ff:b7:7d:d4:c9: 88:64:4b:93:a3:03:19:9d:8e:43:22:37:d6:cb:69:ec: 4a:9e:8a:fd:2d:dc:bb:d8:87:c2:b7:96:1e:06:b2:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:29:93:93:7c:d5:88:b6:be:9d:d9:9a:8c:18:17:ad: 68:f1:61:77:03:90:10:50:8e:7a:ba:99:c6:93:0a:51: 87:b1:67:2f:1f:4b:18:4d:58:4a:63:70:c5:b0:5c:64: a0:40:f5:c4:47:54:2b:11:63:f9:71:34:36:5f:f7:1e: 73:57:44:44:02:65:9c:72:6d:f8:d7:0a:0b:93:c3:8c: 1f:b9:20:1c:bb:cb:17:dd:c0:54:c9:08:fe:16:24:40: 35:4c:da:cb:65:44:44:9f:70:82:66:01:a5:a7:8c:46: 35:b0:1d:10:e2:b5:b6:09:aa:7e:27:a4:04:a4:d4:20: 65:d1:4d:d6:56:df:66:a4:fe:9f:3f:a6:1d:e3:4f:2d: f1:39:b7:37:a4:8c:22:81:f4:57:fe:62:ce:bd:64:23: 25:cc:fd:e6:56:fb:b9:34:3c:e7:1b:67:8d:2a:b4:37: f0:3c:be:c1:1c:fa:10:c6:2c:97:98:51:cb:e6:bd:34: 1a:b9:67:b7:6c:eb:89:f3:78:43:34:cb:ba:9b:6c:14: ca:db:45:b8:da:78:7f:c6:10:a5:62:05:34:36:1c:e3: d5:09:d3:11:ce:bb:f7:0e:29:ae:b5:be:35:4e:60:75: bd:86:5d:af:d9:0c:8c:73:3b:4e:3b:2e:27:5c:28:c7 Fingerprint (SHA-256): 7E:31:24:3B:CF:68:0A:4D:C7:64:40:8B:C1:AE:BD:AE:F7:09:46:EE:42:2A:46:B3:C7:5C:14:72:EF:55:5A:03 Fingerprint (SHA1): 90:B9:DE:21:EF:9E:56:2B:60:0C:79:5E:11:1E:E1:CB:77:E9:C0:E9 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8222: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8223: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173582 (0x1957a24e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:11:32 2016 Not After : Sun Apr 25 18:11:32 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:df:a8:68:b5:11:bc:c0:65:03:c9:fd:d8:55:84:ab: 7a:de:71:73:82:86:e3:1e:39:ba:08:34:09:9a:2b:10: ad:c7:73:be:ad:9c:88:1c:51:97:46:cf:7d:3d:a9:8e: db:d2:33:7a:d6:9c:d7:c9:50:1a:b0:da:84:02:1f:5b: ee:75:58:50:05:0f:5c:da:5c:ac:e3:df:14:19:c6:f9: b2:76:f0:3c:81:d5:7a:e0:c5:6d:ee:32:13:a0:4e:9b: d2:12:19:c7:ce:1d:4e:a4:69:d5:50:70:53:68:fc:3f: e5:13:10:6a:30:4e:bc:cd:01:1e:dd:02:51:2c:c9:dd: 41:5a:51:28:31:e4:24:40:1c:60:12:c2:e2:e2:a3:3f: 5d:60:df:4e:4f:24:2a:9a:85:6a:ef:03:59:68:bf:1d: 4c:12:ef:03:bf:64:06:f3:63:63:a3:dd:2d:7b:25:e0: 83:a7:28:ad:a0:fc:aa:4f:78:a2:64:6f:7c:da:b8:4c: fc:36:cf:6e:cc:ed:81:09:96:0a:11:6d:41:33:77:73: 8d:e8:f4:8b:a4:d2:c9:93:e5:9b:e9:a6:dd:c6:cf:6a: ca:a0:84:44:f2:cc:6a:e9:62:72:d4:2b:b5:c7:ca:2e: 4e:00:9d:04:34:60:6c:d2:00:a9:e3:29:63:90:15:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:90:10:a0:35:a8:ba:ec:c7:8f:0f:58:a6:71:f2:53: 9a:32:e6:d5:3f:5b:bc:19:15:3a:47:84:37:2c:a7:0e: 39:10:d8:27:70:19:bf:c0:c1:78:cd:96:0e:28:a5:8c: c5:c1:45:9d:f9:40:31:32:3c:e5:87:41:a8:61:91:e2: ca:58:b9:3c:97:08:33:21:03:0f:08:e4:10:32:30:f5: 01:fa:20:17:95:3a:9e:ce:54:05:2d:77:78:da:ec:01: 7a:dc:e6:32:81:3b:54:28:fa:a6:52:6a:8b:97:af:f1: 8d:f1:05:93:1d:b3:3f:e7:e3:7b:17:78:cb:ed:a4:eb: 83:71:a4:8c:c5:1c:57:bb:5a:e7:e2:36:46:d1:57:fa: 7a:85:e3:9a:46:85:61:15:9c:f1:bc:13:f0:ee:60:5f: 26:89:45:0d:ee:4c:86:e2:d2:2f:f7:bd:92:ed:42:29: 02:0a:0d:2d:03:28:1e:e2:fa:fd:99:63:22:c8:1a:6e: 40:73:43:6a:f6:cd:a5:5a:22:66:63:e9:6a:b7:bd:46: f6:71:c4:9d:b0:d3:a3:22:f1:06:06:7d:00:82:2e:77: 3e:9a:ef:1f:51:7c:09:2e:22:41:a5:5e:99:ea:ef:b9: e6:e9:a9:68:53:29:11:4e:c7:1c:69:72:80:32:b6:34 Fingerprint (SHA-256): 4A:08:DD:06:85:B5:03:B9:7C:62:D0:8C:ED:19:EC:22:ED:75:2B:5B:92:DB:73:8E:DA:8A:C7:DC:05:56:A6:6E Fingerprint (SHA1): F8:F2:67:21:F8:99:19:86:74:AF:97:26:2F:68:7F:49:32:80:02:5E Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8224: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8225: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173583 (0x1957a24f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:11:38 2016 Not After : Sun Apr 25 18:11:38 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:eb:13:84:48:a8:94:a9:78:a7:87:9f:4f:a8:e6:fc: e6:c0:49:c1:f1:74:67:93:0e:05:62:92:86:65:eb:3f: 44:89:95:21:4d:0c:d8:1d:67:fb:13:ec:e1:59:04:33: d9:4d:79:3c:2f:fa:e4:82:03:3e:c2:1d:e3:e2:65:21: 41:6d:0e:44:9b:5b:10:51:b3:ea:26:90:67:7e:fd:c2: d5:42:33:58:dd:0d:0d:bd:32:92:6b:28:8d:31:06:d0: 2f:02:cf:22:89:92:b2:19:df:84:71:d5:c0:bb:d1:92: 6e:20:72:67:8e:92:6c:3b:f9:a7:3a:8f:da:f7:fc:bd: 33:fc:10:95:c4:c0:2b:ae:5f:ed:87:d5:39:96:3c:e1: fa:23:00:71:6e:b5:23:56:9f:3d:57:62:fb:60:66:79: fa:e2:37:c6:ed:4d:df:6a:28:16:11:41:c0:6d:e7:7f: 3b:c8:66:a5:14:04:74:c0:ab:47:69:6b:96:6e:4e:31: 26:44:6c:a8:63:31:c5:3b:8b:e4:50:b6:20:66:d3:2a: 28:af:a3:35:4a:60:32:de:f3:4a:12:e1:f4:ff:a4:20: 98:9a:d4:3c:6c:b4:32:eb:da:d6:a8:c1:1d:76:3f:b1: 9e:33:03:53:63:e9:d4:49:11:b9:c7:5f:54:25:b2:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:a0:85:ed:4c:0f:a0:a2:10:0a:77:a2:c5:d9:18:9d: 5a:3f:75:43:82:b6:c4:0c:34:cc:08:6a:cc:29:b4:1e: a9:bd:0c:f3:cd:6e:cb:83:09:00:7b:b5:23:e7:b1:c1: f7:04:7f:e2:92:32:15:69:6a:3e:57:15:bf:73:19:fc: c6:2b:32:11:bf:10:ff:0e:4b:d1:3c:37:55:50:1e:ce: d1:dd:f0:f0:e0:29:da:32:47:e0:71:7a:40:73:66:04: 99:93:e8:e9:e3:a8:93:65:9f:fe:e3:e8:4f:6a:d3:c3: 43:c1:41:c4:3c:65:05:25:1e:f9:52:cb:43:6e:61:50: fb:01:05:72:18:4a:8d:13:92:ee:d4:08:f2:eb:cd:83: 42:97:a3:e3:21:09:70:5b:86:1a:b6:9a:98:d2:fe:0d: c7:0f:92:84:ed:f1:c7:65:4f:4e:42:c5:6f:13:bf:84: 14:ce:2f:76:bc:12:c5:23:5c:dc:f3:69:e0:64:2f:bb: 8f:8c:14:0a:17:0f:6e:97:f8:44:d0:0c:fa:9f:f8:26: 0f:a1:f5:b0:d4:6a:c6:e9:75:ee:14:4b:ec:55:c9:5f: 19:d1:3f:a3:94:42:e0:92:9a:47:0d:9b:dd:27:c2:cb: 8f:3a:7f:73:44:12:1a:00:09:b6:4d:59:19:61:d8:b9 Fingerprint (SHA-256): 31:FA:B2:D2:9B:15:15:60:5F:36:BC:81:03:80:0F:2B:32:49:F9:B4:D9:B2:1F:D7:E0:7C:06:99:EB:D2:2D:3B Fingerprint (SHA1): 28:E7:43:C9:AE:AB:83:63:9F:48:FB:42:DD:04:DD:12:97:B7:FF:31 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8226: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8227: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8228: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8229: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8230: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173581 (0x1957a24d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:11:18 2016 Not After : Sun Apr 25 18:11:18 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:ed:85:94:b6:f1:80:03:73:1b:14:80:bb:d0:0d:ea: 5e:d9:5a:e8:66:47:d3:3f:46:79:35:17:c5:94:6e:e1: bb:6f:69:9f:d5:3c:bf:83:fe:c6:dd:c2:8c:b3:c8:19: 6f:78:4e:8e:a3:c9:9d:7c:c4:01:65:0e:f6:28:8a:93: 3a:6e:89:30:42:fe:81:b0:1c:57:c4:04:9a:e1:38:ef: 26:f8:53:99:62:69:a6:fd:6b:04:44:73:4a:56:2e:8d: 99:3f:ff:d4:f5:9a:f4:35:ec:33:8e:d0:5b:74:07:ff: 51:29:33:31:80:b1:1f:c5:5e:a9:62:47:87:46:18:7e: 6b:52:06:0b:41:28:c5:f2:7f:ec:e3:83:d8:ae:ed:a7: b9:1a:6c:4b:a4:48:55:c6:09:fe:a5:c6:fe:e8:77:ee: 23:0b:8d:66:6c:55:c2:6c:d2:7b:cf:86:6f:83:ad:f5: fd:c2:45:b6:28:8f:6b:a4:42:42:9f:46:d9:2f:ea:74: 3d:4a:85:0c:b9:cd:f0:76:cc:13:e8:cd:bb:3f:97:cf: ba:91:1d:52:8e:8b:3d:e0:bb:b4:80:ff:b7:7d:d4:c9: 88:64:4b:93:a3:03:19:9d:8e:43:22:37:d6:cb:69:ec: 4a:9e:8a:fd:2d:dc:bb:d8:87:c2:b7:96:1e:06:b2:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:29:93:93:7c:d5:88:b6:be:9d:d9:9a:8c:18:17:ad: 68:f1:61:77:03:90:10:50:8e:7a:ba:99:c6:93:0a:51: 87:b1:67:2f:1f:4b:18:4d:58:4a:63:70:c5:b0:5c:64: a0:40:f5:c4:47:54:2b:11:63:f9:71:34:36:5f:f7:1e: 73:57:44:44:02:65:9c:72:6d:f8:d7:0a:0b:93:c3:8c: 1f:b9:20:1c:bb:cb:17:dd:c0:54:c9:08:fe:16:24:40: 35:4c:da:cb:65:44:44:9f:70:82:66:01:a5:a7:8c:46: 35:b0:1d:10:e2:b5:b6:09:aa:7e:27:a4:04:a4:d4:20: 65:d1:4d:d6:56:df:66:a4:fe:9f:3f:a6:1d:e3:4f:2d: f1:39:b7:37:a4:8c:22:81:f4:57:fe:62:ce:bd:64:23: 25:cc:fd:e6:56:fb:b9:34:3c:e7:1b:67:8d:2a:b4:37: f0:3c:be:c1:1c:fa:10:c6:2c:97:98:51:cb:e6:bd:34: 1a:b9:67:b7:6c:eb:89:f3:78:43:34:cb:ba:9b:6c:14: ca:db:45:b8:da:78:7f:c6:10:a5:62:05:34:36:1c:e3: d5:09:d3:11:ce:bb:f7:0e:29:ae:b5:be:35:4e:60:75: bd:86:5d:af:d9:0c:8c:73:3b:4e:3b:2e:27:5c:28:c7 Fingerprint (SHA-256): 7E:31:24:3B:CF:68:0A:4D:C7:64:40:8B:C1:AE:BD:AE:F7:09:46:EE:42:2A:46:B3:C7:5C:14:72:EF:55:5A:03 Fingerprint (SHA1): 90:B9:DE:21:EF:9E:56:2B:60:0C:79:5E:11:1E:E1:CB:77:E9:C0:E9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8231: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8232: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173582 (0x1957a24e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:11:32 2016 Not After : Sun Apr 25 18:11:32 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:df:a8:68:b5:11:bc:c0:65:03:c9:fd:d8:55:84:ab: 7a:de:71:73:82:86:e3:1e:39:ba:08:34:09:9a:2b:10: ad:c7:73:be:ad:9c:88:1c:51:97:46:cf:7d:3d:a9:8e: db:d2:33:7a:d6:9c:d7:c9:50:1a:b0:da:84:02:1f:5b: ee:75:58:50:05:0f:5c:da:5c:ac:e3:df:14:19:c6:f9: b2:76:f0:3c:81:d5:7a:e0:c5:6d:ee:32:13:a0:4e:9b: d2:12:19:c7:ce:1d:4e:a4:69:d5:50:70:53:68:fc:3f: e5:13:10:6a:30:4e:bc:cd:01:1e:dd:02:51:2c:c9:dd: 41:5a:51:28:31:e4:24:40:1c:60:12:c2:e2:e2:a3:3f: 5d:60:df:4e:4f:24:2a:9a:85:6a:ef:03:59:68:bf:1d: 4c:12:ef:03:bf:64:06:f3:63:63:a3:dd:2d:7b:25:e0: 83:a7:28:ad:a0:fc:aa:4f:78:a2:64:6f:7c:da:b8:4c: fc:36:cf:6e:cc:ed:81:09:96:0a:11:6d:41:33:77:73: 8d:e8:f4:8b:a4:d2:c9:93:e5:9b:e9:a6:dd:c6:cf:6a: ca:a0:84:44:f2:cc:6a:e9:62:72:d4:2b:b5:c7:ca:2e: 4e:00:9d:04:34:60:6c:d2:00:a9:e3:29:63:90:15:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:90:10:a0:35:a8:ba:ec:c7:8f:0f:58:a6:71:f2:53: 9a:32:e6:d5:3f:5b:bc:19:15:3a:47:84:37:2c:a7:0e: 39:10:d8:27:70:19:bf:c0:c1:78:cd:96:0e:28:a5:8c: c5:c1:45:9d:f9:40:31:32:3c:e5:87:41:a8:61:91:e2: ca:58:b9:3c:97:08:33:21:03:0f:08:e4:10:32:30:f5: 01:fa:20:17:95:3a:9e:ce:54:05:2d:77:78:da:ec:01: 7a:dc:e6:32:81:3b:54:28:fa:a6:52:6a:8b:97:af:f1: 8d:f1:05:93:1d:b3:3f:e7:e3:7b:17:78:cb:ed:a4:eb: 83:71:a4:8c:c5:1c:57:bb:5a:e7:e2:36:46:d1:57:fa: 7a:85:e3:9a:46:85:61:15:9c:f1:bc:13:f0:ee:60:5f: 26:89:45:0d:ee:4c:86:e2:d2:2f:f7:bd:92:ed:42:29: 02:0a:0d:2d:03:28:1e:e2:fa:fd:99:63:22:c8:1a:6e: 40:73:43:6a:f6:cd:a5:5a:22:66:63:e9:6a:b7:bd:46: f6:71:c4:9d:b0:d3:a3:22:f1:06:06:7d:00:82:2e:77: 3e:9a:ef:1f:51:7c:09:2e:22:41:a5:5e:99:ea:ef:b9: e6:e9:a9:68:53:29:11:4e:c7:1c:69:72:80:32:b6:34 Fingerprint (SHA-256): 4A:08:DD:06:85:B5:03:B9:7C:62:D0:8C:ED:19:EC:22:ED:75:2B:5B:92:DB:73:8E:DA:8A:C7:DC:05:56:A6:6E Fingerprint (SHA1): F8:F2:67:21:F8:99:19:86:74:AF:97:26:2F:68:7F:49:32:80:02:5E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8233: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8234: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173583 (0x1957a24f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:11:38 2016 Not After : Sun Apr 25 18:11:38 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:eb:13:84:48:a8:94:a9:78:a7:87:9f:4f:a8:e6:fc: e6:c0:49:c1:f1:74:67:93:0e:05:62:92:86:65:eb:3f: 44:89:95:21:4d:0c:d8:1d:67:fb:13:ec:e1:59:04:33: d9:4d:79:3c:2f:fa:e4:82:03:3e:c2:1d:e3:e2:65:21: 41:6d:0e:44:9b:5b:10:51:b3:ea:26:90:67:7e:fd:c2: d5:42:33:58:dd:0d:0d:bd:32:92:6b:28:8d:31:06:d0: 2f:02:cf:22:89:92:b2:19:df:84:71:d5:c0:bb:d1:92: 6e:20:72:67:8e:92:6c:3b:f9:a7:3a:8f:da:f7:fc:bd: 33:fc:10:95:c4:c0:2b:ae:5f:ed:87:d5:39:96:3c:e1: fa:23:00:71:6e:b5:23:56:9f:3d:57:62:fb:60:66:79: fa:e2:37:c6:ed:4d:df:6a:28:16:11:41:c0:6d:e7:7f: 3b:c8:66:a5:14:04:74:c0:ab:47:69:6b:96:6e:4e:31: 26:44:6c:a8:63:31:c5:3b:8b:e4:50:b6:20:66:d3:2a: 28:af:a3:35:4a:60:32:de:f3:4a:12:e1:f4:ff:a4:20: 98:9a:d4:3c:6c:b4:32:eb:da:d6:a8:c1:1d:76:3f:b1: 9e:33:03:53:63:e9:d4:49:11:b9:c7:5f:54:25:b2:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:a0:85:ed:4c:0f:a0:a2:10:0a:77:a2:c5:d9:18:9d: 5a:3f:75:43:82:b6:c4:0c:34:cc:08:6a:cc:29:b4:1e: a9:bd:0c:f3:cd:6e:cb:83:09:00:7b:b5:23:e7:b1:c1: f7:04:7f:e2:92:32:15:69:6a:3e:57:15:bf:73:19:fc: c6:2b:32:11:bf:10:ff:0e:4b:d1:3c:37:55:50:1e:ce: d1:dd:f0:f0:e0:29:da:32:47:e0:71:7a:40:73:66:04: 99:93:e8:e9:e3:a8:93:65:9f:fe:e3:e8:4f:6a:d3:c3: 43:c1:41:c4:3c:65:05:25:1e:f9:52:cb:43:6e:61:50: fb:01:05:72:18:4a:8d:13:92:ee:d4:08:f2:eb:cd:83: 42:97:a3:e3:21:09:70:5b:86:1a:b6:9a:98:d2:fe:0d: c7:0f:92:84:ed:f1:c7:65:4f:4e:42:c5:6f:13:bf:84: 14:ce:2f:76:bc:12:c5:23:5c:dc:f3:69:e0:64:2f:bb: 8f:8c:14:0a:17:0f:6e:97:f8:44:d0:0c:fa:9f:f8:26: 0f:a1:f5:b0:d4:6a:c6:e9:75:ee:14:4b:ec:55:c9:5f: 19:d1:3f:a3:94:42:e0:92:9a:47:0d:9b:dd:27:c2:cb: 8f:3a:7f:73:44:12:1a:00:09:b6:4d:59:19:61:d8:b9 Fingerprint (SHA-256): 31:FA:B2:D2:9B:15:15:60:5F:36:BC:81:03:80:0F:2B:32:49:F9:B4:D9:B2:1F:D7:E0:7C:06:99:EB:D2:2D:3B Fingerprint (SHA1): 28:E7:43:C9:AE:AB:83:63:9F:48:FB:42:DD:04:DD:12:97:B7:FF:31 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8235: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8236: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8237: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173585 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8238: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8239: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8240: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8241: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173586 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8242: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8243: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8244: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8245: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173587 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8246: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8247: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #8248: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8249: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425173588 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8250: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8251: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #8252: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8253: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425173589 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8254: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8255: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8256: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173585 (0x1957a251) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:12:00 2016 Not After : Sun Apr 25 18:12:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:67:7b:ba:5c:d5:24:c1:52:2e:e1:84:0b:97:42:c2: 92:dd:12:74:0d:d5:dc:29:0e:7b:16:b8:f4:29:ef:76: a9:49:c6:8d:bf:0b:37:e0:89:d2:46:62:66:a4:7a:46: 9e:c9:1b:5c:dc:31:a3:d1:67:93:56:54:42:88:af:a3: 15:1d:4f:09:0e:39:0c:af:9c:24:82:9b:72:3c:9d:f3: 03:e5:17:9a:f1:77:f6:e2:0d:55:07:54:98:d2:20:49: 01:4f:96:62:d1:85:0c:f0:11:f0:75:13:8e:a0:2b:78: d7:d8:c1:d4:9a:f4:34:4a:8d:49:1e:31:25:e0:1e:3c: 02:47:78:98:df:2f:5f:19:06:30:b5:b5:54:1e:35:d4: 56:2f:53:bb:ed:86:ce:96:3c:a0:bf:ff:b5:8a:4e:c5: 1f:0c:c7:30:f5:4e:d2:32:85:e1:10:44:65:11:60:4f: ad:62:29:54:23:07:57:d4:32:8d:07:80:47:55:89:cb: d6:db:19:86:09:96:29:14:25:cf:77:8c:0d:9e:29:18: e8:80:35:ea:5a:17:d3:90:5e:19:04:c5:e9:1f:5c:46: ab:e3:5b:ac:97:65:9d:e5:95:47:34:d7:71:e3:50:15: 79:46:09:9d:d8:55:09:e6:e6:c8:68:4a:cc:f9:b0:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:51:a2:e2:70:6e:68:2f:ae:d0:61:95:01:db:7a:00: 9b:6e:90:d3:04:6d:94:0e:0c:09:f1:24:14:28:b4:77: 2c:0c:6c:88:09:b1:1a:7d:58:ae:8d:0f:2e:01:70:f1: b7:91:2e:4d:21:5a:3a:9c:04:24:70:e3:c7:33:6f:9d: 97:21:ef:07:fd:0c:79:0f:aa:c3:a0:e9:43:9a:44:15: b5:b7:fe:c9:01:01:3e:b3:5f:51:2a:3d:a3:f4:ae:1a: b7:76:34:74:05:43:60:7a:cf:cb:f9:16:63:59:8c:8d: b6:2b:f6:c4:5e:2e:0f:28:62:b5:80:89:c1:63:5e:5f: b9:68:7c:05:78:04:4a:76:c3:cd:ea:14:68:4c:26:be: af:4d:13:ec:58:0e:04:19:22:64:c9:f7:26:04:45:81: 56:75:57:55:6f:4b:b4:73:58:5c:d5:23:ca:04:5f:4b: 7d:fb:fb:f0:82:e5:62:09:66:f5:af:d3:21:19:67:ef: 5e:43:28:c6:00:48:35:c7:c5:1a:ea:70:f2:53:4c:90: f8:a1:d7:15:e7:1b:f6:4e:27:11:15:18:93:2b:81:4c: 5d:19:b3:e1:9d:4e:ad:0e:4e:12:b7:c9:12:bf:3a:47: 16:66:a1:ba:c9:13:e9:4d:7f:a1:e8:e8:73:93:f7:8d Fingerprint (SHA-256): F8:46:76:AF:F8:81:A1:33:D4:44:F2:AE:00:53:22:A9:E4:90:1A:6C:C0:C9:01:D4:A3:E0:FA:B4:23:D9:94:B6 Fingerprint (SHA1): 31:98:EE:DD:B6:91:E1:11:A1:0D:15:DA:15:3B:6D:97:3C:1E:18:38 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8257: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8258: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173586 (0x1957a252) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:12:06 2016 Not After : Sun Apr 25 18:12:06 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:b0:76:7c:06:23:e8:a3:d4:ec:ac:c6:09:b7:f5:69: 95:12:6c:4d:78:bd:fe:ae:90:36:4b:1c:f2:d9:e4:47: da:5a:46:56:4c:0f:db:f9:19:1f:d9:20:82:80:d5:08: 94:ce:15:3d:a3:55:55:36:1e:77:df:57:b8:8d:1a:e1: 03:5b:19:60:c5:0e:2b:a2:29:54:87:27:10:48:da:ea: 11:6e:23:00:cd:50:0b:a1:60:34:a1:b1:b8:b5:5e:75: dc:fe:d5:e8:bb:94:4e:25:0b:40:48:64:9e:59:f5:24: b9:e2:1d:48:a3:8c:8b:51:88:3a:91:29:6d:2e:0f:d0: b4:ab:98:c5:0e:d2:cd:26:83:95:1c:55:60:3b:cd:d1: cd:9e:7f:ef:97:d8:00:3e:35:02:9e:77:ea:93:48:79: 06:df:17:6b:94:4b:98:68:c9:2a:6c:f0:e9:e6:24:15: d1:eb:08:23:4a:95:7b:da:e3:9f:f5:ce:0f:a3:ab:2e: 68:52:17:d4:84:86:9e:48:a9:aa:c1:e0:35:f4:14:7a: c4:f9:cb:f8:dd:c9:5a:27:64:13:4f:7b:0e:77:b2:af: 48:c0:cd:84:3e:49:44:1c:64:59:25:b4:cc:2e:e5:77: 5e:76:6c:ae:66:53:29:59:a6:4b:b4:33:bc:9d:40:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:d8:b6:22:da:fe:67:64:58:40:ce:4a:97:f6:87:39: 09:f3:e4:ba:92:2f:72:23:60:de:ed:3d:29:10:12:c2: 89:3a:63:fd:03:dd:c9:21:8f:43:4a:b2:f3:c3:09:3e: 26:9d:d3:62:64:3e:cc:9a:8c:52:32:b0:78:a8:a8:e3: a3:7d:92:1f:9b:b2:d7:36:cb:cb:8e:1a:90:41:80:35: 54:33:14:c2:78:14:f0:f4:af:6e:45:9d:82:cf:02:fb: 34:c8:48:ea:02:23:da:29:9b:a7:af:4a:06:8d:6a:97: 19:53:74:bd:f3:e3:f1:33:ea:61:96:8e:b4:2d:ef:b4: aa:5f:60:ca:a2:6a:5b:64:b2:09:70:d8:82:65:7e:df: 4e:04:3c:0c:da:3b:d6:d9:88:87:23:8d:cb:69:6c:b7: 03:52:c2:be:ac:59:68:f5:cb:fc:dc:53:46:a0:9e:a1: 81:45:f4:15:0b:03:71:85:69:79:5d:18:55:9f:71:80: 31:0b:33:b5:80:3f:c6:c4:ce:a3:c2:c8:4b:e3:da:ed: c2:d7:da:79:7b:80:88:c6:9a:6f:f0:6b:91:4c:ba:71: c5:8e:2c:e1:8c:90:0f:54:9f:b4:14:0c:77:e9:05:16: d1:8c:65:0e:dd:c2:eb:90:92:30:09:3f:20:4d:66:e7 Fingerprint (SHA-256): 07:3B:29:A0:22:75:DB:40:50:95:D6:5E:6F:4C:2B:3E:B7:1F:FC:BF:66:D4:01:B0:04:99:A8:EB:C7:0D:AB:6E Fingerprint (SHA1): 48:7D:AC:F1:8C:16:DF:A9:82:97:0F:4C:E8:03:BF:4C:A5:1B:81:FA Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8259: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8260: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173587 (0x1957a253) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:12:18 2016 Not After : Sun Apr 25 18:12:18 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:92:68:e2:a2:02:1b:95:e2:81:e1:de:b1:1f:40:4d: 26:f0:3f:bd:86:02:c6:0d:5f:39:9f:78:be:46:08:9f: 30:19:70:9f:fb:28:9c:04:16:8b:46:c7:09:ce:8f:f1: 92:e3:2c:d5:03:ec:a0:f9:f8:d1:44:54:2e:af:3f:40: ea:96:8d:77:56:9e:e1:fc:51:dc:6d:f2:34:8e:06:f2: 83:4f:51:b7:9a:c5:0a:67:e0:09:f7:91:bb:81:ee:3b: b9:c9:41:cf:2b:53:54:e3:a6:19:1b:06:5b:91:aa:5e: 19:78:45:83:40:95:a6:56:49:ad:6e:d1:5d:ba:8b:32: f6:03:c4:19:71:1f:e4:48:ea:ba:f0:9c:01:bb:c1:d1: f2:25:f2:7f:6b:3b:8a:73:fc:dc:5a:f9:38:ee:d4:ec: 20:ea:a5:97:14:7f:1b:41:49:2d:c8:4a:d8:f4:a8:23: 11:85:03:26:96:28:b1:e3:c5:d5:54:12:fe:10:5e:25: ae:0f:48:45:1e:43:18:76:8f:25:da:22:2c:f6:28:bc: d6:17:65:2a:06:2f:d1:2e:38:cd:f6:b1:3a:9f:31:f4: c6:8e:a7:b0:9b:b6:cd:b1:c0:8d:46:17:b1:b4:4b:e4: 3e:34:32:f9:65:7a:6b:c7:ca:0e:ed:2a:d7:38:7c:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:f7:09:a8:51:4a:4b:a0:9f:65:12:fe:40:b2:f5:4c: 60:3a:fa:7e:63:40:ed:4c:b0:9e:f5:4d:07:11:d5:cf: 0b:31:72:c8:fd:dd:18:5b:a6:af:23:ed:90:0f:1a:24: 61:f9:bf:8e:2f:72:57:79:02:ee:b3:4b:7e:06:96:80: 8b:d7:9d:fe:cb:57:dd:2a:4e:f3:ec:f5:d8:c8:88:0f: cb:c4:51:51:af:64:13:74:f0:ee:a9:0b:6f:87:13:59: 93:39:e2:b2:64:47:5f:95:d3:ae:83:9a:97:30:ee:c3: 57:68:76:36:71:e2:1f:8f:d7:89:3f:b2:f7:8c:16:28: 4d:a2:3c:f8:3a:be:20:86:56:a5:e6:6d:8a:5b:6a:fa: a0:a3:a9:8c:63:6f:5c:ad:f4:a7:1d:a3:5c:98:25:d9: 19:1b:2c:41:5f:66:dd:e6:5c:e9:b7:ca:44:4d:2a:7a: d6:6e:bb:cb:62:a0:01:9c:96:a0:08:3b:f0:8a:08:77: 7e:90:f7:44:8f:6d:dd:73:81:6e:e8:00:e7:3f:52:55: 77:28:6d:7b:a8:de:2e:93:75:e2:7f:d9:6d:5a:7c:07: d8:22:e9:0f:8f:77:9a:82:8d:b9:0c:b2:64:54:53:3c: 50:30:56:ae:43:be:d5:49:c8:6c:50:d2:4e:1a:02:fb Fingerprint (SHA-256): D5:C1:4D:A9:8A:3A:6E:2A:80:75:9D:B9:F4:09:A8:D6:57:36:DC:30:74:8F:C5:96:D0:D5:DD:2D:DB:D7:0B:CD Fingerprint (SHA1): 56:D9:24:C7:F0:17:16:FA:79:E8:49:92:28:69:FC:15:9D:C2:87:05 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #8261: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8262: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8263: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8264: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8265: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173585 (0x1957a251) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:12:00 2016 Not After : Sun Apr 25 18:12:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:67:7b:ba:5c:d5:24:c1:52:2e:e1:84:0b:97:42:c2: 92:dd:12:74:0d:d5:dc:29:0e:7b:16:b8:f4:29:ef:76: a9:49:c6:8d:bf:0b:37:e0:89:d2:46:62:66:a4:7a:46: 9e:c9:1b:5c:dc:31:a3:d1:67:93:56:54:42:88:af:a3: 15:1d:4f:09:0e:39:0c:af:9c:24:82:9b:72:3c:9d:f3: 03:e5:17:9a:f1:77:f6:e2:0d:55:07:54:98:d2:20:49: 01:4f:96:62:d1:85:0c:f0:11:f0:75:13:8e:a0:2b:78: d7:d8:c1:d4:9a:f4:34:4a:8d:49:1e:31:25:e0:1e:3c: 02:47:78:98:df:2f:5f:19:06:30:b5:b5:54:1e:35:d4: 56:2f:53:bb:ed:86:ce:96:3c:a0:bf:ff:b5:8a:4e:c5: 1f:0c:c7:30:f5:4e:d2:32:85:e1:10:44:65:11:60:4f: ad:62:29:54:23:07:57:d4:32:8d:07:80:47:55:89:cb: d6:db:19:86:09:96:29:14:25:cf:77:8c:0d:9e:29:18: e8:80:35:ea:5a:17:d3:90:5e:19:04:c5:e9:1f:5c:46: ab:e3:5b:ac:97:65:9d:e5:95:47:34:d7:71:e3:50:15: 79:46:09:9d:d8:55:09:e6:e6:c8:68:4a:cc:f9:b0:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:51:a2:e2:70:6e:68:2f:ae:d0:61:95:01:db:7a:00: 9b:6e:90:d3:04:6d:94:0e:0c:09:f1:24:14:28:b4:77: 2c:0c:6c:88:09:b1:1a:7d:58:ae:8d:0f:2e:01:70:f1: b7:91:2e:4d:21:5a:3a:9c:04:24:70:e3:c7:33:6f:9d: 97:21:ef:07:fd:0c:79:0f:aa:c3:a0:e9:43:9a:44:15: b5:b7:fe:c9:01:01:3e:b3:5f:51:2a:3d:a3:f4:ae:1a: b7:76:34:74:05:43:60:7a:cf:cb:f9:16:63:59:8c:8d: b6:2b:f6:c4:5e:2e:0f:28:62:b5:80:89:c1:63:5e:5f: b9:68:7c:05:78:04:4a:76:c3:cd:ea:14:68:4c:26:be: af:4d:13:ec:58:0e:04:19:22:64:c9:f7:26:04:45:81: 56:75:57:55:6f:4b:b4:73:58:5c:d5:23:ca:04:5f:4b: 7d:fb:fb:f0:82:e5:62:09:66:f5:af:d3:21:19:67:ef: 5e:43:28:c6:00:48:35:c7:c5:1a:ea:70:f2:53:4c:90: f8:a1:d7:15:e7:1b:f6:4e:27:11:15:18:93:2b:81:4c: 5d:19:b3:e1:9d:4e:ad:0e:4e:12:b7:c9:12:bf:3a:47: 16:66:a1:ba:c9:13:e9:4d:7f:a1:e8:e8:73:93:f7:8d Fingerprint (SHA-256): F8:46:76:AF:F8:81:A1:33:D4:44:F2:AE:00:53:22:A9:E4:90:1A:6C:C0:C9:01:D4:A3:E0:FA:B4:23:D9:94:B6 Fingerprint (SHA1): 31:98:EE:DD:B6:91:E1:11:A1:0D:15:DA:15:3B:6D:97:3C:1E:18:38 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8266: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8267: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173586 (0x1957a252) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:12:06 2016 Not After : Sun Apr 25 18:12:06 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:b0:76:7c:06:23:e8:a3:d4:ec:ac:c6:09:b7:f5:69: 95:12:6c:4d:78:bd:fe:ae:90:36:4b:1c:f2:d9:e4:47: da:5a:46:56:4c:0f:db:f9:19:1f:d9:20:82:80:d5:08: 94:ce:15:3d:a3:55:55:36:1e:77:df:57:b8:8d:1a:e1: 03:5b:19:60:c5:0e:2b:a2:29:54:87:27:10:48:da:ea: 11:6e:23:00:cd:50:0b:a1:60:34:a1:b1:b8:b5:5e:75: dc:fe:d5:e8:bb:94:4e:25:0b:40:48:64:9e:59:f5:24: b9:e2:1d:48:a3:8c:8b:51:88:3a:91:29:6d:2e:0f:d0: b4:ab:98:c5:0e:d2:cd:26:83:95:1c:55:60:3b:cd:d1: cd:9e:7f:ef:97:d8:00:3e:35:02:9e:77:ea:93:48:79: 06:df:17:6b:94:4b:98:68:c9:2a:6c:f0:e9:e6:24:15: d1:eb:08:23:4a:95:7b:da:e3:9f:f5:ce:0f:a3:ab:2e: 68:52:17:d4:84:86:9e:48:a9:aa:c1:e0:35:f4:14:7a: c4:f9:cb:f8:dd:c9:5a:27:64:13:4f:7b:0e:77:b2:af: 48:c0:cd:84:3e:49:44:1c:64:59:25:b4:cc:2e:e5:77: 5e:76:6c:ae:66:53:29:59:a6:4b:b4:33:bc:9d:40:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:d8:b6:22:da:fe:67:64:58:40:ce:4a:97:f6:87:39: 09:f3:e4:ba:92:2f:72:23:60:de:ed:3d:29:10:12:c2: 89:3a:63:fd:03:dd:c9:21:8f:43:4a:b2:f3:c3:09:3e: 26:9d:d3:62:64:3e:cc:9a:8c:52:32:b0:78:a8:a8:e3: a3:7d:92:1f:9b:b2:d7:36:cb:cb:8e:1a:90:41:80:35: 54:33:14:c2:78:14:f0:f4:af:6e:45:9d:82:cf:02:fb: 34:c8:48:ea:02:23:da:29:9b:a7:af:4a:06:8d:6a:97: 19:53:74:bd:f3:e3:f1:33:ea:61:96:8e:b4:2d:ef:b4: aa:5f:60:ca:a2:6a:5b:64:b2:09:70:d8:82:65:7e:df: 4e:04:3c:0c:da:3b:d6:d9:88:87:23:8d:cb:69:6c:b7: 03:52:c2:be:ac:59:68:f5:cb:fc:dc:53:46:a0:9e:a1: 81:45:f4:15:0b:03:71:85:69:79:5d:18:55:9f:71:80: 31:0b:33:b5:80:3f:c6:c4:ce:a3:c2:c8:4b:e3:da:ed: c2:d7:da:79:7b:80:88:c6:9a:6f:f0:6b:91:4c:ba:71: c5:8e:2c:e1:8c:90:0f:54:9f:b4:14:0c:77:e9:05:16: d1:8c:65:0e:dd:c2:eb:90:92:30:09:3f:20:4d:66:e7 Fingerprint (SHA-256): 07:3B:29:A0:22:75:DB:40:50:95:D6:5E:6F:4C:2B:3E:B7:1F:FC:BF:66:D4:01:B0:04:99:A8:EB:C7:0D:AB:6E Fingerprint (SHA1): 48:7D:AC:F1:8C:16:DF:A9:82:97:0F:4C:E8:03:BF:4C:A5:1B:81:FA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8268: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8269: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173587 (0x1957a253) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:12:18 2016 Not After : Sun Apr 25 18:12:18 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:92:68:e2:a2:02:1b:95:e2:81:e1:de:b1:1f:40:4d: 26:f0:3f:bd:86:02:c6:0d:5f:39:9f:78:be:46:08:9f: 30:19:70:9f:fb:28:9c:04:16:8b:46:c7:09:ce:8f:f1: 92:e3:2c:d5:03:ec:a0:f9:f8:d1:44:54:2e:af:3f:40: ea:96:8d:77:56:9e:e1:fc:51:dc:6d:f2:34:8e:06:f2: 83:4f:51:b7:9a:c5:0a:67:e0:09:f7:91:bb:81:ee:3b: b9:c9:41:cf:2b:53:54:e3:a6:19:1b:06:5b:91:aa:5e: 19:78:45:83:40:95:a6:56:49:ad:6e:d1:5d:ba:8b:32: f6:03:c4:19:71:1f:e4:48:ea:ba:f0:9c:01:bb:c1:d1: f2:25:f2:7f:6b:3b:8a:73:fc:dc:5a:f9:38:ee:d4:ec: 20:ea:a5:97:14:7f:1b:41:49:2d:c8:4a:d8:f4:a8:23: 11:85:03:26:96:28:b1:e3:c5:d5:54:12:fe:10:5e:25: ae:0f:48:45:1e:43:18:76:8f:25:da:22:2c:f6:28:bc: d6:17:65:2a:06:2f:d1:2e:38:cd:f6:b1:3a:9f:31:f4: c6:8e:a7:b0:9b:b6:cd:b1:c0:8d:46:17:b1:b4:4b:e4: 3e:34:32:f9:65:7a:6b:c7:ca:0e:ed:2a:d7:38:7c:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:f7:09:a8:51:4a:4b:a0:9f:65:12:fe:40:b2:f5:4c: 60:3a:fa:7e:63:40:ed:4c:b0:9e:f5:4d:07:11:d5:cf: 0b:31:72:c8:fd:dd:18:5b:a6:af:23:ed:90:0f:1a:24: 61:f9:bf:8e:2f:72:57:79:02:ee:b3:4b:7e:06:96:80: 8b:d7:9d:fe:cb:57:dd:2a:4e:f3:ec:f5:d8:c8:88:0f: cb:c4:51:51:af:64:13:74:f0:ee:a9:0b:6f:87:13:59: 93:39:e2:b2:64:47:5f:95:d3:ae:83:9a:97:30:ee:c3: 57:68:76:36:71:e2:1f:8f:d7:89:3f:b2:f7:8c:16:28: 4d:a2:3c:f8:3a:be:20:86:56:a5:e6:6d:8a:5b:6a:fa: a0:a3:a9:8c:63:6f:5c:ad:f4:a7:1d:a3:5c:98:25:d9: 19:1b:2c:41:5f:66:dd:e6:5c:e9:b7:ca:44:4d:2a:7a: d6:6e:bb:cb:62:a0:01:9c:96:a0:08:3b:f0:8a:08:77: 7e:90:f7:44:8f:6d:dd:73:81:6e:e8:00:e7:3f:52:55: 77:28:6d:7b:a8:de:2e:93:75:e2:7f:d9:6d:5a:7c:07: d8:22:e9:0f:8f:77:9a:82:8d:b9:0c:b2:64:54:53:3c: 50:30:56:ae:43:be:d5:49:c8:6c:50:d2:4e:1a:02:fb Fingerprint (SHA-256): D5:C1:4D:A9:8A:3A:6E:2A:80:75:9D:B9:F4:09:A8:D6:57:36:DC:30:74:8F:C5:96:D0:D5:DD:2D:DB:D7:0B:CD Fingerprint (SHA1): 56:D9:24:C7:F0:17:16:FA:79:E8:49:92:28:69:FC:15:9D:C2:87:05 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #8270: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8271: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173585 (0x1957a251) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:12:00 2016 Not After : Sun Apr 25 18:12:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:67:7b:ba:5c:d5:24:c1:52:2e:e1:84:0b:97:42:c2: 92:dd:12:74:0d:d5:dc:29:0e:7b:16:b8:f4:29:ef:76: a9:49:c6:8d:bf:0b:37:e0:89:d2:46:62:66:a4:7a:46: 9e:c9:1b:5c:dc:31:a3:d1:67:93:56:54:42:88:af:a3: 15:1d:4f:09:0e:39:0c:af:9c:24:82:9b:72:3c:9d:f3: 03:e5:17:9a:f1:77:f6:e2:0d:55:07:54:98:d2:20:49: 01:4f:96:62:d1:85:0c:f0:11:f0:75:13:8e:a0:2b:78: d7:d8:c1:d4:9a:f4:34:4a:8d:49:1e:31:25:e0:1e:3c: 02:47:78:98:df:2f:5f:19:06:30:b5:b5:54:1e:35:d4: 56:2f:53:bb:ed:86:ce:96:3c:a0:bf:ff:b5:8a:4e:c5: 1f:0c:c7:30:f5:4e:d2:32:85:e1:10:44:65:11:60:4f: ad:62:29:54:23:07:57:d4:32:8d:07:80:47:55:89:cb: d6:db:19:86:09:96:29:14:25:cf:77:8c:0d:9e:29:18: e8:80:35:ea:5a:17:d3:90:5e:19:04:c5:e9:1f:5c:46: ab:e3:5b:ac:97:65:9d:e5:95:47:34:d7:71:e3:50:15: 79:46:09:9d:d8:55:09:e6:e6:c8:68:4a:cc:f9:b0:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:51:a2:e2:70:6e:68:2f:ae:d0:61:95:01:db:7a:00: 9b:6e:90:d3:04:6d:94:0e:0c:09:f1:24:14:28:b4:77: 2c:0c:6c:88:09:b1:1a:7d:58:ae:8d:0f:2e:01:70:f1: b7:91:2e:4d:21:5a:3a:9c:04:24:70:e3:c7:33:6f:9d: 97:21:ef:07:fd:0c:79:0f:aa:c3:a0:e9:43:9a:44:15: b5:b7:fe:c9:01:01:3e:b3:5f:51:2a:3d:a3:f4:ae:1a: b7:76:34:74:05:43:60:7a:cf:cb:f9:16:63:59:8c:8d: b6:2b:f6:c4:5e:2e:0f:28:62:b5:80:89:c1:63:5e:5f: b9:68:7c:05:78:04:4a:76:c3:cd:ea:14:68:4c:26:be: af:4d:13:ec:58:0e:04:19:22:64:c9:f7:26:04:45:81: 56:75:57:55:6f:4b:b4:73:58:5c:d5:23:ca:04:5f:4b: 7d:fb:fb:f0:82:e5:62:09:66:f5:af:d3:21:19:67:ef: 5e:43:28:c6:00:48:35:c7:c5:1a:ea:70:f2:53:4c:90: f8:a1:d7:15:e7:1b:f6:4e:27:11:15:18:93:2b:81:4c: 5d:19:b3:e1:9d:4e:ad:0e:4e:12:b7:c9:12:bf:3a:47: 16:66:a1:ba:c9:13:e9:4d:7f:a1:e8:e8:73:93:f7:8d Fingerprint (SHA-256): F8:46:76:AF:F8:81:A1:33:D4:44:F2:AE:00:53:22:A9:E4:90:1A:6C:C0:C9:01:D4:A3:E0:FA:B4:23:D9:94:B6 Fingerprint (SHA1): 31:98:EE:DD:B6:91:E1:11:A1:0D:15:DA:15:3B:6D:97:3C:1E:18:38 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8272: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173585 (0x1957a251) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:12:00 2016 Not After : Sun Apr 25 18:12:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:67:7b:ba:5c:d5:24:c1:52:2e:e1:84:0b:97:42:c2: 92:dd:12:74:0d:d5:dc:29:0e:7b:16:b8:f4:29:ef:76: a9:49:c6:8d:bf:0b:37:e0:89:d2:46:62:66:a4:7a:46: 9e:c9:1b:5c:dc:31:a3:d1:67:93:56:54:42:88:af:a3: 15:1d:4f:09:0e:39:0c:af:9c:24:82:9b:72:3c:9d:f3: 03:e5:17:9a:f1:77:f6:e2:0d:55:07:54:98:d2:20:49: 01:4f:96:62:d1:85:0c:f0:11:f0:75:13:8e:a0:2b:78: d7:d8:c1:d4:9a:f4:34:4a:8d:49:1e:31:25:e0:1e:3c: 02:47:78:98:df:2f:5f:19:06:30:b5:b5:54:1e:35:d4: 56:2f:53:bb:ed:86:ce:96:3c:a0:bf:ff:b5:8a:4e:c5: 1f:0c:c7:30:f5:4e:d2:32:85:e1:10:44:65:11:60:4f: ad:62:29:54:23:07:57:d4:32:8d:07:80:47:55:89:cb: d6:db:19:86:09:96:29:14:25:cf:77:8c:0d:9e:29:18: e8:80:35:ea:5a:17:d3:90:5e:19:04:c5:e9:1f:5c:46: ab:e3:5b:ac:97:65:9d:e5:95:47:34:d7:71:e3:50:15: 79:46:09:9d:d8:55:09:e6:e6:c8:68:4a:cc:f9:b0:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:51:a2:e2:70:6e:68:2f:ae:d0:61:95:01:db:7a:00: 9b:6e:90:d3:04:6d:94:0e:0c:09:f1:24:14:28:b4:77: 2c:0c:6c:88:09:b1:1a:7d:58:ae:8d:0f:2e:01:70:f1: b7:91:2e:4d:21:5a:3a:9c:04:24:70:e3:c7:33:6f:9d: 97:21:ef:07:fd:0c:79:0f:aa:c3:a0:e9:43:9a:44:15: b5:b7:fe:c9:01:01:3e:b3:5f:51:2a:3d:a3:f4:ae:1a: b7:76:34:74:05:43:60:7a:cf:cb:f9:16:63:59:8c:8d: b6:2b:f6:c4:5e:2e:0f:28:62:b5:80:89:c1:63:5e:5f: b9:68:7c:05:78:04:4a:76:c3:cd:ea:14:68:4c:26:be: af:4d:13:ec:58:0e:04:19:22:64:c9:f7:26:04:45:81: 56:75:57:55:6f:4b:b4:73:58:5c:d5:23:ca:04:5f:4b: 7d:fb:fb:f0:82:e5:62:09:66:f5:af:d3:21:19:67:ef: 5e:43:28:c6:00:48:35:c7:c5:1a:ea:70:f2:53:4c:90: f8:a1:d7:15:e7:1b:f6:4e:27:11:15:18:93:2b:81:4c: 5d:19:b3:e1:9d:4e:ad:0e:4e:12:b7:c9:12:bf:3a:47: 16:66:a1:ba:c9:13:e9:4d:7f:a1:e8:e8:73:93:f7:8d Fingerprint (SHA-256): F8:46:76:AF:F8:81:A1:33:D4:44:F2:AE:00:53:22:A9:E4:90:1A:6C:C0:C9:01:D4:A3:E0:FA:B4:23:D9:94:B6 Fingerprint (SHA1): 31:98:EE:DD:B6:91:E1:11:A1:0D:15:DA:15:3B:6D:97:3C:1E:18:38 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8273: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173586 (0x1957a252) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:12:06 2016 Not After : Sun Apr 25 18:12:06 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:b0:76:7c:06:23:e8:a3:d4:ec:ac:c6:09:b7:f5:69: 95:12:6c:4d:78:bd:fe:ae:90:36:4b:1c:f2:d9:e4:47: da:5a:46:56:4c:0f:db:f9:19:1f:d9:20:82:80:d5:08: 94:ce:15:3d:a3:55:55:36:1e:77:df:57:b8:8d:1a:e1: 03:5b:19:60:c5:0e:2b:a2:29:54:87:27:10:48:da:ea: 11:6e:23:00:cd:50:0b:a1:60:34:a1:b1:b8:b5:5e:75: dc:fe:d5:e8:bb:94:4e:25:0b:40:48:64:9e:59:f5:24: b9:e2:1d:48:a3:8c:8b:51:88:3a:91:29:6d:2e:0f:d0: b4:ab:98:c5:0e:d2:cd:26:83:95:1c:55:60:3b:cd:d1: cd:9e:7f:ef:97:d8:00:3e:35:02:9e:77:ea:93:48:79: 06:df:17:6b:94:4b:98:68:c9:2a:6c:f0:e9:e6:24:15: d1:eb:08:23:4a:95:7b:da:e3:9f:f5:ce:0f:a3:ab:2e: 68:52:17:d4:84:86:9e:48:a9:aa:c1:e0:35:f4:14:7a: c4:f9:cb:f8:dd:c9:5a:27:64:13:4f:7b:0e:77:b2:af: 48:c0:cd:84:3e:49:44:1c:64:59:25:b4:cc:2e:e5:77: 5e:76:6c:ae:66:53:29:59:a6:4b:b4:33:bc:9d:40:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:d8:b6:22:da:fe:67:64:58:40:ce:4a:97:f6:87:39: 09:f3:e4:ba:92:2f:72:23:60:de:ed:3d:29:10:12:c2: 89:3a:63:fd:03:dd:c9:21:8f:43:4a:b2:f3:c3:09:3e: 26:9d:d3:62:64:3e:cc:9a:8c:52:32:b0:78:a8:a8:e3: a3:7d:92:1f:9b:b2:d7:36:cb:cb:8e:1a:90:41:80:35: 54:33:14:c2:78:14:f0:f4:af:6e:45:9d:82:cf:02:fb: 34:c8:48:ea:02:23:da:29:9b:a7:af:4a:06:8d:6a:97: 19:53:74:bd:f3:e3:f1:33:ea:61:96:8e:b4:2d:ef:b4: aa:5f:60:ca:a2:6a:5b:64:b2:09:70:d8:82:65:7e:df: 4e:04:3c:0c:da:3b:d6:d9:88:87:23:8d:cb:69:6c:b7: 03:52:c2:be:ac:59:68:f5:cb:fc:dc:53:46:a0:9e:a1: 81:45:f4:15:0b:03:71:85:69:79:5d:18:55:9f:71:80: 31:0b:33:b5:80:3f:c6:c4:ce:a3:c2:c8:4b:e3:da:ed: c2:d7:da:79:7b:80:88:c6:9a:6f:f0:6b:91:4c:ba:71: c5:8e:2c:e1:8c:90:0f:54:9f:b4:14:0c:77:e9:05:16: d1:8c:65:0e:dd:c2:eb:90:92:30:09:3f:20:4d:66:e7 Fingerprint (SHA-256): 07:3B:29:A0:22:75:DB:40:50:95:D6:5E:6F:4C:2B:3E:B7:1F:FC:BF:66:D4:01:B0:04:99:A8:EB:C7:0D:AB:6E Fingerprint (SHA1): 48:7D:AC:F1:8C:16:DF:A9:82:97:0F:4C:E8:03:BF:4C:A5:1B:81:FA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8274: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173586 (0x1957a252) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:12:06 2016 Not After : Sun Apr 25 18:12:06 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:b0:76:7c:06:23:e8:a3:d4:ec:ac:c6:09:b7:f5:69: 95:12:6c:4d:78:bd:fe:ae:90:36:4b:1c:f2:d9:e4:47: da:5a:46:56:4c:0f:db:f9:19:1f:d9:20:82:80:d5:08: 94:ce:15:3d:a3:55:55:36:1e:77:df:57:b8:8d:1a:e1: 03:5b:19:60:c5:0e:2b:a2:29:54:87:27:10:48:da:ea: 11:6e:23:00:cd:50:0b:a1:60:34:a1:b1:b8:b5:5e:75: dc:fe:d5:e8:bb:94:4e:25:0b:40:48:64:9e:59:f5:24: b9:e2:1d:48:a3:8c:8b:51:88:3a:91:29:6d:2e:0f:d0: b4:ab:98:c5:0e:d2:cd:26:83:95:1c:55:60:3b:cd:d1: cd:9e:7f:ef:97:d8:00:3e:35:02:9e:77:ea:93:48:79: 06:df:17:6b:94:4b:98:68:c9:2a:6c:f0:e9:e6:24:15: d1:eb:08:23:4a:95:7b:da:e3:9f:f5:ce:0f:a3:ab:2e: 68:52:17:d4:84:86:9e:48:a9:aa:c1:e0:35:f4:14:7a: c4:f9:cb:f8:dd:c9:5a:27:64:13:4f:7b:0e:77:b2:af: 48:c0:cd:84:3e:49:44:1c:64:59:25:b4:cc:2e:e5:77: 5e:76:6c:ae:66:53:29:59:a6:4b:b4:33:bc:9d:40:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:d8:b6:22:da:fe:67:64:58:40:ce:4a:97:f6:87:39: 09:f3:e4:ba:92:2f:72:23:60:de:ed:3d:29:10:12:c2: 89:3a:63:fd:03:dd:c9:21:8f:43:4a:b2:f3:c3:09:3e: 26:9d:d3:62:64:3e:cc:9a:8c:52:32:b0:78:a8:a8:e3: a3:7d:92:1f:9b:b2:d7:36:cb:cb:8e:1a:90:41:80:35: 54:33:14:c2:78:14:f0:f4:af:6e:45:9d:82:cf:02:fb: 34:c8:48:ea:02:23:da:29:9b:a7:af:4a:06:8d:6a:97: 19:53:74:bd:f3:e3:f1:33:ea:61:96:8e:b4:2d:ef:b4: aa:5f:60:ca:a2:6a:5b:64:b2:09:70:d8:82:65:7e:df: 4e:04:3c:0c:da:3b:d6:d9:88:87:23:8d:cb:69:6c:b7: 03:52:c2:be:ac:59:68:f5:cb:fc:dc:53:46:a0:9e:a1: 81:45:f4:15:0b:03:71:85:69:79:5d:18:55:9f:71:80: 31:0b:33:b5:80:3f:c6:c4:ce:a3:c2:c8:4b:e3:da:ed: c2:d7:da:79:7b:80:88:c6:9a:6f:f0:6b:91:4c:ba:71: c5:8e:2c:e1:8c:90:0f:54:9f:b4:14:0c:77:e9:05:16: d1:8c:65:0e:dd:c2:eb:90:92:30:09:3f:20:4d:66:e7 Fingerprint (SHA-256): 07:3B:29:A0:22:75:DB:40:50:95:D6:5E:6F:4C:2B:3E:B7:1F:FC:BF:66:D4:01:B0:04:99:A8:EB:C7:0D:AB:6E Fingerprint (SHA1): 48:7D:AC:F1:8C:16:DF:A9:82:97:0F:4C:E8:03:BF:4C:A5:1B:81:FA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8275: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173587 (0x1957a253) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:12:18 2016 Not After : Sun Apr 25 18:12:18 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:92:68:e2:a2:02:1b:95:e2:81:e1:de:b1:1f:40:4d: 26:f0:3f:bd:86:02:c6:0d:5f:39:9f:78:be:46:08:9f: 30:19:70:9f:fb:28:9c:04:16:8b:46:c7:09:ce:8f:f1: 92:e3:2c:d5:03:ec:a0:f9:f8:d1:44:54:2e:af:3f:40: ea:96:8d:77:56:9e:e1:fc:51:dc:6d:f2:34:8e:06:f2: 83:4f:51:b7:9a:c5:0a:67:e0:09:f7:91:bb:81:ee:3b: b9:c9:41:cf:2b:53:54:e3:a6:19:1b:06:5b:91:aa:5e: 19:78:45:83:40:95:a6:56:49:ad:6e:d1:5d:ba:8b:32: f6:03:c4:19:71:1f:e4:48:ea:ba:f0:9c:01:bb:c1:d1: f2:25:f2:7f:6b:3b:8a:73:fc:dc:5a:f9:38:ee:d4:ec: 20:ea:a5:97:14:7f:1b:41:49:2d:c8:4a:d8:f4:a8:23: 11:85:03:26:96:28:b1:e3:c5:d5:54:12:fe:10:5e:25: ae:0f:48:45:1e:43:18:76:8f:25:da:22:2c:f6:28:bc: d6:17:65:2a:06:2f:d1:2e:38:cd:f6:b1:3a:9f:31:f4: c6:8e:a7:b0:9b:b6:cd:b1:c0:8d:46:17:b1:b4:4b:e4: 3e:34:32:f9:65:7a:6b:c7:ca:0e:ed:2a:d7:38:7c:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:f7:09:a8:51:4a:4b:a0:9f:65:12:fe:40:b2:f5:4c: 60:3a:fa:7e:63:40:ed:4c:b0:9e:f5:4d:07:11:d5:cf: 0b:31:72:c8:fd:dd:18:5b:a6:af:23:ed:90:0f:1a:24: 61:f9:bf:8e:2f:72:57:79:02:ee:b3:4b:7e:06:96:80: 8b:d7:9d:fe:cb:57:dd:2a:4e:f3:ec:f5:d8:c8:88:0f: cb:c4:51:51:af:64:13:74:f0:ee:a9:0b:6f:87:13:59: 93:39:e2:b2:64:47:5f:95:d3:ae:83:9a:97:30:ee:c3: 57:68:76:36:71:e2:1f:8f:d7:89:3f:b2:f7:8c:16:28: 4d:a2:3c:f8:3a:be:20:86:56:a5:e6:6d:8a:5b:6a:fa: a0:a3:a9:8c:63:6f:5c:ad:f4:a7:1d:a3:5c:98:25:d9: 19:1b:2c:41:5f:66:dd:e6:5c:e9:b7:ca:44:4d:2a:7a: d6:6e:bb:cb:62:a0:01:9c:96:a0:08:3b:f0:8a:08:77: 7e:90:f7:44:8f:6d:dd:73:81:6e:e8:00:e7:3f:52:55: 77:28:6d:7b:a8:de:2e:93:75:e2:7f:d9:6d:5a:7c:07: d8:22:e9:0f:8f:77:9a:82:8d:b9:0c:b2:64:54:53:3c: 50:30:56:ae:43:be:d5:49:c8:6c:50:d2:4e:1a:02:fb Fingerprint (SHA-256): D5:C1:4D:A9:8A:3A:6E:2A:80:75:9D:B9:F4:09:A8:D6:57:36:DC:30:74:8F:C5:96:D0:D5:DD:2D:DB:D7:0B:CD Fingerprint (SHA1): 56:D9:24:C7:F0:17:16:FA:79:E8:49:92:28:69:FC:15:9D:C2:87:05 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #8276: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173587 (0x1957a253) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:12:18 2016 Not After : Sun Apr 25 18:12:18 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:92:68:e2:a2:02:1b:95:e2:81:e1:de:b1:1f:40:4d: 26:f0:3f:bd:86:02:c6:0d:5f:39:9f:78:be:46:08:9f: 30:19:70:9f:fb:28:9c:04:16:8b:46:c7:09:ce:8f:f1: 92:e3:2c:d5:03:ec:a0:f9:f8:d1:44:54:2e:af:3f:40: ea:96:8d:77:56:9e:e1:fc:51:dc:6d:f2:34:8e:06:f2: 83:4f:51:b7:9a:c5:0a:67:e0:09:f7:91:bb:81:ee:3b: b9:c9:41:cf:2b:53:54:e3:a6:19:1b:06:5b:91:aa:5e: 19:78:45:83:40:95:a6:56:49:ad:6e:d1:5d:ba:8b:32: f6:03:c4:19:71:1f:e4:48:ea:ba:f0:9c:01:bb:c1:d1: f2:25:f2:7f:6b:3b:8a:73:fc:dc:5a:f9:38:ee:d4:ec: 20:ea:a5:97:14:7f:1b:41:49:2d:c8:4a:d8:f4:a8:23: 11:85:03:26:96:28:b1:e3:c5:d5:54:12:fe:10:5e:25: ae:0f:48:45:1e:43:18:76:8f:25:da:22:2c:f6:28:bc: d6:17:65:2a:06:2f:d1:2e:38:cd:f6:b1:3a:9f:31:f4: c6:8e:a7:b0:9b:b6:cd:b1:c0:8d:46:17:b1:b4:4b:e4: 3e:34:32:f9:65:7a:6b:c7:ca:0e:ed:2a:d7:38:7c:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:f7:09:a8:51:4a:4b:a0:9f:65:12:fe:40:b2:f5:4c: 60:3a:fa:7e:63:40:ed:4c:b0:9e:f5:4d:07:11:d5:cf: 0b:31:72:c8:fd:dd:18:5b:a6:af:23:ed:90:0f:1a:24: 61:f9:bf:8e:2f:72:57:79:02:ee:b3:4b:7e:06:96:80: 8b:d7:9d:fe:cb:57:dd:2a:4e:f3:ec:f5:d8:c8:88:0f: cb:c4:51:51:af:64:13:74:f0:ee:a9:0b:6f:87:13:59: 93:39:e2:b2:64:47:5f:95:d3:ae:83:9a:97:30:ee:c3: 57:68:76:36:71:e2:1f:8f:d7:89:3f:b2:f7:8c:16:28: 4d:a2:3c:f8:3a:be:20:86:56:a5:e6:6d:8a:5b:6a:fa: a0:a3:a9:8c:63:6f:5c:ad:f4:a7:1d:a3:5c:98:25:d9: 19:1b:2c:41:5f:66:dd:e6:5c:e9:b7:ca:44:4d:2a:7a: d6:6e:bb:cb:62:a0:01:9c:96:a0:08:3b:f0:8a:08:77: 7e:90:f7:44:8f:6d:dd:73:81:6e:e8:00:e7:3f:52:55: 77:28:6d:7b:a8:de:2e:93:75:e2:7f:d9:6d:5a:7c:07: d8:22:e9:0f:8f:77:9a:82:8d:b9:0c:b2:64:54:53:3c: 50:30:56:ae:43:be:d5:49:c8:6c:50:d2:4e:1a:02:fb Fingerprint (SHA-256): D5:C1:4D:A9:8A:3A:6E:2A:80:75:9D:B9:F4:09:A8:D6:57:36:DC:30:74:8F:C5:96:D0:D5:DD:2D:DB:D7:0B:CD Fingerprint (SHA1): 56:D9:24:C7:F0:17:16:FA:79:E8:49:92:28:69:FC:15:9D:C2:87:05 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #8277: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8278: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173590 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8279: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8280: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8281: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8282: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425173591 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8283: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8284: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8285: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8286: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173592 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8287: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8288: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #8289: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8290: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 425173593 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8291: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8292: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #8293: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8294: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425173594 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8295: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8296: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #8297: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8298: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425173595 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8299: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8300: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #8301: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8302: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 425173596 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8303: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8304: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8305: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #8306: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #8307: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8308: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #8309: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173590 (0x1957a256) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:13:01 2016 Not After : Sun Apr 25 18:13:01 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:1b:8f:b4:c4:7f:19:3c:de:bb:94:29:07:e2:c2:1c: 3e:24:b8:1f:37:a1:bc:b9:89:4d:c4:4b:53:73:46:44: 10:05:6e:b1:de:10:f0:4f:22:49:ea:d2:d7:fb:8c:a9: 2d:22:0a:3b:b9:1a:a4:29:00:a2:f6:76:df:8c:65:a5: 73:9d:8e:e5:a8:87:5f:7b:b4:ed:69:04:3e:c3:6d:51: c7:2a:62:f2:50:20:46:96:4e:13:96:51:00:b5:1a:8e: c1:4b:66:15:6c:10:f3:bb:c8:ff:6d:96:e7:39:01:5e: 8e:87:fa:ae:8b:61:ea:f0:48:7e:db:1e:f9:0b:5b:d3: 3e:5f:55:51:50:4e:ec:6f:57:52:42:ea:8c:09:e3:c5: 75:f2:ab:c4:cb:0f:bf:4f:d3:49:0f:e2:04:84:24:6b: d2:4f:eb:37:f4:4a:31:1a:54:c7:c8:29:1c:88:93:32: ec:0d:33:91:5b:35:52:4b:1b:53:6c:97:ae:02:b8:10: a9:78:50:bc:33:0c:68:d1:c2:9c:c9:04:bc:45:f6:dd: 48:88:8c:f7:fc:ae:44:9e:1b:40:a3:5b:9f:f3:38:fa: c3:2a:3c:a5:0d:a0:af:2c:0e:73:fd:4c:0a:e4:1c:ef: 54:4b:cc:28:79:90:fc:f5:7c:4d:00:29:ec:3c:48:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:87:a3:e8:6f:c2:e1:6d:8d:73:6e:5b:be:47:4a:78: d2:a6:2c:03:3e:3d:8e:4c:0f:8b:42:1e:d7:ed:12:4b: 7d:a1:0f:b3:d6:10:34:1e:34:3c:69:52:41:cb:d2:99: a3:52:6b:c9:07:9f:7c:da:73:6b:d3:ce:ae:87:bb:4e: 9d:ac:9d:8e:82:d1:13:2a:ba:85:b3:49:79:8d:ab:f4: 62:ca:38:d3:f9:0d:c6:ce:d6:4f:f2:a4:80:26:fb:fe: 9d:5d:21:1b:00:ae:b2:25:5b:88:ca:e7:f7:6b:b0:78: d5:99:44:a8:df:d9:e6:e5:40:89:8a:f8:28:b9:87:55: d9:1a:8e:22:bf:24:c5:ea:4b:f2:89:91:e7:d1:4d:24: 78:4f:0b:5a:91:03:2a:95:65:39:34:4b:46:90:72:3d: 3b:65:21:6e:33:48:b1:39:c6:26:4b:f0:96:17:59:9a: 79:ec:4a:9c:fb:2a:c7:8a:a6:ee:c7:ef:e9:f2:5d:c3: a8:46:63:b3:3f:0b:86:32:d3:39:4d:8e:16:c2:00:b2: ff:2c:ce:0c:01:73:eb:56:ac:f4:a6:e8:74:87:bf:13: 9a:dd:76:90:f8:2f:ce:9e:00:93:01:73:9d:9f:b2:d6: d3:65:87:75:c2:8a:cf:21:2d:3a:1b:5f:b5:48:f2:20 Fingerprint (SHA-256): 6F:2A:1E:AD:30:3E:07:38:A1:2E:2B:28:D0:E5:9D:2C:7F:A5:FD:62:94:DE:D8:21:17:A7:44:DF:A0:9C:D5:FE Fingerprint (SHA1): 83:A6:83:F6:02:56:57:7F:74:5C:1D:CB:03:40:6D:40:FE:CF:0B:80 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8310: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8311: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8312: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8313: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173590 (0x1957a256) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:13:01 2016 Not After : Sun Apr 25 18:13:01 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:1b:8f:b4:c4:7f:19:3c:de:bb:94:29:07:e2:c2:1c: 3e:24:b8:1f:37:a1:bc:b9:89:4d:c4:4b:53:73:46:44: 10:05:6e:b1:de:10:f0:4f:22:49:ea:d2:d7:fb:8c:a9: 2d:22:0a:3b:b9:1a:a4:29:00:a2:f6:76:df:8c:65:a5: 73:9d:8e:e5:a8:87:5f:7b:b4:ed:69:04:3e:c3:6d:51: c7:2a:62:f2:50:20:46:96:4e:13:96:51:00:b5:1a:8e: c1:4b:66:15:6c:10:f3:bb:c8:ff:6d:96:e7:39:01:5e: 8e:87:fa:ae:8b:61:ea:f0:48:7e:db:1e:f9:0b:5b:d3: 3e:5f:55:51:50:4e:ec:6f:57:52:42:ea:8c:09:e3:c5: 75:f2:ab:c4:cb:0f:bf:4f:d3:49:0f:e2:04:84:24:6b: d2:4f:eb:37:f4:4a:31:1a:54:c7:c8:29:1c:88:93:32: ec:0d:33:91:5b:35:52:4b:1b:53:6c:97:ae:02:b8:10: a9:78:50:bc:33:0c:68:d1:c2:9c:c9:04:bc:45:f6:dd: 48:88:8c:f7:fc:ae:44:9e:1b:40:a3:5b:9f:f3:38:fa: c3:2a:3c:a5:0d:a0:af:2c:0e:73:fd:4c:0a:e4:1c:ef: 54:4b:cc:28:79:90:fc:f5:7c:4d:00:29:ec:3c:48:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:87:a3:e8:6f:c2:e1:6d:8d:73:6e:5b:be:47:4a:78: d2:a6:2c:03:3e:3d:8e:4c:0f:8b:42:1e:d7:ed:12:4b: 7d:a1:0f:b3:d6:10:34:1e:34:3c:69:52:41:cb:d2:99: a3:52:6b:c9:07:9f:7c:da:73:6b:d3:ce:ae:87:bb:4e: 9d:ac:9d:8e:82:d1:13:2a:ba:85:b3:49:79:8d:ab:f4: 62:ca:38:d3:f9:0d:c6:ce:d6:4f:f2:a4:80:26:fb:fe: 9d:5d:21:1b:00:ae:b2:25:5b:88:ca:e7:f7:6b:b0:78: d5:99:44:a8:df:d9:e6:e5:40:89:8a:f8:28:b9:87:55: d9:1a:8e:22:bf:24:c5:ea:4b:f2:89:91:e7:d1:4d:24: 78:4f:0b:5a:91:03:2a:95:65:39:34:4b:46:90:72:3d: 3b:65:21:6e:33:48:b1:39:c6:26:4b:f0:96:17:59:9a: 79:ec:4a:9c:fb:2a:c7:8a:a6:ee:c7:ef:e9:f2:5d:c3: a8:46:63:b3:3f:0b:86:32:d3:39:4d:8e:16:c2:00:b2: ff:2c:ce:0c:01:73:eb:56:ac:f4:a6:e8:74:87:bf:13: 9a:dd:76:90:f8:2f:ce:9e:00:93:01:73:9d:9f:b2:d6: d3:65:87:75:c2:8a:cf:21:2d:3a:1b:5f:b5:48:f2:20 Fingerprint (SHA-256): 6F:2A:1E:AD:30:3E:07:38:A1:2E:2B:28:D0:E5:9D:2C:7F:A5:FD:62:94:DE:D8:21:17:A7:44:DF:A0:9C:D5:FE Fingerprint (SHA1): 83:A6:83:F6:02:56:57:7F:74:5C:1D:CB:03:40:6D:40:FE:CF:0B:80 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8314: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8315: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8316: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173597 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8317: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8318: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8319: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8320: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425173598 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8321: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8322: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #8323: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8324: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 425173599 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8325: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8326: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #8327: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8328: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 425173600 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8329: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8330: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8331: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8332: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 425173601 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8333: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8334: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #8335: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8336: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 425173602 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8337: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8338: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #8339: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8340: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 425173603 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8341: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8342: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8343: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8344: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 425173604 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8345: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8346: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #8347: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8348: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 425173605 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8349: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8350: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #8351: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8352: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 425173606 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8353: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8354: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #8355: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8356: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 425173607 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8357: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8358: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #8359: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8360: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 425173608 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8361: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8362: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #8363: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8364: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 425173609 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8365: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8366: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #8367: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8368: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 425173610 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8369: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8370: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #8371: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8372: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 425173611 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8373: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8374: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #8375: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8376: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 425173612 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8377: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8378: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #8379: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8380: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 425173613 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8381: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8382: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #8383: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8384: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 425173614 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #8385: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8386: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #8387: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8388: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 425173615 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8389: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8390: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #8391: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8392: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 425173616 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8393: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8394: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #8395: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8396: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 425173617 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8397: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8398: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #8399: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8400: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 425173618 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8401: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8402: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #8403: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8404: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 425173619 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8405: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8406: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #8407: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8408: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 425173620 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8409: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8410: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #8411: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8412: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 425173621 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8413: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8414: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #8415: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8416: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 425173622 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8417: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8418: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #8419: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8420: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 425173623 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8421: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8422: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #8423: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8424: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 425173624 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8425: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8426: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #8427: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8428: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 425173625 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8429: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8430: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #8431: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8432: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 425173626 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8433: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8434: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8435: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8436: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8437: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8438: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8439: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8440: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8441: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8442: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8443: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8444: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8445: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8446: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8447: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8448: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8449: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8450: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8451: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8452: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8453: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8454: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8455: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8456: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8457: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173597 (0x1957a25d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:14:32 2016 Not After : Sun Apr 25 18:14:32 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:02:e4:fd:83:c0:e7:78:0c:a7:f8:6a:08:55:10:61: 9c:31:0f:ad:2f:c8:d0:18:7f:3d:5d:c0:a8:33:fb:0b: 29:88:33:cd:68:ac:de:15:17:6b:f3:59:41:90:56:62: f1:92:e8:fe:18:9c:1d:4d:56:fc:a5:62:41:dd:f0:87: dc:63:d5:59:3c:1c:88:9b:90:60:f5:5b:7b:9e:ec:8a: 95:10:1e:5f:ea:19:c9:93:38:51:53:be:61:54:00:39: c5:e9:b5:e4:53:50:d2:43:59:09:88:86:f2:a9:47:1f: 36:f5:1e:aa:39:7b:30:af:ba:c3:90:94:b4:fa:c4:68: d8:41:ba:e1:bb:fd:93:5a:78:db:62:5b:e3:62:d2:d1: 7e:ed:b9:c5:80:8e:3e:9a:c9:fc:c3:38:de:2b:9d:46: 68:0f:1d:67:f2:25:21:d3:bd:2f:8e:d5:a0:18:8f:0d: 4e:45:24:a1:3a:8f:07:c0:47:46:81:28:31:77:f1:d5: 06:15:a3:d7:b5:b4:4a:39:a0:5a:49:17:eb:23:e3:06: 22:6b:40:4d:8b:58:6d:a4:f3:ca:2e:49:0e:e7:de:a8: 33:24:dc:a5:af:f0:57:0b:6f:c1:6b:5a:bb:b6:3f:fb: e3:17:3f:94:47:d1:0f:96:e9:90:14:bc:ea:28:02:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:48:d6:c7:dc:da:f9:b2:cc:f4:bc:4d:a0:b8:72:54: 85:99:9e:72:dc:97:6e:78:e0:98:35:5c:44:14:1b:07: 95:30:c9:46:6a:02:8d:e7:4f:b0:ca:4f:fc:9f:e3:b6: 45:fe:1d:bf:2e:d9:67:ea:b7:13:01:1e:62:d7:1a:5a: e4:80:f3:24:4b:f7:20:fe:a3:de:6f:3b:29:e3:a6:89: 15:20:8f:9d:f5:90:f9:c6:68:7d:4c:68:67:da:ec:e5: 33:2c:e8:2e:5e:6d:a9:ce:14:83:af:ea:99:f5:c5:e5: 5e:eb:89:58:7b:03:99:ec:64:3f:7f:14:91:98:55:5a: ce:39:12:26:9e:3b:a0:88:24:42:63:62:85:30:11:0a: e8:d5:4c:87:e9:50:bb:7f:38:65:99:89:ca:14:b6:a8: 76:17:7f:c6:1d:7d:2b:37:f7:dd:d4:47:eb:f1:ce:ed: a4:d9:b1:66:0c:09:9a:4c:cc:1b:44:db:1d:39:f0:75: 2c:9e:e5:c6:4f:2f:94:ac:2b:5c:c0:8f:30:a0:b3:01: b4:31:aa:8d:43:47:db:54:bb:d8:83:2f:c9:a2:48:48: a8:6f:54:40:c8:7c:a8:c6:94:31:5b:d3:a3:13:bb:b7: 5e:2f:f5:07:2b:2e:52:56:17:cc:d1:08:7c:5d:08:07 Fingerprint (SHA-256): EE:B1:E5:FF:00:00:C1:13:1D:9C:0C:78:88:0B:F6:F9:2E:C3:BE:6C:5D:01:E1:F7:4C:AD:C2:FB:DC:0A:22:44 Fingerprint (SHA1): 2C:6D:89:AF:4D:E8:A0:32:B7:C5:9E:2C:53:C9:87:EA:69:D7:39:A7 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #8458: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8459: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8460: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173627 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8461: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8462: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #8463: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8464: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 425173628 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8465: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8466: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #8467: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8468: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 425173629 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8469: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8470: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #8471: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8472: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 425173630 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8473: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8474: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #8475: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8476: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 425173631 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8477: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8478: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #8479: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8480: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 425173632 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8481: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8482: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #8483: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8484: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 425173633 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8485: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8486: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8487: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173627 (0x1957a27b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:19:36 2016 Not After : Sun Apr 25 18:19:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:5d:6d:fc:39:5a:a4:d6:f5:df:95:77:88:d0:02:fa: 2e:a9:cb:51:ee:42:15:a7:ae:21:c4:12:c4:dd:a8:7f: 00:7e:97:66:35:0d:7e:a7:7f:5d:89:cd:f0:0c:d0:56: 99:be:49:9c:c3:35:e3:7d:2f:e1:e8:ca:8a:bc:04:1b: a6:ba:21:83:e8:83:9c:3e:0d:84:54:2d:7a:28:ea:9e: e3:a0:49:51:9e:05:fb:e4:50:8c:ec:a9:6a:e7:be:e7: cf:c7:aa:c3:72:bc:69:70:71:7b:25:af:ae:e5:a4:96: 22:b8:cd:50:45:ca:28:e2:8d:60:27:73:aa:b9:3a:43: 0d:57:c7:00:65:40:f8:62:5b:e3:c1:17:12:a0:6b:51: 24:0a:40:f9:7f:24:33:79:7f:32:25:ce:b1:c4:ce:97: 6f:db:ab:00:fb:d7:df:2e:15:f0:43:22:9f:b0:3a:76: 8a:73:14:7d:c4:cf:b3:fe:c5:29:71:c8:25:6d:23:12: d9:e3:59:2c:51:75:e4:42:9c:d7:f7:83:02:af:6c:ae: 61:df:6d:16:23:e2:9e:45:46:5f:e5:be:76:b5:5e:78: d1:97:ba:c0:b7:0c:ad:ef:34:8e:67:a5:03:75:6b:a5: 21:93:74:2f:23:21:e5:d4:a2:bd:b0:44:37:5d:15:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:9c:9c:7e:6a:f4:36:fd:d2:fa:f7:b0:e6:6d:4a:89: ed:01:4b:9f:5c:4e:75:88:a5:df:a2:b6:64:76:f3:0a: 97:14:f1:c7:35:e2:32:e6:10:4f:6c:44:51:8d:f1:a4: 80:ad:48:66:ed:5a:69:df:72:19:44:16:60:55:b9:0a: 83:ab:bb:28:ef:1a:24:03:67:05:2b:dd:19:17:fa:5a: f8:8b:d0:7b:f8:c1:b8:0c:66:29:db:47:9f:47:5c:f5: ef:70:41:d4:62:d5:03:1d:3e:d9:9a:1b:4e:3f:c1:0a: b5:fc:3b:82:a5:e9:a2:76:55:e5:52:27:04:d2:99:38: ca:d3:ac:77:e7:d2:ff:d4:39:7f:91:2b:ee:0b:10:83: 39:48:00:98:90:42:1f:2d:bd:60:d5:ea:bf:4a:63:1b: a6:60:19:b6:0a:45:06:5d:18:f7:6e:56:68:ab:28:ad: e4:ab:eb:f5:b3:17:2c:d9:f5:03:55:cd:8b:77:5c:90: cb:69:8c:3e:f8:03:c2:94:5c:ec:c8:18:ea:d1:55:71: 92:1d:34:92:61:00:56:fa:33:86:09:7a:44:e6:00:00: 85:77:89:73:ab:5c:75:f4:ed:b4:33:35:32:33:dd:c8: 61:cb:45:fd:48:0a:ea:80:5f:6d:4d:91:db:db:6a:46 Fingerprint (SHA-256): A5:38:C7:5E:3F:DB:8D:26:79:8A:F6:00:88:39:07:25:C3:7B:D7:83:50:A2:BC:1D:7A:08:C6:78:78:A2:BB:4C Fingerprint (SHA1): D8:53:40:A6:45:2B:B9:7B:13:3C:0C:42:A3:D7:F4:F9:82:13:37:F1 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #8488: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8489: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8490: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8491: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173627 (0x1957a27b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:19:36 2016 Not After : Sun Apr 25 18:19:36 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:5d:6d:fc:39:5a:a4:d6:f5:df:95:77:88:d0:02:fa: 2e:a9:cb:51:ee:42:15:a7:ae:21:c4:12:c4:dd:a8:7f: 00:7e:97:66:35:0d:7e:a7:7f:5d:89:cd:f0:0c:d0:56: 99:be:49:9c:c3:35:e3:7d:2f:e1:e8:ca:8a:bc:04:1b: a6:ba:21:83:e8:83:9c:3e:0d:84:54:2d:7a:28:ea:9e: e3:a0:49:51:9e:05:fb:e4:50:8c:ec:a9:6a:e7:be:e7: cf:c7:aa:c3:72:bc:69:70:71:7b:25:af:ae:e5:a4:96: 22:b8:cd:50:45:ca:28:e2:8d:60:27:73:aa:b9:3a:43: 0d:57:c7:00:65:40:f8:62:5b:e3:c1:17:12:a0:6b:51: 24:0a:40:f9:7f:24:33:79:7f:32:25:ce:b1:c4:ce:97: 6f:db:ab:00:fb:d7:df:2e:15:f0:43:22:9f:b0:3a:76: 8a:73:14:7d:c4:cf:b3:fe:c5:29:71:c8:25:6d:23:12: d9:e3:59:2c:51:75:e4:42:9c:d7:f7:83:02:af:6c:ae: 61:df:6d:16:23:e2:9e:45:46:5f:e5:be:76:b5:5e:78: d1:97:ba:c0:b7:0c:ad:ef:34:8e:67:a5:03:75:6b:a5: 21:93:74:2f:23:21:e5:d4:a2:bd:b0:44:37:5d:15:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:9c:9c:7e:6a:f4:36:fd:d2:fa:f7:b0:e6:6d:4a:89: ed:01:4b:9f:5c:4e:75:88:a5:df:a2:b6:64:76:f3:0a: 97:14:f1:c7:35:e2:32:e6:10:4f:6c:44:51:8d:f1:a4: 80:ad:48:66:ed:5a:69:df:72:19:44:16:60:55:b9:0a: 83:ab:bb:28:ef:1a:24:03:67:05:2b:dd:19:17:fa:5a: f8:8b:d0:7b:f8:c1:b8:0c:66:29:db:47:9f:47:5c:f5: ef:70:41:d4:62:d5:03:1d:3e:d9:9a:1b:4e:3f:c1:0a: b5:fc:3b:82:a5:e9:a2:76:55:e5:52:27:04:d2:99:38: ca:d3:ac:77:e7:d2:ff:d4:39:7f:91:2b:ee:0b:10:83: 39:48:00:98:90:42:1f:2d:bd:60:d5:ea:bf:4a:63:1b: a6:60:19:b6:0a:45:06:5d:18:f7:6e:56:68:ab:28:ad: e4:ab:eb:f5:b3:17:2c:d9:f5:03:55:cd:8b:77:5c:90: cb:69:8c:3e:f8:03:c2:94:5c:ec:c8:18:ea:d1:55:71: 92:1d:34:92:61:00:56:fa:33:86:09:7a:44:e6:00:00: 85:77:89:73:ab:5c:75:f4:ed:b4:33:35:32:33:dd:c8: 61:cb:45:fd:48:0a:ea:80:5f:6d:4d:91:db:db:6a:46 Fingerprint (SHA-256): A5:38:C7:5E:3F:DB:8D:26:79:8A:F6:00:88:39:07:25:C3:7B:D7:83:50:A2:BC:1D:7A:08:C6:78:78:A2:BB:4C Fingerprint (SHA1): D8:53:40:A6:45:2B:B9:7B:13:3C:0C:42:A3:D7:F4:F9:82:13:37:F1 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #8492: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8493: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8494: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8495: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173634 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8496: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8497: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8498: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8499: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173635 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8500: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8501: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8502: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8503: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173636 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8504: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8505: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8506: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8507: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425173637 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8508: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8509: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8510: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8511: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8512: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8513: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173634 (0x1957a282) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:21:09 2016 Not After : Sun Apr 25 18:21:09 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:e3:b5:27:50:0c:c5:9b:8e:b8:66:c3:57:9f:08:96: bb:8c:28:ad:c4:ec:13:ef:40:e0:98:e8:3c:d8:ee:74: 06:d4:7d:69:bf:c4:9f:75:15:16:68:2b:40:5a:e3:cc: bc:55:12:d6:c2:89:5f:be:22:e3:18:95:b8:b3:a3:a1: d3:e6:27:58:e7:f3:36:92:81:22:ab:e0:6a:b7:7a:bf: 71:08:87:7e:ba:b4:7e:9e:2b:87:10:aa:cc:9f:ac:38: 61:cd:1d:a7:50:80:45:c8:16:98:36:81:e9:f5:6c:11: 92:81:d9:a6:11:6d:27:74:da:72:bd:90:40:9a:95:a6: fe:4b:b9:a7:ff:83:68:c9:6d:52:5d:e7:64:c9:f5:88: 5e:bb:de:37:67:c7:bb:a8:7f:19:12:c4:78:25:31:5d: 2b:a9:57:9d:7b:7a:65:0c:02:a4:fc:00:d4:39:b7:9f: 92:cd:1f:f3:d0:33:5d:2e:cb:e5:22:a5:df:b0:7b:f3: 5d:51:aa:64:01:20:76:c0:eb:34:36:48:91:52:47:37: d2:2c:d6:b4:92:96:f8:b9:90:a6:b6:9a:3f:1c:44:f0: 4c:9e:12:0f:36:be:9e:32:ea:e4:84:f3:d7:82:59:43: 2a:e1:b9:0f:e9:fa:2c:94:97:02:34:06:6f:fa:dd:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:cd:9d:9f:ff:a2:be:f0:8e:9e:8c:3d:16:eb:d9:39: 1c:de:33:7a:22:34:d1:5a:8c:57:6f:08:de:63:be:0b: 4e:e3:d3:ee:8e:3d:a2:88:5a:4d:0f:21:16:7d:5c:a9: 03:b1:e1:a7:a9:1a:45:d0:05:00:80:b6:c9:36:e7:00: 73:7c:96:86:44:8a:13:10:44:ea:3a:82:39:4f:31:1c: d4:7f:c7:d6:73:63:e9:9a:7d:2c:24:23:3c:1d:66:21: 67:b9:ab:48:14:2d:e4:b2:a1:4c:eb:6e:b4:2b:f0:f2: 01:db:d8:23:a1:26:d3:20:8a:1c:53:4a:23:88:24:b6: 72:ff:39:5b:d8:bb:76:71:be:4e:9a:f2:46:23:e7:c4: f5:c0:10:da:10:6b:2d:9b:60:10:d8:d3:d7:2f:4a:1b: ef:79:ed:35:ee:64:38:f4:53:b1:92:0c:b4:44:14:54: f3:19:49:b8:22:60:ef:13:37:ea:59:8f:5c:36:5f:af: 01:a3:ca:9c:31:1d:1b:50:2c:f8:26:48:07:30:a5:82: 2e:60:25:59:68:1c:b5:aa:5a:f1:2e:10:fd:e6:6f:89: 3f:67:f0:2e:5d:15:aa:ac:0e:91:43:fd:e6:09:31:63: cc:b1:12:d5:0d:3e:58:53:7d:7c:1c:6f:ad:53:df:47 Fingerprint (SHA-256): E6:A0:55:CE:76:27:46:96:2D:AC:75:AE:01:0B:76:3E:81:97:F9:59:8B:14:3B:C3:3D:9C:9A:F0:B2:10:A3:A5 Fingerprint (SHA1): FA:66:50:89:22:DF:BF:CD:59:B8:03:D5:2D:4B:2A:69:41:25:DB:D8 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8514: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8515: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8516: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173635 (0x1957a283) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:21:24 2016 Not After : Sun Apr 25 18:21:24 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:41:4f:d0:7f:a2:0a:e6:f4:a4:8a:5c:3e:c5:9c:96: bc:b7:64:a9:2a:43:24:4b:21:10:06:5e:88:09:2d:30: da:b6:37:3d:38:3a:3a:10:80:37:c8:38:3b:16:89:1a: d6:79:b1:a1:6c:3e:51:2a:6b:11:56:02:0d:af:dc:5b: ad:c2:60:fb:07:2a:4a:2f:41:fb:e3:7c:16:72:88:35: 2f:40:a1:7e:2e:a3:df:c9:71:6d:1b:c7:ac:cc:07:e7: cb:84:24:97:de:c0:4c:25:f4:a8:e9:93:cf:c6:da:c0: b8:c1:b1:a0:71:a1:5f:ac:50:7b:81:fa:78:0a:6f:89: d5:db:6a:be:a6:be:97:ae:da:a9:78:e7:81:1d:a4:5d: da:9a:52:5a:69:d0:04:54:1a:7c:e7:1f:39:bd:77:03: 24:1e:9b:84:91:bf:1b:87:3e:d2:1b:c8:a6:87:25:9a: cb:87:af:5b:fa:43:0f:70:f4:34:60:3e:b7:91:ec:a2: 55:2d:89:6f:75:1c:46:09:b4:65:a1:fd:8c:f3:08:e7: 27:eb:9e:3a:28:68:f3:72:c9:2b:24:50:06:ac:4b:cd: fb:e5:8e:00:c6:2a:00:1e:4b:8e:21:5c:2a:fc:f8:22: 63:9d:9e:bd:70:53:3e:f6:e5:30:9e:48:04:48:f5:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:e1:8a:d3:91:84:c3:f9:e2:a3:89:ac:a8:0e:69:9a: 41:fb:2f:21:f6:0c:4b:a0:14:c7:33:c3:d4:31:2f:08: cf:86:25:7a:ea:81:f9:36:e2:9f:36:09:95:a0:34:90: c1:b5:82:1e:30:fa:3a:de:56:b1:47:62:92:3d:6d:04: 12:48:33:45:d0:65:18:1b:71:d8:99:37:ae:e5:d0:60: e5:9f:cc:22:81:9d:1c:2e:63:1a:b0:64:80:f0:72:fa: ae:89:ed:66:51:ae:02:63:ee:cf:7b:9e:14:81:72:7e: 5b:bc:85:68:3a:32:84:73:a3:76:fd:be:86:71:26:aa: c0:19:77:86:7d:47:f3:39:ed:dd:5b:d1:f6:c8:c5:cc: 28:f1:7c:f1:94:fb:ad:d6:36:b1:d9:18:e1:e8:e6:21: be:ea:63:3d:95:35:ca:c2:01:ad:f9:6d:70:69:95:5e: f0:ba:72:3d:75:92:0b:92:70:af:b1:cf:af:16:e5:65: ea:6d:06:33:23:6c:d2:aa:19:64:f1:07:31:85:3c:26: 89:7e:0f:e1:0a:f5:7f:41:db:ae:64:63:03:23:d8:af: 2a:f0:1c:f2:6d:e1:f2:6b:d6:aa:53:34:fa:15:9e:44: a3:22:98:d6:88:dc:7c:a7:8a:1b:f7:77:81:be:0f:de Fingerprint (SHA-256): 71:5F:38:D9:7A:89:34:33:CE:8E:C1:E4:55:EA:88:18:8E:53:FA:AC:EF:29:F6:D2:1D:B4:B8:BA:48:9C:90:48 Fingerprint (SHA1): EF:72:ED:76:49:46:F0:25:02:34:8D:3C:59:30:A4:59:DB:E6:A1:57 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8517: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8518: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173636 (0x1957a284) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:21:38 2016 Not After : Sun Apr 25 18:21:38 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:6a:36:cb:3d:e9:af:9e:a8:c0:0d:d4:9b:91:d4:55: eb:c2:c0:ec:80:83:55:54:d9:26:99:8b:b6:65:8f:5d: 7e:7d:c9:27:4e:e1:ae:d7:ab:62:1b:56:ad:67:f9:cf: a6:d2:f4:f5:6a:0e:0e:01:7a:ab:c5:88:8a:b1:e2:2c: f5:93:dd:b0:17:ad:12:87:69:94:4c:23:96:49:ff:8f: 35:38:18:54:fa:d0:f2:86:a6:49:0e:82:cf:ce:4d:da: 95:fd:0d:e5:c4:06:35:07:c7:eb:6a:aa:19:03:d8:89: 77:05:96:c8:10:04:85:21:6b:e8:03:c1:f2:59:c8:9c: 02:35:0c:44:f2:9e:0d:99:2b:ae:61:9b:2d:40:5e:2d: 7e:f2:4e:4f:a9:5e:eb:fc:7e:40:f1:02:2d:56:3e:9d: fc:34:06:fb:c4:4c:70:ef:5a:c4:59:e1:3c:b1:b6:37: 98:e9:e2:b7:54:a2:2b:f4:70:72:60:f1:0f:46:7c:dd: 4b:86:8e:c7:3b:c7:3c:f4:e3:83:f6:24:6e:1f:63:22: 7b:4c:01:5a:35:c9:29:d0:58:97:58:ba:9f:a1:c4:87: f1:78:12:f4:63:01:cd:ce:f6:7e:1e:46:56:ab:2c:0e: 77:e1:09:eb:9c:0f:b9:ff:8b:06:ee:fa:e3:50:a1:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c8:59:96:3e:26:b7:ae:b6:a7:74:e3:98:ac:b4:5e:13: 0d:90:df:66:45:5c:ba:0c:87:bf:e0:5f:3b:5e:36:76: 7a:cd:fd:51:79:bb:28:23:75:28:2d:78:f7:20:05:80: 45:99:31:ea:97:e1:5b:39:02:93:ab:63:f7:da:0e:ff: c5:29:3b:44:1f:be:f6:77:83:5f:b9:1f:e4:23:0a:b4: 99:0d:dd:56:20:ea:b4:8a:b7:ef:12:72:fe:85:25:3d: 40:8b:87:a6:f0:7b:72:49:c7:89:67:da:b2:31:49:2b: d8:6d:28:ed:80:c7:b7:d3:ac:8c:29:c6:22:7a:b5:13: f6:48:c1:40:86:c4:62:a8:78:f6:94:18:a3:26:f4:0b: 1b:41:c8:21:76:fd:b0:f6:2d:c6:a3:51:59:27:52:3b: 8b:e8:46:ce:e8:b9:7b:61:f4:bc:f6:09:dc:4d:03:01: 3b:d2:f8:31:a2:59:bd:84:9e:d6:6d:7a:70:f6:53:8d: e6:63:6d:50:76:c4:58:fa:39:05:f6:6e:0b:79:a2:63: b3:a6:48:a4:96:d9:8a:d6:1a:cf:5c:33:1e:65:87:6c: c7:f7:59:db:fb:dc:3a:71:cb:e6:bc:00:e8:42:c2:14: ad:c3:a8:ac:16:fb:35:cd:4d:96:6c:f8:8a:31:09:75 Fingerprint (SHA-256): FE:3C:0F:C5:B1:44:58:ED:98:16:96:E9:0A:22:8B:4A:CE:37:A2:5F:A1:B8:32:0C:64:66:2A:1A:05:AC:EE:EE Fingerprint (SHA1): 1E:CC:7F:43:4A:3F:37:63:D7:F4:11:D6:8B:41:41:9C:98:23:7A:96 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #8519: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8520: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173638 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8521: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8522: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8523: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8524: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173639 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8525: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8526: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8527: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8528: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173640 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8529: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8530: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #8531: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8532: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 425173641 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8533: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8534: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8535: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8536: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 425173642 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8537: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8538: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8539: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #8540: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #8541: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #8542: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #8543: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173638 (0x1957a286) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:22:01 2016 Not After : Sun Apr 25 18:22:01 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:0a:11:ef:cf:8e:14:34:78:3c:9a:76:8b:c2:81:d2: b9:99:3c:a3:06:20:7e:a8:76:79:28:0f:72:8b:92:1f: 40:f6:82:59:8c:ac:a1:5c:4f:f7:3a:ab:22:2e:77:f1: d7:1d:08:9a:96:c7:a7:33:04:01:41:af:0e:34:a2:30: 22:cf:08:8b:e8:19:40:cc:fc:7f:bd:5a:2d:90:98:a8: 11:53:c8:4f:2e:19:61:de:3e:c3:af:d8:36:c0:9e:d6: 2f:01:76:d0:d6:35:15:b4:34:18:59:e3:86:0a:97:33: a5:c6:12:18:00:f7:82:e4:11:9e:9e:61:1b:1f:cf:73: f3:71:f2:2f:e3:ba:0d:66:7d:cb:6c:08:e2:8f:23:5f: c8:e4:1b:b9:2e:35:35:57:ba:66:61:ba:c6:86:8d:07: 15:8b:02:8b:bd:af:a5:fa:65:8b:8c:d8:1e:a6:5b:1a: bd:28:42:df:87:d6:9c:19:13:a7:65:3e:ef:63:7f:9c: 0b:21:86:6e:56:60:47:2d:e1:3e:37:25:8c:31:3e:0b: 8b:d3:89:1e:64:32:32:c7:c4:76:d3:2a:14:ba:6d:9e: f1:c9:56:04:03:c5:e2:7d:82:00:3c:73:22:a6:f7:a2: 90:a2:ae:c0:05:f6:98:0e:bb:5b:c5:86:41:48:54:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:0e:55:48:c3:d3:ca:a5:2d:8e:f1:eb:fb:a8:24:1f: 8d:88:6e:fb:9d:50:64:f3:bd:a9:89:1d:67:9f:57:ca: f6:7f:fe:66:01:c9:78:55:69:b1:05:3c:e9:7a:dd:d4: c2:33:5a:2a:7f:45:f3:f6:0a:17:98:42:0e:e3:10:eb: b0:0e:d6:52:35:f7:57:43:78:78:8c:5e:e9:82:b6:a8: 18:87:99:6e:71:61:05:3c:4f:07:dc:b5:ba:0e:ae:92: e0:e1:bc:c7:4f:7d:75:0d:51:9a:0d:be:c1:1f:3a:a4: 56:8d:c7:61:cc:64:f7:68:7c:c5:d4:23:51:a4:e4:08: d3:50:8c:de:78:56:bb:21:87:c5:60:3a:06:fa:5e:93: 1a:f7:99:fb:ea:97:bd:b2:8b:e0:58:b3:f2:fe:58:88: f2:33:b4:39:c0:cd:19:fa:c7:08:3f:21:85:b8:2d:2c: 81:b3:e0:b7:d0:9f:91:c1:f0:96:db:24:15:1e:56:b6: f7:64:38:b6:e6:7a:5b:53:dc:3d:7a:8a:f6:9a:20:e9: 67:99:84:ab:e7:74:c0:16:c9:58:b2:6a:d4:84:40:7a: 03:27:a5:e5:9f:8d:be:e4:4d:b9:8a:1c:45:5c:27:76: 44:06:fd:34:03:56:5d:d2:f9:97:bc:ff:c3:c3:19:f3 Fingerprint (SHA-256): 8F:E8:CE:9F:7A:5B:92:BF:CC:18:BD:C8:C4:7B:EB:E0:B1:09:D2:25:49:8E:09:55:8A:5D:9A:6A:1E:BA:E7:40 Fingerprint (SHA1): F0:96:AA:D8:71:D8:75:79:BB:9B:14:AA:12:87:72:37:A5:3B:24:AA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8544: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8545: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173639 (0x1957a287) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:22:10 2016 Not After : Sun Apr 25 18:22:10 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:22:51:e8:65:77:87:5b:ed:1c:6a:d9:84:c5:1d:8b: 22:c2:0d:71:0a:ea:24:93:52:52:a8:90:52:45:24:a9: 38:5a:2d:97:47:20:20:6d:d7:ce:13:a2:22:3b:27:1e: 13:7e:77:ee:e9:d3:87:b1:bf:fd:07:79:1b:3b:d1:9a: bc:14:ce:1a:84:0c:20:f4:89:30:f1:0a:3c:5a:0d:d6: 42:b5:b1:4d:aa:ff:03:f7:32:8d:9d:39:44:20:f6:e2: 55:17:8d:d8:ad:dc:ea:8b:8c:56:f1:03:28:8d:17:b0: 16:8e:db:b9:15:8a:c7:87:b7:46:35:32:d3:79:c4:54: 0b:0e:3a:11:c8:22:87:98:94:28:9b:b6:2f:62:fe:5e: c7:bc:3c:a1:de:a3:ba:27:ae:40:04:7c:06:5d:50:64: fa:4b:91:17:a2:91:3e:f1:87:a8:86:6a:f8:c1:81:a5: b9:c2:c3:95:23:f7:43:47:98:4f:10:38:8f:97:6e:71: 82:c6:19:ab:a5:65:ff:ef:b7:dd:be:1c:44:67:8a:24: e3:e4:f3:ca:11:02:66:1a:51:f6:d5:12:16:2f:30:5d: 52:90:bf:e9:93:3e:6a:99:14:e0:ce:18:15:6f:b3:61: 64:0c:c3:55:d9:3b:22:b8:db:0d:03:a6:a5:49:d7:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:2d:b1:46:d4:e3:c9:e5:11:47:61:51:0d:98:ff:ab: 43:49:62:16:ed:eb:74:6f:7d:a9:98:c9:86:bc:1f:43: d5:39:56:cf:12:75:39:24:d1:c3:1a:16:6e:35:9f:d3: 04:1d:f1:bb:10:25:26:b5:85:e3:91:ba:ea:be:de:33: c4:a8:f5:cf:74:1e:e4:0c:42:0c:69:64:01:08:37:2f: c6:9f:bd:36:d2:6a:91:c0:89:7d:88:cd:42:48:b2:43: ca:a2:62:25:74:0d:69:f8:a5:7b:ff:5e:72:3a:76:83: 74:4f:8a:6e:27:c8:ae:e9:03:7c:19:36:4f:13:bc:56: d2:8b:4c:1b:68:ad:87:7c:11:5e:a8:8a:ae:c3:44:85: a2:d1:c8:c8:a8:d0:59:29:d5:99:60:44:0d:ff:d2:6f: 74:8a:ad:95:13:cc:f4:35:42:9f:0e:41:64:14:e9:cf: 5e:53:06:a2:9e:ae:1a:b1:37:f3:f8:d7:5e:80:d8:ea: 6c:90:c5:95:7e:81:42:18:9d:75:6d:42:85:87:6c:bb: 76:15:ad:83:a0:1a:d9:bb:fe:c0:59:3f:43:ff:02:b1: bf:37:72:15:60:25:5d:4e:ef:97:48:b1:7f:c6:af:60: 14:14:e8:07:81:36:14:bb:5e:54:b7:f2:ea:4b:02:47 Fingerprint (SHA-256): AE:6A:46:30:C6:E8:C4:AB:C9:40:AE:D3:B2:6C:21:71:CD:7D:3E:F3:61:4F:B8:65:09:47:44:E8:84:6D:60:96 Fingerprint (SHA1): DD:63:40:73:E4:21:01:06:F9:3B:D6:47:BE:91:14:39:B8:92:58:3E Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8546: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8547: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8548: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173640 (0x1957a288) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:22:23 2016 Not After : Sun Apr 25 18:22:23 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:83:8b:98:73:8b:a7:fa:0c:a7:5e:c5:f5:15:f8:62: cf:89:d3:91:be:1b:10:47:9b:80:49:0d:26:17:9e:75: 04:4b:8c:27:9d:29:17:08:6e:ea:dc:ad:75:33:f3:0e: 80:98:d4:55:11:35:98:36:14:73:48:68:b6:a7:71:a3: 85:42:44:55:3d:37:2b:3f:40:b4:3b:e1:0a:8d:04:a0: dc:97:67:06:46:4e:59:7a:39:d5:c2:d9:74:8c:39:ad: 05:3d:93:b7:be:dc:d2:db:df:6a:fc:45:8d:a5:ca:7f: 7a:f9:6d:02:06:ea:bd:6a:ae:03:75:6e:35:3f:32:d6: e8:2b:de:b2:d9:7d:91:be:59:0f:c4:9f:6d:66:69:85: 7b:df:10:e5:6e:70:43:b3:9c:b1:09:33:77:46:cc:37: e9:1e:97:fa:5a:a9:b8:ea:19:55:28:06:f9:eb:87:f0: c5:35:25:31:c3:0b:1b:21:db:ea:22:f6:65:0f:9f:2c: f7:34:f5:6e:b4:a5:e0:00:6b:d1:b5:7c:52:80:8c:b7: ad:25:92:a7:d3:0a:28:56:f7:07:36:a7:e2:f1:fa:bc: 45:88:89:e4:9e:25:e3:dd:88:55:a6:05:d6:4b:3c:ee: 30:61:7f:c2:8f:89:89:b4:01:8d:82:2c:2c:d2:36:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:00:b1:4c:dd:15:cd:00:7f:b4:9f:2f:6b:cc:d3:f0: 09:33:e4:c2:04:d1:f5:cb:62:56:2a:87:cc:d3:80:24: 4e:7a:f7:9a:91:53:6e:e7:1a:e9:49:58:b6:1f:00:b6: 9d:e7:cc:08:26:51:68:6a:f6:f9:85:9a:78:50:42:a7: 68:74:f6:cf:34:95:68:1e:d2:4f:aa:5e:6d:6d:ad:67: 8e:c4:c1:c3:d8:c0:a5:b7:5f:5b:59:d3:2a:c2:ac:b9: 11:73:11:c9:1e:5a:ed:24:78:24:77:84:86:52:69:2a: ab:b3:8c:95:27:67:22:c6:4f:72:e3:10:6e:bf:c0:4e: a4:e5:a1:b0:65:eb:dd:ab:05:b5:01:0d:a0:39:67:4c: b2:7e:4c:cc:d2:5e:de:eb:b6:bd:7f:33:ef:7e:dd:64: bb:bb:02:6a:2a:b3:fb:97:fd:0f:d7:ac:ad:be:ef:88: 6a:77:c4:75:30:83:4a:65:00:61:39:f9:09:2d:79:7c: 81:a9:af:cf:81:d6:28:cc:23:81:c2:ea:8f:1f:cb:b7: 4d:62:d4:15:79:c7:3e:34:eb:e7:b9:06:87:82:1f:cb: 35:64:a3:5c:55:2b:eb:c4:ff:10:6c:2a:a8:49:02:96: d0:84:65:4c:29:7e:f5:f1:87:95:62:73:85:8f:49:cb Fingerprint (SHA-256): 46:B7:2F:CC:5C:0F:A9:2F:A2:47:89:B3:46:DE:4B:3F:A5:1E:87:3B:7A:66:D4:65:8C:29:DA:73:28:00:A6:28 Fingerprint (SHA1): 2F:A9:76:6F:C0:0A:9D:A9:20:1E:4F:32:CC:24:50:53:11:5E:6C:F4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #8549: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8550: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173643 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8551: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8552: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8553: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8554: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173644 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8555: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8556: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8557: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8558: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173645 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA1Root-425173422.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8559: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8560: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #8561: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8562: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425173646 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8563: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8564: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #8565: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173643 (0x1957a28b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:22:54 2016 Not After : Sun Apr 25 18:22:54 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:05:77:58:8b:41:55:d0:e9:7f:c4:ee:56:b0:45:e0: 9f:fb:42:33:42:60:ff:ca:1a:0f:1e:12:32:5f:64:5e: 33:a3:7f:54:39:38:3e:08:86:86:c4:78:ff:9f:50:44: a1:19:2e:0a:36:e6:f7:93:6d:13:51:fe:a6:cc:bd:19: 29:43:21:6d:dd:19:f9:3c:3b:d8:c4:fb:21:7b:34:44: 1f:9f:0e:33:0b:43:d6:0e:88:d6:38:d4:53:83:62:53: f1:03:78:c3:02:44:a1:0a:47:59:cc:87:aa:ca:a9:d1: 6c:af:58:c4:7a:af:24:b8:71:ae:7a:2f:36:f4:e9:05: 25:9b:06:03:6b:df:ef:67:91:91:96:b9:72:d6:e3:81: cb:9b:a6:1f:7e:75:ba:7f:12:c4:cc:70:6f:45:f0:b8: 80:6e:8b:56:a7:32:7d:83:80:98:6d:d7:e0:dc:c6:e4: 76:31:b3:49:f3:bf:32:a7:7a:f4:c4:19:0c:95:94:86: 32:c9:6c:e0:bf:4b:ef:21:be:79:e2:e2:fa:03:a6:03: fe:76:8c:2c:16:db:13:d6:90:f6:6f:44:38:68:5e:de: 7c:3a:4c:ec:7a:47:53:fc:43:75:92:30:d8:1d:f2:e0: 5e:31:58:a4:36:eb:9b:5d:7d:e7:1e:18:49:da:5d:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:8b:96:24:41:e1:7a:de:d0:ff:67:9e:4a:a9:c2:ee: 0f:61:d6:3d:30:08:c9:a6:bc:0a:cf:bf:bc:74:d7:2c: ef:c6:e8:1a:63:74:c9:4a:c0:f6:2b:33:ad:81:06:b6: 1c:39:33:25:a7:dc:e8:f1:38:a2:01:13:0f:19:15:7b: 78:9b:2e:38:17:2f:bc:9b:de:f1:74:87:eb:51:cb:2d: 96:1f:ed:d4:a7:c7:cd:20:4f:f3:ed:89:40:73:07:8f: bb:85:c6:ee:81:50:00:0c:ce:4d:e0:5f:6c:de:f8:a6: 78:ad:0b:b2:c1:e7:ef:8a:d4:e2:0e:e8:51:45:31:59: b3:1b:3b:95:23:6b:13:2d:96:30:74:5a:ad:d0:0e:14: 2f:6e:9c:0e:6a:28:73:83:8e:67:24:de:fb:dc:04:c1: b6:20:98:a7:63:24:dd:8b:53:9d:09:9c:39:ae:df:5b: 9b:6d:47:24:f1:ae:50:7d:f5:b8:a0:4a:08:5d:a0:f6: ed:35:e0:bf:20:cd:10:d1:83:27:9f:51:53:a7:be:9e: f5:10:a6:85:8e:30:d5:b5:8d:d5:9a:da:8b:29:2c:5d: ae:41:3b:8c:49:34:1a:ef:e7:dd:1c:11:db:f3:04:03: f8:83:35:ff:88:45:4c:7a:a4:83:66:e6:e0:b2:fa:e4 Fingerprint (SHA-256): B7:E9:0F:89:80:CA:BF:0B:53:3C:53:84:3B:B6:ED:25:13:13:24:3F:A6:F2:EB:E8:79:E5:46:77:83:DD:F9:32 Fingerprint (SHA1): 2F:BF:DC:D2:90:97:8C:79:A9:94:A0:81:29:C5:2E:F9:05:71:D8:CC Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8566: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8567: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173647 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8568: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8569: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8570: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173648 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8571: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8572: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8573: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8574: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425173649 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8575: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8576: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425173650 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8577: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8578: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #8579: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8580: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8581: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425173651 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425173423.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8582: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8583: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8584: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8585: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173652 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8586: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8587: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8588: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8589: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173648 (0x1957a290) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:23:47 2016 Not After : Sun Apr 25 18:23:47 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:2a:b8:80:6e:1d:8b:4f:10:98:c9:cb:30:47:81:57: b8:21:30:26:c8:08:04:14:ed:ad:33:d7:00:3e:a5:dd: 3c:fc:db:bc:e7:c2:67:db:7f:50:76:d2:9d:cd:bf:89: 29:79:46:04:f6:a1:b4:f7:bf:9e:bc:5f:7a:ad:9f:45: 5a:c9:eb:de:b1:b3:44:ba:ce:f5:7a:f9:3e:4a:70:25: e2:8b:86:74:86:3a:90:d0:62:74:c6:87:87:46:8f:d1: dd:68:2d:91:49:bb:03:93:e8:f9:ea:4d:ed:1e:0d:77: 4b:63:9b:e4:49:61:44:8b:05:c3:a8:da:0d:ec:ab:4a: 28:0c:dd:af:3f:26:91:c7:e0:59:dd:d2:05:a8:06:41: 40:f8:75:58:c6:65:79:16:2b:da:ee:78:eb:29:90:b9: 87:36:ee:a8:a8:a7:97:d0:66:21:4b:63:e0:83:f3:46: 55:dc:69:54:e3:a8:78:63:f5:96:40:80:5a:fb:88:72: 97:3d:0f:17:a4:0f:94:4e:c4:0b:0f:0c:08:b7:4e:15: a1:09:50:22:d0:ac:66:db:9e:7f:34:e5:61:2b:dd:2b: 15:45:4c:db:d6:53:0b:1f:3f:55:76:2f:30:22:e3:3d: 2f:9f:60:09:bf:9f:6e:3e:00:3d:95:f2:93:fe:a7:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:13:d2:d1:fe:b4:4d:bd:2a:13:07:c2:41:7b:07:5c: ed:fc:d9:f2:f3:00:13:79:fc:92:ef:91:06:ce:34:d0: 20:4c:b1:0c:37:02:c9:ae:b7:a1:48:b5:de:dd:5b:2f: 2f:f6:a3:e6:61:da:cd:33:b1:55:82:d2:bf:fa:c3:ab: 29:1c:b9:f5:a9:f4:ad:99:fe:56:e6:01:9d:1d:aa:29: 68:40:ac:94:05:0a:78:6b:97:fa:fd:4d:62:10:f2:6d: e6:66:9e:41:16:0d:8c:dc:a1:c4:f3:ba:ff:dd:0a:77: e5:d8:1d:29:c0:d4:36:6a:8f:b3:27:e4:69:46:85:ad: b5:31:da:5b:6f:34:09:0c:0a:ab:87:7e:0a:7d:2f:0f: 72:46:73:20:c2:5d:f7:15:69:10:6f:d6:46:6c:3e:6e: 36:f0:a7:a9:44:74:37:c5:1a:a0:a8:ab:5f:67:c4:ed: f0:70:e0:72:d3:fc:0f:df:f3:aa:b2:fb:cd:52:15:11: 30:1c:b5:87:97:30:a0:5a:60:f6:5a:30:4b:69:c0:8f: eb:c3:b4:de:40:09:84:eb:b2:db:e5:b2:ca:45:b3:ed: 7c:af:79:74:6f:32:02:f9:1d:f0:2b:22:e4:26:7a:33: 1e:8b:33:e9:cb:e3:03:04:30:d9:c9:4b:d7:cf:05:23 Fingerprint (SHA-256): C2:B5:21:D3:4F:73:78:54:FE:A5:D5:A5:FB:08:69:03:5A:9A:20:D7:04:0F:87:27:89:4D:62:82:BF:83:D0:F9 Fingerprint (SHA1): DE:86:8C:8B:28:A4:A2:8C:FD:50:9E:5E:6F:08:9A:5C:8C:1B:5E:6A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8590: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173648 (0x1957a290) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:23:47 2016 Not After : Sun Apr 25 18:23:47 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:2a:b8:80:6e:1d:8b:4f:10:98:c9:cb:30:47:81:57: b8:21:30:26:c8:08:04:14:ed:ad:33:d7:00:3e:a5:dd: 3c:fc:db:bc:e7:c2:67:db:7f:50:76:d2:9d:cd:bf:89: 29:79:46:04:f6:a1:b4:f7:bf:9e:bc:5f:7a:ad:9f:45: 5a:c9:eb:de:b1:b3:44:ba:ce:f5:7a:f9:3e:4a:70:25: e2:8b:86:74:86:3a:90:d0:62:74:c6:87:87:46:8f:d1: dd:68:2d:91:49:bb:03:93:e8:f9:ea:4d:ed:1e:0d:77: 4b:63:9b:e4:49:61:44:8b:05:c3:a8:da:0d:ec:ab:4a: 28:0c:dd:af:3f:26:91:c7:e0:59:dd:d2:05:a8:06:41: 40:f8:75:58:c6:65:79:16:2b:da:ee:78:eb:29:90:b9: 87:36:ee:a8:a8:a7:97:d0:66:21:4b:63:e0:83:f3:46: 55:dc:69:54:e3:a8:78:63:f5:96:40:80:5a:fb:88:72: 97:3d:0f:17:a4:0f:94:4e:c4:0b:0f:0c:08:b7:4e:15: a1:09:50:22:d0:ac:66:db:9e:7f:34:e5:61:2b:dd:2b: 15:45:4c:db:d6:53:0b:1f:3f:55:76:2f:30:22:e3:3d: 2f:9f:60:09:bf:9f:6e:3e:00:3d:95:f2:93:fe:a7:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:13:d2:d1:fe:b4:4d:bd:2a:13:07:c2:41:7b:07:5c: ed:fc:d9:f2:f3:00:13:79:fc:92:ef:91:06:ce:34:d0: 20:4c:b1:0c:37:02:c9:ae:b7:a1:48:b5:de:dd:5b:2f: 2f:f6:a3:e6:61:da:cd:33:b1:55:82:d2:bf:fa:c3:ab: 29:1c:b9:f5:a9:f4:ad:99:fe:56:e6:01:9d:1d:aa:29: 68:40:ac:94:05:0a:78:6b:97:fa:fd:4d:62:10:f2:6d: e6:66:9e:41:16:0d:8c:dc:a1:c4:f3:ba:ff:dd:0a:77: e5:d8:1d:29:c0:d4:36:6a:8f:b3:27:e4:69:46:85:ad: b5:31:da:5b:6f:34:09:0c:0a:ab:87:7e:0a:7d:2f:0f: 72:46:73:20:c2:5d:f7:15:69:10:6f:d6:46:6c:3e:6e: 36:f0:a7:a9:44:74:37:c5:1a:a0:a8:ab:5f:67:c4:ed: f0:70:e0:72:d3:fc:0f:df:f3:aa:b2:fb:cd:52:15:11: 30:1c:b5:87:97:30:a0:5a:60:f6:5a:30:4b:69:c0:8f: eb:c3:b4:de:40:09:84:eb:b2:db:e5:b2:ca:45:b3:ed: 7c:af:79:74:6f:32:02:f9:1d:f0:2b:22:e4:26:7a:33: 1e:8b:33:e9:cb:e3:03:04:30:d9:c9:4b:d7:cf:05:23 Fingerprint (SHA-256): C2:B5:21:D3:4F:73:78:54:FE:A5:D5:A5:FB:08:69:03:5A:9A:20:D7:04:0F:87:27:89:4D:62:82:BF:83:D0:F9 Fingerprint (SHA1): DE:86:8C:8B:28:A4:A2:8C:FD:50:9E:5E:6F:08:9A:5C:8C:1B:5E:6A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8591: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8592: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173653 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8593: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8594: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8595: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173654 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8596: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8597: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8598: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8599: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425173655 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8600: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8601: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425173656 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8602: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8603: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #8604: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8605: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8606: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425173657 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425173424.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8607: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8608: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8609: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8610: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173658 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8611: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8612: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8613: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8614: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425173659 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-BridgeNavy-425173425.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8615: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8616: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8617: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8618: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425173660 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8619: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8620: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #8621: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #8622: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173654 (0x1957a296) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:25:16 2016 Not After : Sun Apr 25 18:25:16 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:12:23:df:05:04:e2:ac:65:82:0d:0b:3a:be:aa:98: 4f:80:49:97:d8:9b:3b:ac:a3:ba:1a:89:2e:cf:e2:2b: d6:75:5d:53:b9:89:16:00:60:72:da:d8:41:96:2f:ff: 2d:c6:1e:8c:2f:45:59:38:cb:16:4b:b3:e9:35:fb:37: a8:d8:bc:fd:c2:02:46:ba:e8:7e:83:6b:12:24:16:79: f1:4e:48:4e:d4:29:76:28:2d:06:5f:4f:8a:e9:96:d0: 36:a1:d6:81:f3:84:16:d7:b1:e2:4e:59:f9:a5:4d:88: b1:55:01:d2:99:74:20:4b:a2:59:4a:6d:00:7f:15:6c: 08:1c:18:7b:1c:ff:e7:07:8a:c3:b7:1c:38:82:9c:76: 44:79:1a:0c:68:53:e4:4d:08:9f:14:0d:f6:a2:ba:6a: 99:98:55:ba:fa:b6:df:ba:2f:a7:d2:e4:c9:b9:c6:e9: 06:9d:d6:46:58:a5:e8:fa:d7:9b:3a:5f:e3:7b:a9:af: 1d:66:f4:37:81:5a:12:51:e3:a0:2c:99:c8:4e:71:26: 6e:6d:44:c7:cc:06:b3:28:cb:5d:d4:ab:20:4e:fb:dc: 92:f7:86:af:ae:f9:59:21:c5:83:8e:f9:c5:97:e3:f2: b6:b2:39:59:62:bb:3d:ae:19:a3:67:a8:4e:19:cc:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:ab:e9:85:d1:2a:d0:49:6b:b0:22:d3:4c:e2:9e:db: 92:41:89:7b:21:c7:25:fb:67:31:86:ef:e0:34:63:b7: 9f:e3:06:b9:20:de:61:54:32:c1:ba:c5:8c:0b:02:73: 1c:ef:89:76:65:aa:61:a0:0b:64:95:aa:d4:c0:27:94: d0:46:5c:8e:05:87:ea:61:1f:e5:26:e8:09:8a:50:9a: 78:d1:32:5d:e9:33:b5:89:48:fb:5d:76:f9:b4:3e:82: c7:c7:4b:34:e3:0a:d6:3a:41:35:8f:cd:35:30:18:ee: 03:68:1b:83:34:59:42:4d:7f:b5:27:c0:53:05:43:ae: 52:34:6c:26:a9:f0:6b:5f:56:c9:e1:51:71:88:db:ad: 63:db:9e:9d:d7:64:5b:aa:ae:36:e3:db:d9:4a:c9:7d: d0:1b:02:d7:85:a3:11:e2:07:d2:6c:27:db:69:67:79: fd:ad:a2:39:d1:80:dd:46:ee:ba:6d:38:95:fb:b8:16: 21:84:e9:34:67:39:65:69:d7:9b:a2:a2:a0:ed:85:24: db:a1:2c:df:2e:44:f3:6f:e2:a1:40:e4:bc:ca:e6:fc: 1b:2f:01:48:ea:39:5d:f4:a9:23:28:1a:db:a9:ca:b9: 52:c4:8c:0e:13:d1:8e:8e:db:dc:67:dd:ab:2e:ac:95 Fingerprint (SHA-256): 2D:E3:5D:0A:07:3A:88:2D:21:5E:5F:E9:9D:92:35:E7:A1:A7:FA:CB:E7:27:69:16:4B:07:2E:EF:63:78:11:84 Fingerprint (SHA1): 71:D0:4D:04:8F:30:DB:27:FE:EB:63:C3:2F:68:CC:C2:FB:F7:AD:69 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8623: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173654 (0x1957a296) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:25:16 2016 Not After : Sun Apr 25 18:25:16 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:12:23:df:05:04:e2:ac:65:82:0d:0b:3a:be:aa:98: 4f:80:49:97:d8:9b:3b:ac:a3:ba:1a:89:2e:cf:e2:2b: d6:75:5d:53:b9:89:16:00:60:72:da:d8:41:96:2f:ff: 2d:c6:1e:8c:2f:45:59:38:cb:16:4b:b3:e9:35:fb:37: a8:d8:bc:fd:c2:02:46:ba:e8:7e:83:6b:12:24:16:79: f1:4e:48:4e:d4:29:76:28:2d:06:5f:4f:8a:e9:96:d0: 36:a1:d6:81:f3:84:16:d7:b1:e2:4e:59:f9:a5:4d:88: b1:55:01:d2:99:74:20:4b:a2:59:4a:6d:00:7f:15:6c: 08:1c:18:7b:1c:ff:e7:07:8a:c3:b7:1c:38:82:9c:76: 44:79:1a:0c:68:53:e4:4d:08:9f:14:0d:f6:a2:ba:6a: 99:98:55:ba:fa:b6:df:ba:2f:a7:d2:e4:c9:b9:c6:e9: 06:9d:d6:46:58:a5:e8:fa:d7:9b:3a:5f:e3:7b:a9:af: 1d:66:f4:37:81:5a:12:51:e3:a0:2c:99:c8:4e:71:26: 6e:6d:44:c7:cc:06:b3:28:cb:5d:d4:ab:20:4e:fb:dc: 92:f7:86:af:ae:f9:59:21:c5:83:8e:f9:c5:97:e3:f2: b6:b2:39:59:62:bb:3d:ae:19:a3:67:a8:4e:19:cc:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:ab:e9:85:d1:2a:d0:49:6b:b0:22:d3:4c:e2:9e:db: 92:41:89:7b:21:c7:25:fb:67:31:86:ef:e0:34:63:b7: 9f:e3:06:b9:20:de:61:54:32:c1:ba:c5:8c:0b:02:73: 1c:ef:89:76:65:aa:61:a0:0b:64:95:aa:d4:c0:27:94: d0:46:5c:8e:05:87:ea:61:1f:e5:26:e8:09:8a:50:9a: 78:d1:32:5d:e9:33:b5:89:48:fb:5d:76:f9:b4:3e:82: c7:c7:4b:34:e3:0a:d6:3a:41:35:8f:cd:35:30:18:ee: 03:68:1b:83:34:59:42:4d:7f:b5:27:c0:53:05:43:ae: 52:34:6c:26:a9:f0:6b:5f:56:c9:e1:51:71:88:db:ad: 63:db:9e:9d:d7:64:5b:aa:ae:36:e3:db:d9:4a:c9:7d: d0:1b:02:d7:85:a3:11:e2:07:d2:6c:27:db:69:67:79: fd:ad:a2:39:d1:80:dd:46:ee:ba:6d:38:95:fb:b8:16: 21:84:e9:34:67:39:65:69:d7:9b:a2:a2:a0:ed:85:24: db:a1:2c:df:2e:44:f3:6f:e2:a1:40:e4:bc:ca:e6:fc: 1b:2f:01:48:ea:39:5d:f4:a9:23:28:1a:db:a9:ca:b9: 52:c4:8c:0e:13:d1:8e:8e:db:dc:67:dd:ab:2e:ac:95 Fingerprint (SHA-256): 2D:E3:5D:0A:07:3A:88:2D:21:5E:5F:E9:9D:92:35:E7:A1:A7:FA:CB:E7:27:69:16:4B:07:2E:EF:63:78:11:84 Fingerprint (SHA1): 71:D0:4D:04:8F:30:DB:27:FE:EB:63:C3:2F:68:CC:C2:FB:F7:AD:69 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8624: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #8625: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173653 (0x1957a295) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 18:25:04 2016 Not After : Sun Apr 25 18:25:04 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:1c:33:28:d1:23:09:b3:08:a1:71:2c:4e:28:01:5f: 9d:a1:87:bc:ac:d4:76:7a:10:43:39:df:f6:ff:aa:d3: 86:34:e7:9e:1f:a8:40:e6:2d:92:2c:e3:99:6a:6e:60: c6:45:58:67:a7:20:75:6a:e6:20:3d:a8:be:59:d6:da: 6d:7e:fd:c2:ce:a0:4b:27:ba:a7:60:84:6d:a9:70:2d: 78:b8:c7:92:87:b6:73:97:82:d4:f6:c9:02:86:06:26: 9e:3c:e6:65:b9:5c:af:f8:ee:2d:d1:19:1d:9d:fa:5a: 86:e8:15:64:03:a1:5e:7b:1b:82:c1:7c:f3:3e:92:26: 4c:24:10:4d:89:44:e1:8f:66:12:63:6a:3e:ac:9c:90: a5:f7:b4:54:2a:d3:a7:a1:c4:36:f2:86:57:28:bc:03: 74:d6:b6:d9:a2:b4:39:b9:fe:66:52:06:58:34:1d:0d: 7b:5f:5f:07:b4:27:1c:ec:c6:eb:1d:01:49:94:13:08: 55:8f:57:ca:61:c1:45:c0:16:24:d1:ac:33:55:77:fa: a9:78:11:4f:6b:ef:b0:10:8e:0e:9d:b5:34:64:af:08: 4d:d1:ee:e5:bb:9e:1d:99:8c:31:75:3d:9e:c1:79:9f: 5d:c8:dc:64:68:e7:83:52:07:f2:f1:14:a8:2d:73:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d7:b6:ca:3c:ba:5d:c1:2c:c3:f7:fa:e2:98:b3:ee:d2: f7:01:a4:d2:18:98:4e:75:42:b3:44:42:d5:76:f0:52: 4e:f0:9a:b7:c3:fb:c0:55:10:fb:7c:80:1c:52:a4:43: 34:39:4f:4b:89:39:c1:e9:df:d3:38:4e:28:87:00:18: 3c:a3:aa:7f:83:35:3b:7a:e7:32:40:10:df:b8:64:f9: 57:5d:50:ba:72:55:0d:12:3d:1b:1a:2b:51:50:a8:fd: 35:7b:b7:d0:42:57:f3:9d:d7:f1:1b:21:d4:60:06:78: 69:82:ff:66:ab:12:11:31:a0:7c:fa:0f:85:d5:31:b3: f3:13:bc:0f:f3:e5:2a:50:77:02:ac:6c:b7:61:23:8b: d2:20:b2:a9:41:7f:cd:b3:90:17:f1:95:0c:16:01:72: cf:c3:a6:85:32:6b:f5:72:eb:cc:79:a2:12:0f:d2:91: a0:28:87:ac:d2:51:4a:e9:91:93:10:75:a4:a6:ea:81: 9e:9f:e1:82:85:0b:62:c6:56:e9:e8:b5:71:8f:31:77: 59:da:4c:48:dd:f0:7b:e2:62:fb:37:44:06:bc:af:f2: 7b:4b:d6:da:bf:ee:f4:74:10:86:01:37:eb:47:93:e0: 24:a5:72:be:c2:5e:37:78:78:89:45:88:07:59:df:dc Fingerprint (SHA-256): D2:28:42:B6:02:B7:9C:B8:75:CB:A7:68:07:EE:E4:50:46:09:F5:3B:9F:30:A7:FC:F7:2B:91:9F:79:8E:57:34 Fingerprint (SHA1): AA:E1:0F:6F:B2:A5:3B:EA:49:A5:E4:72:F3:BA:38:DE:D4:69:24:78 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8626: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173654 (0x1957a296) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:25:16 2016 Not After : Sun Apr 25 18:25:16 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:12:23:df:05:04:e2:ac:65:82:0d:0b:3a:be:aa:98: 4f:80:49:97:d8:9b:3b:ac:a3:ba:1a:89:2e:cf:e2:2b: d6:75:5d:53:b9:89:16:00:60:72:da:d8:41:96:2f:ff: 2d:c6:1e:8c:2f:45:59:38:cb:16:4b:b3:e9:35:fb:37: a8:d8:bc:fd:c2:02:46:ba:e8:7e:83:6b:12:24:16:79: f1:4e:48:4e:d4:29:76:28:2d:06:5f:4f:8a:e9:96:d0: 36:a1:d6:81:f3:84:16:d7:b1:e2:4e:59:f9:a5:4d:88: b1:55:01:d2:99:74:20:4b:a2:59:4a:6d:00:7f:15:6c: 08:1c:18:7b:1c:ff:e7:07:8a:c3:b7:1c:38:82:9c:76: 44:79:1a:0c:68:53:e4:4d:08:9f:14:0d:f6:a2:ba:6a: 99:98:55:ba:fa:b6:df:ba:2f:a7:d2:e4:c9:b9:c6:e9: 06:9d:d6:46:58:a5:e8:fa:d7:9b:3a:5f:e3:7b:a9:af: 1d:66:f4:37:81:5a:12:51:e3:a0:2c:99:c8:4e:71:26: 6e:6d:44:c7:cc:06:b3:28:cb:5d:d4:ab:20:4e:fb:dc: 92:f7:86:af:ae:f9:59:21:c5:83:8e:f9:c5:97:e3:f2: b6:b2:39:59:62:bb:3d:ae:19:a3:67:a8:4e:19:cc:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:ab:e9:85:d1:2a:d0:49:6b:b0:22:d3:4c:e2:9e:db: 92:41:89:7b:21:c7:25:fb:67:31:86:ef:e0:34:63:b7: 9f:e3:06:b9:20:de:61:54:32:c1:ba:c5:8c:0b:02:73: 1c:ef:89:76:65:aa:61:a0:0b:64:95:aa:d4:c0:27:94: d0:46:5c:8e:05:87:ea:61:1f:e5:26:e8:09:8a:50:9a: 78:d1:32:5d:e9:33:b5:89:48:fb:5d:76:f9:b4:3e:82: c7:c7:4b:34:e3:0a:d6:3a:41:35:8f:cd:35:30:18:ee: 03:68:1b:83:34:59:42:4d:7f:b5:27:c0:53:05:43:ae: 52:34:6c:26:a9:f0:6b:5f:56:c9:e1:51:71:88:db:ad: 63:db:9e:9d:d7:64:5b:aa:ae:36:e3:db:d9:4a:c9:7d: d0:1b:02:d7:85:a3:11:e2:07:d2:6c:27:db:69:67:79: fd:ad:a2:39:d1:80:dd:46:ee:ba:6d:38:95:fb:b8:16: 21:84:e9:34:67:39:65:69:d7:9b:a2:a2:a0:ed:85:24: db:a1:2c:df:2e:44:f3:6f:e2:a1:40:e4:bc:ca:e6:fc: 1b:2f:01:48:ea:39:5d:f4:a9:23:28:1a:db:a9:ca:b9: 52:c4:8c:0e:13:d1:8e:8e:db:dc:67:dd:ab:2e:ac:95 Fingerprint (SHA-256): 2D:E3:5D:0A:07:3A:88:2D:21:5E:5F:E9:9D:92:35:E7:A1:A7:FA:CB:E7:27:69:16:4B:07:2E:EF:63:78:11:84 Fingerprint (SHA1): 71:D0:4D:04:8F:30:DB:27:FE:EB:63:C3:2F:68:CC:C2:FB:F7:AD:69 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8627: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173654 (0x1957a296) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:25:16 2016 Not After : Sun Apr 25 18:25:16 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:12:23:df:05:04:e2:ac:65:82:0d:0b:3a:be:aa:98: 4f:80:49:97:d8:9b:3b:ac:a3:ba:1a:89:2e:cf:e2:2b: d6:75:5d:53:b9:89:16:00:60:72:da:d8:41:96:2f:ff: 2d:c6:1e:8c:2f:45:59:38:cb:16:4b:b3:e9:35:fb:37: a8:d8:bc:fd:c2:02:46:ba:e8:7e:83:6b:12:24:16:79: f1:4e:48:4e:d4:29:76:28:2d:06:5f:4f:8a:e9:96:d0: 36:a1:d6:81:f3:84:16:d7:b1:e2:4e:59:f9:a5:4d:88: b1:55:01:d2:99:74:20:4b:a2:59:4a:6d:00:7f:15:6c: 08:1c:18:7b:1c:ff:e7:07:8a:c3:b7:1c:38:82:9c:76: 44:79:1a:0c:68:53:e4:4d:08:9f:14:0d:f6:a2:ba:6a: 99:98:55:ba:fa:b6:df:ba:2f:a7:d2:e4:c9:b9:c6:e9: 06:9d:d6:46:58:a5:e8:fa:d7:9b:3a:5f:e3:7b:a9:af: 1d:66:f4:37:81:5a:12:51:e3:a0:2c:99:c8:4e:71:26: 6e:6d:44:c7:cc:06:b3:28:cb:5d:d4:ab:20:4e:fb:dc: 92:f7:86:af:ae:f9:59:21:c5:83:8e:f9:c5:97:e3:f2: b6:b2:39:59:62:bb:3d:ae:19:a3:67:a8:4e:19:cc:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:ab:e9:85:d1:2a:d0:49:6b:b0:22:d3:4c:e2:9e:db: 92:41:89:7b:21:c7:25:fb:67:31:86:ef:e0:34:63:b7: 9f:e3:06:b9:20:de:61:54:32:c1:ba:c5:8c:0b:02:73: 1c:ef:89:76:65:aa:61:a0:0b:64:95:aa:d4:c0:27:94: d0:46:5c:8e:05:87:ea:61:1f:e5:26:e8:09:8a:50:9a: 78:d1:32:5d:e9:33:b5:89:48:fb:5d:76:f9:b4:3e:82: c7:c7:4b:34:e3:0a:d6:3a:41:35:8f:cd:35:30:18:ee: 03:68:1b:83:34:59:42:4d:7f:b5:27:c0:53:05:43:ae: 52:34:6c:26:a9:f0:6b:5f:56:c9:e1:51:71:88:db:ad: 63:db:9e:9d:d7:64:5b:aa:ae:36:e3:db:d9:4a:c9:7d: d0:1b:02:d7:85:a3:11:e2:07:d2:6c:27:db:69:67:79: fd:ad:a2:39:d1:80:dd:46:ee:ba:6d:38:95:fb:b8:16: 21:84:e9:34:67:39:65:69:d7:9b:a2:a2:a0:ed:85:24: db:a1:2c:df:2e:44:f3:6f:e2:a1:40:e4:bc:ca:e6:fc: 1b:2f:01:48:ea:39:5d:f4:a9:23:28:1a:db:a9:ca:b9: 52:c4:8c:0e:13:d1:8e:8e:db:dc:67:dd:ab:2e:ac:95 Fingerprint (SHA-256): 2D:E3:5D:0A:07:3A:88:2D:21:5E:5F:E9:9D:92:35:E7:A1:A7:FA:CB:E7:27:69:16:4B:07:2E:EF:63:78:11:84 Fingerprint (SHA1): 71:D0:4D:04:8F:30:DB:27:FE:EB:63:C3:2F:68:CC:C2:FB:F7:AD:69 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #8628: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #8629: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173661 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8630: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #8631: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #8632: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173662 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8633: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #8634: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #8635: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8636: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 425173663 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8637: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8638: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #8639: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8640: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 425173664 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8641: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8642: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #8643: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8644: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 425173665 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8645: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8646: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 425173666 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #8647: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8648: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #8649: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8650: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8651: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425173667 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8652: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8653: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8654: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8655: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425173668 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8656: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8657: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8658: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8659: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173669 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8660: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8661: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8662: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8663: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425173670 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #8664: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8665: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8666: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173661 (0x1957a29d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 18:26:50 2016 Not After : Sun Apr 25 18:26:50 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:28:aa:31:82:fb:76:58:37:21:46:49:55:82:2d:91: de:8c:0f:39:f0:92:40:22:7c:70:b3:f0:0b:fc:f5:e7: 83:65:7d:d5:8a:6a:13:5f:b3:e0:18:87:bb:48:19:c8: 06:e4:78:28:da:c5:45:9f:6a:d6:a5:4f:af:c2:1a:35: 90:28:64:a2:5b:df:e0:40:83:e9:ee:90:1a:0b:32:d7: e1:de:c6:83:0c:8d:d7:b8:f7:3e:da:3d:19:77:fb:d0: 14:53:d5:a0:76:56:d2:0c:28:a1:f2:bd:f2:b4:8d:e9: 8c:94:4d:c7:2f:79:a7:16:a5:8d:71:55:31:2f:da:3c: dd:11:e7:2d:de:b3:29:b0:41:ff:54:19:c6:08:45:a1: 29:cf:dd:1f:dc:e7:43:8b:bf:14:f2:a9:09:d7:9e:c2: 55:34:5b:80:1d:3f:ee:f3:b8:37:7c:39:12:73:0b:b5: 4c:33:f9:ac:4c:8f:d6:38:12:88:d5:ee:a8:67:9d:c4: 9e:b4:c5:43:11:c9:32:27:05:7a:f6:eb:79:93:57:4b: b6:a3:07:d4:4d:cb:89:28:1d:82:d5:87:7f:b6:15:11: 62:4e:73:a1:c0:bc:a3:c8:d2:21:a7:16:54:9b:57:08: 86:ba:a6:73:34:ff:61:b5:b4:09:6c:d3:b5:e5:5b:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:3f:c3:41:84:e2:59:2a:82:21:aa:b8:62:28:f8:d1: a9:f2:a6:04:73:7b:79:1f:e8:8b:95:4f:ba:18:43:b1: 52:d2:c1:ac:41:56:6a:21:44:bb:e1:46:79:be:83:70: 8d:65:f4:c4:8c:a5:a6:ac:e2:d4:4e:7f:5b:f8:a3:b3: c3:98:db:8b:38:33:24:14:14:c6:a7:9f:85:5b:6f:d4: 4e:aa:52:c6:4b:c1:bd:0c:64:ca:71:b1:54:dc:43:fa: 65:1a:f4:e6:78:38:0f:38:cd:3a:5d:a7:73:5f:c1:c6: bc:d6:ae:ca:ee:f6:a8:34:58:0d:06:38:03:31:ae:55: 63:03:31:9d:31:b2:8f:c5:ba:2b:00:f8:17:9b:0b:61: 13:13:b8:ac:4c:a6:3f:bf:16:4b:49:5e:0e:0c:0e:72: f3:76:2e:a2:5d:a3:b8:3c:6c:8b:3b:24:ee:5d:8e:ba: 10:9d:ea:d0:ce:6a:e0:07:b4:25:36:bc:5d:a3:fb:ca: 2f:6d:7e:ab:90:d2:65:04:64:48:0d:c5:5b:80:a0:94: fe:3e:fd:a4:c7:68:02:be:22:c9:19:4c:fa:f6:f7:61: 11:a3:02:83:d9:25:7b:1a:5c:63:ee:a8:97:12:cc:13: 5d:e5:77:47:5e:53:08:ff:c7:5f:03:31:8c:07:6b:56 Fingerprint (SHA-256): A9:16:AB:E1:BA:3B:A1:4A:14:29:81:72:5F:4E:79:07:89:CE:16:8E:4A:FF:CB:51:08:CB:6D:84:BE:3A:CB:8F Fingerprint (SHA1): A3:49:78:56:76:58:37:6C:E6:88:A8:9F:A5:37:72:CD:85:6A:7B:6F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #8667: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8668: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8669: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8670: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8671: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8672: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8673: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8674: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8675: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173662 (0x1957a29e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 18:27:06 2016 Not After : Sun Apr 25 18:27:06 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:59:c7:15:24:59:ba:47:ab:06:a9:12:e7:e7:8a:9f: 5f:91:ed:83:0f:fe:4c:97:ee:77:10:ac:a5:57:ea:1f: 6d:2f:51:08:7e:2b:2a:61:0f:ac:8c:22:f2:bd:8f:45: c8:8b:78:b3:9f:b5:a1:d0:66:e1:02:70:6a:ae:e9:59: cf:a1:c4:bc:6a:da:b9:c0:47:0b:ac:7c:88:ef:10:68: ae:bc:c9:65:a9:89:98:33:f4:e7:45:fd:38:6b:d1:26: 17:1d:95:27:06:74:67:1b:51:71:29:a7:bd:6d:e7:79: 4f:6b:2e:7a:6a:0c:80:c3:93:6e:ee:d8:87:26:b9:11: a8:3f:cb:0a:48:93:d4:94:47:2a:48:53:48:79:14:ee: 35:cf:dc:0b:8c:a7:4f:d8:61:98:8a:36:64:8c:77:b5: 09:b6:02:59:d6:ff:10:9f:75:0e:34:31:3d:8b:85:df: 62:73:69:8e:d0:73:1f:b4:94:d9:b4:08:cb:99:77:8a: 1b:a1:45:d6:e3:4b:76:71:06:ba:79:56:47:b6:dc:29: 14:94:d9:65:53:b7:80:97:73:ca:17:62:5c:13:63:88: 95:8b:11:c6:b2:fe:b2:ea:79:0a:f2:c3:fc:ea:7c:24: 33:f9:a8:7b:c8:2d:4d:bd:92:64:1e:f2:91:a9:9f:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:3c:9b:bd:90:80:47:5d:71:cc:de:e2:e9:56:3c:5e: 5c:7f:a2:5c:68:1e:82:0b:79:41:4b:db:ee:dd:71:c0: 35:87:45:40:4a:da:85:20:1b:51:72:dd:72:ec:10:8a: 71:75:f7:c7:5f:8d:c3:3e:64:aa:e8:88:ac:8f:02:3f: 89:08:0d:c5:60:0f:59:b9:10:c8:fd:97:e1:31:9c:5a: e7:c4:fc:cb:12:6b:bf:b7:4b:34:dd:27:d5:72:93:0a: 16:dd:a7:68:a6:67:6c:5e:ca:3e:58:9d:ec:a0:9c:32: 92:3c:1f:25:87:6d:9a:9e:ce:7a:7a:0e:85:95:c9:da: ff:ed:5a:ff:14:8d:ad:06:fa:47:ba:b8:89:c2:10:4c: f0:af:bc:d0:df:f0:19:01:2f:fd:ed:64:f0:b4:e5:7f: 94:47:73:fc:47:fe:c2:f4:5b:6f:f9:06:e0:a7:26:39: 5a:0b:f7:7d:4f:47:9e:59:04:e2:f4:9d:e1:26:07:a0: 1d:a2:c3:a7:e8:f2:f4:d4:08:b6:82:41:77:12:4a:1c: 74:bc:ad:8a:e1:0e:b7:c6:45:2d:5b:9c:a6:fe:86:7f: 65:bc:2a:9f:49:f6:62:b5:55:b6:7e:2d:de:fd:e2:d2: 7c:1d:fd:8a:1c:ad:04:7b:b1:19:1d:74:eb:6e:fa:18 Fingerprint (SHA-256): BE:DF:11:34:1C:EA:05:4C:B6:A1:E8:45:24:0D:B8:E3:0E:05:EC:F2:F2:F6:0F:B4:45:C0:9C:6B:E2:0B:92:B0 Fingerprint (SHA1): 0D:FE:F5:A3:60:92:3E:C9:1B:87:A7:7D:B3:34:01:0E:E5:24:A1:C5 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #8676: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8677: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8678: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8679: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8680: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #8681: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8682: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #8683: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #8684: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #8685: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #8686: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #8687: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #8688: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #8689: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #8690: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #8691: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #8692: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #8693: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8694: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173671 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8695: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8696: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8697: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8698: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425173672 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8699: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8700: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8701: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8702: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425173673 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8703: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8704: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8705: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8706: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 425173674 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8707: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8708: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8709: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8710: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425173675 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8711: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8712: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #8713: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8714: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 425173676 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8715: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8716: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #8717: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8718: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 425173677 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8719: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8720: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #8721: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8722: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 425173678 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8723: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8724: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #8725: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8726: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 425173679 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8727: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8728: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8729: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173671 (0x1957a2a7) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:29:07 2016 Not After : Sun Apr 25 18:29:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 9e:d0:54:52:4a:20:d9:0f:44:12:c0:bc:03:8b:7b:38: 69:5c:ca:99:04:69:1c:26:52:eb:c4:19:50:e8:df:7d: ad:d4:2b:c6:41:00:92:48:47:7d:96:a6:c1:8c:d3:f1: 80:94:fb:b8:9c:cf:6e:fb:d9:29:89:ec:08:b3:55:3f: 46:7f:3a:2f:3f:4a:a8:b4:12:c1:52:a1:db:33:b7:da: a8:ec:70:5b:49:1a:6b:4d:6a:98:79:2e:a7:3b:28:cd: 51:a0:0f:e0:a4:85:03:fd:31:b7:da:7d:d3:ac:c8:0e: 48:45:0f:75:d7:ca:db:46:4a:95:4f:44:87:7a:b9:b1: 80:7f:67:7d:99:47:3a:a4:a6:ef:8c:8a:6f:77:54:93: 97:9c:1f:56:eb:5e:9d:1b:9d:19:c3:4b:5b:a1:be:34: d6:39:f0:4c:d3:3f:5f:ed:d2:6f:48:b3:01:fa:a0:4b: 60:05:f6:35:00:52:d0:fc:c5:94:6f:c5:e3:e4:a8:3b: 1b:9f:26:24:48:21:f8:87:fe:b9:59:3f:cb:c9:76:b5: e0:a3:24:5c:ce:09:5b:9d:d5:da:35:0d:ed:f8:1b:0f: 45:aa:72:33:f3:9f:65:9d:87:5c:de:fb:df:b6:bb:74: 70:d3:02:53:69:84:65:3b:3b:a3:99:9c:43:61:af:84 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:03:e0:ba:29:b3:8c:2f:44:c1:5b:6c:e6: 27:71:e2:96:ec:c6:01:1b:71:c9:2a:78:1b:0a:3a:c2: 02:1c:53:27:a8:64:58:eb:9d:b7:62:f4:bd:95:a9:7b: 5e:87:0c:7c:d7:d8:72:c7:63:0e:a7:c4:c4:f8 Fingerprint (SHA-256): 6B:8D:79:DE:EB:80:52:BC:0C:04:27:0E:39:F8:E7:0C:94:4F:63:50:F7:FF:72:05:D4:D2:84:20:3C:57:96:29 Fingerprint (SHA1): 84:E1:C6:0C:B5:91:C3:7C:97:0F:D5:C7:DD:DF:F5:C6:B5:B1:D2:12 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8730: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173671 (0x1957a2a7) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:29:07 2016 Not After : Sun Apr 25 18:29:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 9e:d0:54:52:4a:20:d9:0f:44:12:c0:bc:03:8b:7b:38: 69:5c:ca:99:04:69:1c:26:52:eb:c4:19:50:e8:df:7d: ad:d4:2b:c6:41:00:92:48:47:7d:96:a6:c1:8c:d3:f1: 80:94:fb:b8:9c:cf:6e:fb:d9:29:89:ec:08:b3:55:3f: 46:7f:3a:2f:3f:4a:a8:b4:12:c1:52:a1:db:33:b7:da: a8:ec:70:5b:49:1a:6b:4d:6a:98:79:2e:a7:3b:28:cd: 51:a0:0f:e0:a4:85:03:fd:31:b7:da:7d:d3:ac:c8:0e: 48:45:0f:75:d7:ca:db:46:4a:95:4f:44:87:7a:b9:b1: 80:7f:67:7d:99:47:3a:a4:a6:ef:8c:8a:6f:77:54:93: 97:9c:1f:56:eb:5e:9d:1b:9d:19:c3:4b:5b:a1:be:34: d6:39:f0:4c:d3:3f:5f:ed:d2:6f:48:b3:01:fa:a0:4b: 60:05:f6:35:00:52:d0:fc:c5:94:6f:c5:e3:e4:a8:3b: 1b:9f:26:24:48:21:f8:87:fe:b9:59:3f:cb:c9:76:b5: e0:a3:24:5c:ce:09:5b:9d:d5:da:35:0d:ed:f8:1b:0f: 45:aa:72:33:f3:9f:65:9d:87:5c:de:fb:df:b6:bb:74: 70:d3:02:53:69:84:65:3b:3b:a3:99:9c:43:61:af:84 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:03:e0:ba:29:b3:8c:2f:44:c1:5b:6c:e6: 27:71:e2:96:ec:c6:01:1b:71:c9:2a:78:1b:0a:3a:c2: 02:1c:53:27:a8:64:58:eb:9d:b7:62:f4:bd:95:a9:7b: 5e:87:0c:7c:d7:d8:72:c7:63:0e:a7:c4:c4:f8 Fingerprint (SHA-256): 6B:8D:79:DE:EB:80:52:BC:0C:04:27:0E:39:F8:E7:0C:94:4F:63:50:F7:FF:72:05:D4:D2:84:20:3C:57:96:29 Fingerprint (SHA1): 84:E1:C6:0C:B5:91:C3:7C:97:0F:D5:C7:DD:DF:F5:C6:B5:B1:D2:12 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #8731: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173671 (0x1957a2a7) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:29:07 2016 Not After : Sun Apr 25 18:29:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 9e:d0:54:52:4a:20:d9:0f:44:12:c0:bc:03:8b:7b:38: 69:5c:ca:99:04:69:1c:26:52:eb:c4:19:50:e8:df:7d: ad:d4:2b:c6:41:00:92:48:47:7d:96:a6:c1:8c:d3:f1: 80:94:fb:b8:9c:cf:6e:fb:d9:29:89:ec:08:b3:55:3f: 46:7f:3a:2f:3f:4a:a8:b4:12:c1:52:a1:db:33:b7:da: a8:ec:70:5b:49:1a:6b:4d:6a:98:79:2e:a7:3b:28:cd: 51:a0:0f:e0:a4:85:03:fd:31:b7:da:7d:d3:ac:c8:0e: 48:45:0f:75:d7:ca:db:46:4a:95:4f:44:87:7a:b9:b1: 80:7f:67:7d:99:47:3a:a4:a6:ef:8c:8a:6f:77:54:93: 97:9c:1f:56:eb:5e:9d:1b:9d:19:c3:4b:5b:a1:be:34: d6:39:f0:4c:d3:3f:5f:ed:d2:6f:48:b3:01:fa:a0:4b: 60:05:f6:35:00:52:d0:fc:c5:94:6f:c5:e3:e4:a8:3b: 1b:9f:26:24:48:21:f8:87:fe:b9:59:3f:cb:c9:76:b5: e0:a3:24:5c:ce:09:5b:9d:d5:da:35:0d:ed:f8:1b:0f: 45:aa:72:33:f3:9f:65:9d:87:5c:de:fb:df:b6:bb:74: 70:d3:02:53:69:84:65:3b:3b:a3:99:9c:43:61:af:84 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:03:e0:ba:29:b3:8c:2f:44:c1:5b:6c:e6: 27:71:e2:96:ec:c6:01:1b:71:c9:2a:78:1b:0a:3a:c2: 02:1c:53:27:a8:64:58:eb:9d:b7:62:f4:bd:95:a9:7b: 5e:87:0c:7c:d7:d8:72:c7:63:0e:a7:c4:c4:f8 Fingerprint (SHA-256): 6B:8D:79:DE:EB:80:52:BC:0C:04:27:0E:39:F8:E7:0C:94:4F:63:50:F7:FF:72:05:D4:D2:84:20:3C:57:96:29 Fingerprint (SHA1): 84:E1:C6:0C:B5:91:C3:7C:97:0F:D5:C7:DD:DF:F5:C6:B5:B1:D2:12 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #8732: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173671 (0x1957a2a7) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:29:07 2016 Not After : Sun Apr 25 18:29:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 9e:d0:54:52:4a:20:d9:0f:44:12:c0:bc:03:8b:7b:38: 69:5c:ca:99:04:69:1c:26:52:eb:c4:19:50:e8:df:7d: ad:d4:2b:c6:41:00:92:48:47:7d:96:a6:c1:8c:d3:f1: 80:94:fb:b8:9c:cf:6e:fb:d9:29:89:ec:08:b3:55:3f: 46:7f:3a:2f:3f:4a:a8:b4:12:c1:52:a1:db:33:b7:da: a8:ec:70:5b:49:1a:6b:4d:6a:98:79:2e:a7:3b:28:cd: 51:a0:0f:e0:a4:85:03:fd:31:b7:da:7d:d3:ac:c8:0e: 48:45:0f:75:d7:ca:db:46:4a:95:4f:44:87:7a:b9:b1: 80:7f:67:7d:99:47:3a:a4:a6:ef:8c:8a:6f:77:54:93: 97:9c:1f:56:eb:5e:9d:1b:9d:19:c3:4b:5b:a1:be:34: d6:39:f0:4c:d3:3f:5f:ed:d2:6f:48:b3:01:fa:a0:4b: 60:05:f6:35:00:52:d0:fc:c5:94:6f:c5:e3:e4:a8:3b: 1b:9f:26:24:48:21:f8:87:fe:b9:59:3f:cb:c9:76:b5: e0:a3:24:5c:ce:09:5b:9d:d5:da:35:0d:ed:f8:1b:0f: 45:aa:72:33:f3:9f:65:9d:87:5c:de:fb:df:b6:bb:74: 70:d3:02:53:69:84:65:3b:3b:a3:99:9c:43:61:af:84 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:03:e0:ba:29:b3:8c:2f:44:c1:5b:6c:e6: 27:71:e2:96:ec:c6:01:1b:71:c9:2a:78:1b:0a:3a:c2: 02:1c:53:27:a8:64:58:eb:9d:b7:62:f4:bd:95:a9:7b: 5e:87:0c:7c:d7:d8:72:c7:63:0e:a7:c4:c4:f8 Fingerprint (SHA-256): 6B:8D:79:DE:EB:80:52:BC:0C:04:27:0E:39:F8:E7:0C:94:4F:63:50:F7:FF:72:05:D4:D2:84:20:3C:57:96:29 Fingerprint (SHA1): 84:E1:C6:0C:B5:91:C3:7C:97:0F:D5:C7:DD:DF:F5:C6:B5:B1:D2:12 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #8733: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8734: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8735: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8736: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #8737: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8738: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8739: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8740: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8741: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8742: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8743: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8744: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #8745: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8746: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8747: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8748: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #8749: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8750: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8751: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8752: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8753: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8754: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8755: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8756: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #8757: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8758: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8759: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8760: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425183156Z nextupdate=20170425183156Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 18:31:56 2016 Next Update: Tue Apr 25 18:31:56 2017 CRL Extensions: chains.sh: #8761: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425183157Z nextupdate=20170425183157Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:31:57 2016 Next Update: Tue Apr 25 18:31:57 2017 CRL Extensions: chains.sh: #8762: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425183157Z nextupdate=20170425183157Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 18:31:57 2016 Next Update: Tue Apr 25 18:31:57 2017 CRL Extensions: chains.sh: #8763: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425183158Z nextupdate=20170425183158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 18:31:58 2016 Next Update: Tue Apr 25 18:31:58 2017 CRL Extensions: chains.sh: #8764: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425183159Z addcert 14 20160425183159Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 18:31:59 2016 Next Update: Tue Apr 25 18:31:57 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Apr 25 18:31:59 2016 CRL Extensions: chains.sh: #8765: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425183200Z addcert 15 20160425183200Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:32:00 2016 Next Update: Tue Apr 25 18:31:57 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Apr 25 18:32:00 2016 CRL Extensions: chains.sh: #8766: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8767: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8768: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #8769: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #8770: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #8771: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #8772: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #8773: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #8774: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #8775: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:30:23 2016 Not After : Sun Apr 25 18:30:23 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:88:b3:63:f9:23:66:79:de:94:1e:da:50:a1:6d:4e: 80:a1:e5:7e:82:b6:d0:8f:6b:29:bc:a6:11:21:18:ae: 9a:9c:f2:2a:e3:bc:4a:0e:21:4c:cc:9c:b2:67:b1:73: b4:7a:12:49:d1:df:11:4f:58:65:61:4b:75:f8:62:88: 30:ae:b6:53:c8:56:4b:03:2f:1f:5e:ed:2a:50:e6:c5: ce:52:7a:55:14:3e:d3:55:64:0a:72:06:84:e0:6d:b8: 73:33:09:5b:af:72:4a:93:58:39:a0:d4:01:71:8d:89: 58:36:a5:df:47:e4:e7:07:9c:1c:94:2d:b8:83:c1:a5: c6:b2:59:ef:65:f5:79:ee:f9:6b:45:67:65:c8:90:4e: 59:40:20:3e:48:31:47:1b:95:b8:21:5c:f3:4d:0b:88: dd:33:62:22:75:f8:b2:6a:cf:d6:df:d9:33:e4:24:e6: de:6f:65:f4:8d:bb:d5:9e:df:a6:05:8f:12:85:0c:d6: 8b:97:81:13:2b:bf:6a:a5:cc:ec:7b:1b:60:f6:d9:41: f0:1b:07:42:f0:9a:47:46:04:a1:5c:f4:65:be:52:d9: 50:13:d4:1a:26:16:3a:49:53:22:4a:6e:5e:ae:de:8e: 78:63:26:47:68:cb:4b:66:61:b2:41:9a:b6:28:d2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e1:65:f6:5a:49:b4:31:c9:56:b5:46:70:08:95:ad:7f: 34:24:6e:7f:01:8b:89:27:0a:aa:bf:15:3b:5b:21:11: f9:7c:73:0d:c5:51:a8:e7:9c:28:83:71:ce:a4:4a:a3: 0c:2d:55:a5:2a:a5:56:bf:fd:d3:98:a6:d3:73:92:74: 46:27:35:f8:c6:8b:b3:ef:5e:15:c7:0a:3e:ee:c1:2b: 24:11:39:6e:af:56:bc:54:14:94:bc:25:11:e0:bb:bd: 47:49:be:6e:8d:a1:87:d7:35:1b:a2:b9:05:07:d4:39: 15:81:00:df:ee:33:f2:74:ed:a5:3f:b9:0c:16:4d:73: dd:89:41:39:9a:da:67:87:7d:ea:fe:d2:34:f5:8e:99: f0:b4:5c:2c:67:e7:c5:a6:75:2d:6e:26:62:49:ec:d0: d6:b3:d8:d6:ff:f8:90:78:a3:a2:9a:82:f5:0d:b5:48: fa:fb:ad:f8:29:42:71:f2:6c:00:42:44:80:fc:bb:43: ac:02:b7:d0:d4:53:a8:c9:6e:28:09:c2:ad:72:e5:10: b5:a7:79:f0:41:28:19:05:d1:08:ed:d5:a1:ea:a0:29: 3e:86:ab:11:dd:3b:dd:ac:37:31:ce:53:2c:8b:fa:98: 0c:b3:7e:7a:12:57:b9:4d:76:6b:19:ad:fe:47:33:00 Fingerprint (SHA-256): AB:57:D0:C0:89:05:F5:9C:AB:F4:16:70:52:94:D2:C2:75:1A:B1:9D:E2:9F:04:A8:40:81:D8:BB:0A:7A:4B:19 Fingerprint (SHA1): B2:4F:C6:90:1D:6E:CD:3E:FC:6C:D4:6A:22:EA:F9:C9:C5:0C:6A:D9 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8776: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8777: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:30:23 2016 Not After : Sun Apr 25 18:30:23 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:88:b3:63:f9:23:66:79:de:94:1e:da:50:a1:6d:4e: 80:a1:e5:7e:82:b6:d0:8f:6b:29:bc:a6:11:21:18:ae: 9a:9c:f2:2a:e3:bc:4a:0e:21:4c:cc:9c:b2:67:b1:73: b4:7a:12:49:d1:df:11:4f:58:65:61:4b:75:f8:62:88: 30:ae:b6:53:c8:56:4b:03:2f:1f:5e:ed:2a:50:e6:c5: ce:52:7a:55:14:3e:d3:55:64:0a:72:06:84:e0:6d:b8: 73:33:09:5b:af:72:4a:93:58:39:a0:d4:01:71:8d:89: 58:36:a5:df:47:e4:e7:07:9c:1c:94:2d:b8:83:c1:a5: c6:b2:59:ef:65:f5:79:ee:f9:6b:45:67:65:c8:90:4e: 59:40:20:3e:48:31:47:1b:95:b8:21:5c:f3:4d:0b:88: dd:33:62:22:75:f8:b2:6a:cf:d6:df:d9:33:e4:24:e6: de:6f:65:f4:8d:bb:d5:9e:df:a6:05:8f:12:85:0c:d6: 8b:97:81:13:2b:bf:6a:a5:cc:ec:7b:1b:60:f6:d9:41: f0:1b:07:42:f0:9a:47:46:04:a1:5c:f4:65:be:52:d9: 50:13:d4:1a:26:16:3a:49:53:22:4a:6e:5e:ae:de:8e: 78:63:26:47:68:cb:4b:66:61:b2:41:9a:b6:28:d2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e1:65:f6:5a:49:b4:31:c9:56:b5:46:70:08:95:ad:7f: 34:24:6e:7f:01:8b:89:27:0a:aa:bf:15:3b:5b:21:11: f9:7c:73:0d:c5:51:a8:e7:9c:28:83:71:ce:a4:4a:a3: 0c:2d:55:a5:2a:a5:56:bf:fd:d3:98:a6:d3:73:92:74: 46:27:35:f8:c6:8b:b3:ef:5e:15:c7:0a:3e:ee:c1:2b: 24:11:39:6e:af:56:bc:54:14:94:bc:25:11:e0:bb:bd: 47:49:be:6e:8d:a1:87:d7:35:1b:a2:b9:05:07:d4:39: 15:81:00:df:ee:33:f2:74:ed:a5:3f:b9:0c:16:4d:73: dd:89:41:39:9a:da:67:87:7d:ea:fe:d2:34:f5:8e:99: f0:b4:5c:2c:67:e7:c5:a6:75:2d:6e:26:62:49:ec:d0: d6:b3:d8:d6:ff:f8:90:78:a3:a2:9a:82:f5:0d:b5:48: fa:fb:ad:f8:29:42:71:f2:6c:00:42:44:80:fc:bb:43: ac:02:b7:d0:d4:53:a8:c9:6e:28:09:c2:ad:72:e5:10: b5:a7:79:f0:41:28:19:05:d1:08:ed:d5:a1:ea:a0:29: 3e:86:ab:11:dd:3b:dd:ac:37:31:ce:53:2c:8b:fa:98: 0c:b3:7e:7a:12:57:b9:4d:76:6b:19:ad:fe:47:33:00 Fingerprint (SHA-256): AB:57:D0:C0:89:05:F5:9C:AB:F4:16:70:52:94:D2:C2:75:1A:B1:9D:E2:9F:04:A8:40:81:D8:BB:0A:7A:4B:19 Fingerprint (SHA1): B2:4F:C6:90:1D:6E:CD:3E:FC:6C:D4:6A:22:EA:F9:C9:C5:0C:6A:D9 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8778: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8779: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #8780: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173680 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8781: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #8782: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #8783: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8784: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 425173681 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8785: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8786: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8787: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173452.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8788: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425173426.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8789: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8790: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #8791: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173452.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8792: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 425173682 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8793: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8794: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8795: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173452.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8796: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425173427.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8797: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8798: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #8799: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8800: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 425173683 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8801: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8802: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8803: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173452.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8804: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425173428.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8805: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8806: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8807: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425173452.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #8808: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425173429.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #8809: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8810: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425183320Z nextupdate=20170425183320Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 18:33:20 2016 Next Update: Tue Apr 25 18:33:20 2017 CRL Extensions: chains.sh: #8811: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425183321Z nextupdate=20170425183321Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:33:21 2016 Next Update: Tue Apr 25 18:33:21 2017 CRL Extensions: chains.sh: #8812: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425183322Z nextupdate=20170425183322Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 18:33:22 2016 Next Update: Tue Apr 25 18:33:22 2017 CRL Extensions: chains.sh: #8813: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425183322Z nextupdate=20170425183322Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 18:33:22 2016 Next Update: Tue Apr 25 18:33:22 2017 CRL Extensions: chains.sh: #8814: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425183323Z addcert 20 20160425183323Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:33:23 2016 Next Update: Tue Apr 25 18:33:21 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 18:33:23 2016 CRL Extensions: chains.sh: #8815: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425183325Z addcert 40 20160425183325Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 18:33:25 2016 Next Update: Tue Apr 25 18:33:21 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 18:33:23 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Apr 25 18:33:25 2016 CRL Extensions: chains.sh: #8816: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #8817: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8818: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #8819: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173680 (0x1957a2b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:32:14 2016 Not After : Sun Apr 25 18:32:14 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:20:5a:42:28:28:1f:6c:8a:c1:96:79:d5:d2:17:e4: 6b:e7:48:e3:b4:fd:c8:7a:c7:f9:42:7c:a4:cc:ac:25: f8:da:54:07:dc:53:1a:01:e2:94:38:3b:5e:78:16:ee: 2a:bf:7c:b2:41:90:43:64:c9:65:85:ec:7d:1e:c1:55: 4f:6e:00:f3:65:67:f5:39:b1:c7:ef:9e:5a:08:d8:ce: 56:a5:65:14:70:79:dd:40:f5:3e:6a:f9:06:36:87:ba: bf:15:67:1b:83:03:3f:47:df:1d:bc:95:06:3b:a8:ff: 5d:40:f1:f8:d5:b5:d9:08:5e:ed:e7:99:92:59:ec:a3: 39:16:e9:72:6e:77:00:71:0e:35:88:aa:38:48:ea:b3: 1f:b8:ba:35:4b:a7:37:b2:f7:2c:03:4b:50:44:93:e4: 79:d0:b8:84:e6:73:86:b7:95:31:f7:9d:ac:3c:17:ba: f1:90:76:bf:aa:8c:8a:d5:99:6b:35:2c:0d:ef:74:e6: eb:97:00:9f:dd:87:fe:4f:2a:6c:f4:f3:b3:57:38:8a: 4b:f1:d7:2a:f6:81:69:6f:b0:59:1d:22:e2:95:c1:d7: 37:83:e0:e1:4a:6d:90:54:16:4e:9f:c8:1c:74:b0:0d: 8b:fa:94:ff:c2:1f:d7:7a:dc:2f:3d:67:fd:1d:67:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:4f:33:cd:40:1b:e6:4a:3b:97:1e:ec:b0:35:f2:1a: c6:fc:5b:fc:61:f5:ad:e6:bf:25:75:a3:35:6c:4b:25: db:91:74:0f:ff:25:05:d9:7a:67:fd:a9:3c:51:06:34: e9:ce:ea:12:8d:ef:14:bb:e4:43:61:e5:94:a7:ed:3a: e5:1c:88:6b:32:07:01:9f:9a:70:7a:52:9d:1e:8d:f9: 88:0d:0c:84:59:3d:1c:9f:79:d9:9b:fe:e5:a3:66:b3: 06:17:26:82:98:54:d9:7f:fd:c8:5d:70:36:95:b1:25: 9d:4e:91:c4:f2:38:10:26:bf:be:15:49:c8:da:18:e1: 6f:d2:5c:bd:5c:d7:7b:08:f1:99:72:63:36:8a:aa:aa: ca:d6:29:0e:26:87:55:34:50:9d:7a:70:4e:7b:b7:b1: 2e:99:c7:fa:4e:b8:1f:4f:b1:82:08:c2:22:22:14:29: b1:67:ce:f0:de:3a:22:dd:9d:9d:7e:ec:60:7b:37:30: b2:f8:73:a1:d8:78:6e:a6:de:6e:81:15:23:0c:1a:01: 9b:f1:dc:a7:67:e7:cd:c9:21:22:3b:13:de:3b:6a:66: 6b:20:b1:35:b6:06:00:49:b2:16:01:0e:fb:9e:0e:40: 9b:e1:34:5e:f4:b6:09:61:5a:b3:0e:1b:24:7b:49:c5 Fingerprint (SHA-256): CD:F4:0F:47:92:76:6F:12:A0:AE:A1:1D:F1:18:F1:2E:07:D9:78:6E:9A:6E:9F:E4:36:3F:C3:39:99:34:40:64 Fingerprint (SHA1): 2A:5F:ED:3E:F4:25:86:E3:08:64:4B:00:43:4B:81:86:FA:48:14:BF Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8820: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8821: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173680 (0x1957a2b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 18:32:14 2016 Not After : Sun Apr 25 18:32:14 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:20:5a:42:28:28:1f:6c:8a:c1:96:79:d5:d2:17:e4: 6b:e7:48:e3:b4:fd:c8:7a:c7:f9:42:7c:a4:cc:ac:25: f8:da:54:07:dc:53:1a:01:e2:94:38:3b:5e:78:16:ee: 2a:bf:7c:b2:41:90:43:64:c9:65:85:ec:7d:1e:c1:55: 4f:6e:00:f3:65:67:f5:39:b1:c7:ef:9e:5a:08:d8:ce: 56:a5:65:14:70:79:dd:40:f5:3e:6a:f9:06:36:87:ba: bf:15:67:1b:83:03:3f:47:df:1d:bc:95:06:3b:a8:ff: 5d:40:f1:f8:d5:b5:d9:08:5e:ed:e7:99:92:59:ec:a3: 39:16:e9:72:6e:77:00:71:0e:35:88:aa:38:48:ea:b3: 1f:b8:ba:35:4b:a7:37:b2:f7:2c:03:4b:50:44:93:e4: 79:d0:b8:84:e6:73:86:b7:95:31:f7:9d:ac:3c:17:ba: f1:90:76:bf:aa:8c:8a:d5:99:6b:35:2c:0d:ef:74:e6: eb:97:00:9f:dd:87:fe:4f:2a:6c:f4:f3:b3:57:38:8a: 4b:f1:d7:2a:f6:81:69:6f:b0:59:1d:22:e2:95:c1:d7: 37:83:e0:e1:4a:6d:90:54:16:4e:9f:c8:1c:74:b0:0d: 8b:fa:94:ff:c2:1f:d7:7a:dc:2f:3d:67:fd:1d:67:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:4f:33:cd:40:1b:e6:4a:3b:97:1e:ec:b0:35:f2:1a: c6:fc:5b:fc:61:f5:ad:e6:bf:25:75:a3:35:6c:4b:25: db:91:74:0f:ff:25:05:d9:7a:67:fd:a9:3c:51:06:34: e9:ce:ea:12:8d:ef:14:bb:e4:43:61:e5:94:a7:ed:3a: e5:1c:88:6b:32:07:01:9f:9a:70:7a:52:9d:1e:8d:f9: 88:0d:0c:84:59:3d:1c:9f:79:d9:9b:fe:e5:a3:66:b3: 06:17:26:82:98:54:d9:7f:fd:c8:5d:70:36:95:b1:25: 9d:4e:91:c4:f2:38:10:26:bf:be:15:49:c8:da:18:e1: 6f:d2:5c:bd:5c:d7:7b:08:f1:99:72:63:36:8a:aa:aa: ca:d6:29:0e:26:87:55:34:50:9d:7a:70:4e:7b:b7:b1: 2e:99:c7:fa:4e:b8:1f:4f:b1:82:08:c2:22:22:14:29: b1:67:ce:f0:de:3a:22:dd:9d:9d:7e:ec:60:7b:37:30: b2:f8:73:a1:d8:78:6e:a6:de:6e:81:15:23:0c:1a:01: 9b:f1:dc:a7:67:e7:cd:c9:21:22:3b:13:de:3b:6a:66: 6b:20:b1:35:b6:06:00:49:b2:16:01:0e:fb:9e:0e:40: 9b:e1:34:5e:f4:b6:09:61:5a:b3:0e:1b:24:7b:49:c5 Fingerprint (SHA-256): CD:F4:0F:47:92:76:6F:12:A0:AE:A1:1D:F1:18:F1:2E:07:D9:78:6E:9A:6E:9F:E4:36:3F:C3:39:99:34:40:64 Fingerprint (SHA1): 2A:5F:ED:3E:F4:25:86:E3:08:64:4B:00:43:4B:81:86:FA:48:14:BF Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #8822: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #8823: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #8824: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173684 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8825: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #8826: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #8827: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8828: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425173685 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8829: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8830: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #8831: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8832: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425173686 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8833: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8834: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #8835: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8836: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 425173687 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8837: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8838: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #8839: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -m 425173688 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #8840: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #8841: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #8842: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #8843: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 425173689 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8844: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8845: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #8846: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #8847: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 425173690 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #8848: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8849: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #8850: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #8851: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #8852: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173684 (0x1957a2b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:33:40 2016 Not After : Sun Apr 25 18:33:40 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:50:86:91:31:78:50:f3:63:7e:0b:7b:67:d9:10:f5: f1:9e:5c:5b:6b:14:b0:37:58:e7:3f:88:56:8d:d2:8c: 31:d7:3f:02:a4:8c:6a:fd:72:91:b8:31:0e:ee:73:eb: 64:4e:85:d9:53:a6:8a:87:34:1a:f6:3f:fa:96:83:eb: 43:c2:d5:68:8a:d7:10:cf:7f:87:dc:b7:59:d2:11:65: 4c:00:6b:de:d0:c9:bf:79:67:38:b0:15:e4:36:26:3d: de:bd:d2:08:86:f6:75:bf:72:b0:31:b4:45:52:62:66: a1:e8:86:77:c9:d1:2f:89:5b:19:c1:f8:f5:34:5c:0e: b9:24:51:b3:49:37:b3:13:f5:03:86:05:ed:ea:80:1e: ee:be:b1:d3:af:e8:d3:da:6c:5b:70:c0:41:ca:25:1d: 9f:04:20:83:d8:5d:07:21:b1:11:af:9d:8c:03:d4:1f: 1e:90:52:76:dd:63:a8:8c:37:66:0b:3f:89:1d:b7:39: 58:bd:bb:81:ab:f3:98:b5:06:6e:ae:0a:e3:a1:ba:83: 44:25:ad:7c:d0:af:d5:40:40:8e:01:51:f0:62:07:d8: c5:c3:43:26:e6:16:d2:d4:ea:1c:68:5e:ec:4f:52:d6: 70:77:68:5e:17:a7:d9:26:0d:38:2f:f2:ed:e6:2f:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:b6:02:87:72:40:54:f9:b0:ee:8c:29:b7:04:25:a4: 9c:a4:62:87:fe:8f:5c:43:25:07:69:dc:73:ba:ff:6c: 2b:5f:e8:1d:1c:cd:27:2f:3c:d0:88:9f:06:72:20:b3: 67:a9:50:19:66:2a:9b:1c:4c:d5:9a:ad:92:e7:5a:d6: 5d:28:cf:03:46:c9:0a:5c:dd:2f:17:f6:ac:0f:27:c7: 2e:ef:97:e8:a6:f3:8e:ee:32:a6:b9:a2:a2:36:02:9e: 7a:91:63:67:e7:70:a5:3c:50:4a:5c:7a:7e:12:b2:44: 18:ea:f9:5c:85:a9:f3:73:08:42:d5:8b:d6:16:03:3a: 58:b3:18:84:e3:e5:12:fe:f7:6b:81:47:54:71:49:f1: df:41:b4:10:60:25:6e:df:ad:ee:cb:16:8b:58:c4:e6: 62:06:cd:e4:7f:4a:3e:2c:d8:17:12:f1:56:e0:fb:90: a7:0b:aa:f9:4b:23:96:3d:40:a3:fb:d2:a7:e2:0d:6e: fb:29:1c:ff:4a:17:53:c4:20:53:ee:76:78:7d:b8:ea: de:0e:5c:7e:15:93:20:6b:2d:e0:27:86:d8:a6:9b:07: 40:08:5d:29:37:27:a4:80:26:7d:c9:02:fe:02:e4:89: c6:b3:67:9f:1d:26:e4:fa:be:70:95:b9:86:ec:1d:09 Fingerprint (SHA-256): 52:5F:D6:82:FE:23:A5:C5:0D:8E:B5:57:57:F8:63:F4:3C:66:5A:BB:1A:ED:B1:99:DF:EC:D1:CB:96:26:43:7D Fingerprint (SHA1): 81:FC:71:10:AE:A2:14:72:C5:DD:75:CB:A2:E3:20:21:96:0F:4B:C0 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8853: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173686 (0x1957a2b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:34:09 2016 Not After : Sun Apr 25 18:34:09 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:0b:e7:1c:7b:e1:4f:66:48:ba:e9:ff:46:a8:9f:27: cd:36:c5:6f:cf:7d:0c:9f:c7:38:7c:87:2a:3b:8e:40: 9a:b5:57:a2:01:41:60:b4:75:61:5c:a3:64:6d:15:c1: 9b:a2:8c:65:bf:11:bd:39:22:c7:4f:17:c6:61:c6:92: dd:8a:9e:98:8d:4c:3d:85:b3:c4:70:20:44:a9:4c:62: 55:e8:c1:5e:ce:53:8e:8b:75:2e:ff:d9:90:68:1f:c5: 61:d7:1e:99:13:34:c5:5f:27:50:b8:42:90:a4:6c:4f: 7c:14:a1:69:bd:f7:38:15:b9:b4:69:31:cb:6f:70:6f: 8f:d3:0f:8c:18:90:0c:0d:0d:fd:28:2b:29:9e:dd:2e: 93:e6:c1:ab:05:37:99:9e:ad:72:01:bb:9b:13:4e:6a: e8:17:62:86:78:cb:31:45:6c:bb:98:cf:53:63:92:36: f8:5b:f5:76:21:64:5c:64:eb:5d:e4:af:3b:e6:51:28: c7:28:a9:e7:b6:d6:25:05:19:47:5d:69:07:3e:2b:00: 78:d9:79:f9:ad:f0:f7:87:ca:b5:48:df:c8:3b:b9:fd: be:ad:a2:81:1b:68:8f:f5:05:94:c7:81:38:a8:32:98: 4f:8c:43:3d:86:e0:bb:b7:2d:51:96:26:19:38:a7:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:78:0e:86:fe:2e:7c:8b:08:2b:82:5b:05:1a:45:47: 71:de:c6:f9:64:76:04:fd:69:76:02:7d:21:70:70:74: a7:33:d6:f8:8c:75:e9:26:5b:1b:3c:5c:6e:2f:db:87: c5:20:3c:42:b9:d4:42:5c:b7:70:8d:ce:cf:fc:a4:b6: 91:0a:98:28:c4:1d:fa:05:d0:3c:b6:1f:46:e9:a3:3e: ac:42:7a:58:df:07:ba:d6:a7:30:14:11:75:ad:72:26: fb:54:c4:77:ab:ad:0b:57:89:f8:91:f4:f4:60:d3:a2: 83:e6:06:82:bb:94:d0:d7:69:ff:0f:e8:ee:60:b7:5f: 68:8f:46:d9:53:79:bb:34:83:85:70:a7:88:31:5e:c4: 95:4f:65:b8:25:3c:13:8c:37:a7:55:be:9f:30:08:97: 6b:eb:2d:44:f3:3b:db:0c:fe:a8:b7:7b:d6:34:c4:b0: 3e:30:ed:be:88:5c:cb:5d:a8:02:c7:7f:52:11:a7:82: 46:10:d0:45:79:fa:88:83:da:59:47:f8:6a:bb:40:2d: f7:a3:7f:1c:bc:6c:23:bd:c2:b6:7e:89:91:d7:6f:e1: e4:2f:69:50:21:8a:8d:58:9a:68:df:de:2a:5d:78:8d: 00:53:76:89:fd:15:6c:64:14:a3:ed:ce:e2:96:8c:98 Fingerprint (SHA-256): 2C:6C:93:96:C2:74:F1:D5:7E:B4:3E:D3:D3:6E:DA:8E:C1:38:0B:3E:FB:E8:36:2E:53:96:AF:90:D3:99:46:7D Fingerprint (SHA1): A8:F7:70:55:23:11:5E:2B:92:24:F3:9F:D6:8D:CA:DE:14:64:C3:8E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #8854: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173684 (0x1957a2b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:33:40 2016 Not After : Sun Apr 25 18:33:40 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:50:86:91:31:78:50:f3:63:7e:0b:7b:67:d9:10:f5: f1:9e:5c:5b:6b:14:b0:37:58:e7:3f:88:56:8d:d2:8c: 31:d7:3f:02:a4:8c:6a:fd:72:91:b8:31:0e:ee:73:eb: 64:4e:85:d9:53:a6:8a:87:34:1a:f6:3f:fa:96:83:eb: 43:c2:d5:68:8a:d7:10:cf:7f:87:dc:b7:59:d2:11:65: 4c:00:6b:de:d0:c9:bf:79:67:38:b0:15:e4:36:26:3d: de:bd:d2:08:86:f6:75:bf:72:b0:31:b4:45:52:62:66: a1:e8:86:77:c9:d1:2f:89:5b:19:c1:f8:f5:34:5c:0e: b9:24:51:b3:49:37:b3:13:f5:03:86:05:ed:ea:80:1e: ee:be:b1:d3:af:e8:d3:da:6c:5b:70:c0:41:ca:25:1d: 9f:04:20:83:d8:5d:07:21:b1:11:af:9d:8c:03:d4:1f: 1e:90:52:76:dd:63:a8:8c:37:66:0b:3f:89:1d:b7:39: 58:bd:bb:81:ab:f3:98:b5:06:6e:ae:0a:e3:a1:ba:83: 44:25:ad:7c:d0:af:d5:40:40:8e:01:51:f0:62:07:d8: c5:c3:43:26:e6:16:d2:d4:ea:1c:68:5e:ec:4f:52:d6: 70:77:68:5e:17:a7:d9:26:0d:38:2f:f2:ed:e6:2f:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:b6:02:87:72:40:54:f9:b0:ee:8c:29:b7:04:25:a4: 9c:a4:62:87:fe:8f:5c:43:25:07:69:dc:73:ba:ff:6c: 2b:5f:e8:1d:1c:cd:27:2f:3c:d0:88:9f:06:72:20:b3: 67:a9:50:19:66:2a:9b:1c:4c:d5:9a:ad:92:e7:5a:d6: 5d:28:cf:03:46:c9:0a:5c:dd:2f:17:f6:ac:0f:27:c7: 2e:ef:97:e8:a6:f3:8e:ee:32:a6:b9:a2:a2:36:02:9e: 7a:91:63:67:e7:70:a5:3c:50:4a:5c:7a:7e:12:b2:44: 18:ea:f9:5c:85:a9:f3:73:08:42:d5:8b:d6:16:03:3a: 58:b3:18:84:e3:e5:12:fe:f7:6b:81:47:54:71:49:f1: df:41:b4:10:60:25:6e:df:ad:ee:cb:16:8b:58:c4:e6: 62:06:cd:e4:7f:4a:3e:2c:d8:17:12:f1:56:e0:fb:90: a7:0b:aa:f9:4b:23:96:3d:40:a3:fb:d2:a7:e2:0d:6e: fb:29:1c:ff:4a:17:53:c4:20:53:ee:76:78:7d:b8:ea: de:0e:5c:7e:15:93:20:6b:2d:e0:27:86:d8:a6:9b:07: 40:08:5d:29:37:27:a4:80:26:7d:c9:02:fe:02:e4:89: c6:b3:67:9f:1d:26:e4:fa:be:70:95:b9:86:ec:1d:09 Fingerprint (SHA-256): 52:5F:D6:82:FE:23:A5:C5:0D:8E:B5:57:57:F8:63:F4:3C:66:5A:BB:1A:ED:B1:99:DF:EC:D1:CB:96:26:43:7D Fingerprint (SHA1): 81:FC:71:10:AE:A2:14:72:C5:DD:75:CB:A2:E3:20:21:96:0F:4B:C0 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8855: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #8856: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173684 (0x1957a2b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:33:40 2016 Not After : Sun Apr 25 18:33:40 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:50:86:91:31:78:50:f3:63:7e:0b:7b:67:d9:10:f5: f1:9e:5c:5b:6b:14:b0:37:58:e7:3f:88:56:8d:d2:8c: 31:d7:3f:02:a4:8c:6a:fd:72:91:b8:31:0e:ee:73:eb: 64:4e:85:d9:53:a6:8a:87:34:1a:f6:3f:fa:96:83:eb: 43:c2:d5:68:8a:d7:10:cf:7f:87:dc:b7:59:d2:11:65: 4c:00:6b:de:d0:c9:bf:79:67:38:b0:15:e4:36:26:3d: de:bd:d2:08:86:f6:75:bf:72:b0:31:b4:45:52:62:66: a1:e8:86:77:c9:d1:2f:89:5b:19:c1:f8:f5:34:5c:0e: b9:24:51:b3:49:37:b3:13:f5:03:86:05:ed:ea:80:1e: ee:be:b1:d3:af:e8:d3:da:6c:5b:70:c0:41:ca:25:1d: 9f:04:20:83:d8:5d:07:21:b1:11:af:9d:8c:03:d4:1f: 1e:90:52:76:dd:63:a8:8c:37:66:0b:3f:89:1d:b7:39: 58:bd:bb:81:ab:f3:98:b5:06:6e:ae:0a:e3:a1:ba:83: 44:25:ad:7c:d0:af:d5:40:40:8e:01:51:f0:62:07:d8: c5:c3:43:26:e6:16:d2:d4:ea:1c:68:5e:ec:4f:52:d6: 70:77:68:5e:17:a7:d9:26:0d:38:2f:f2:ed:e6:2f:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:b6:02:87:72:40:54:f9:b0:ee:8c:29:b7:04:25:a4: 9c:a4:62:87:fe:8f:5c:43:25:07:69:dc:73:ba:ff:6c: 2b:5f:e8:1d:1c:cd:27:2f:3c:d0:88:9f:06:72:20:b3: 67:a9:50:19:66:2a:9b:1c:4c:d5:9a:ad:92:e7:5a:d6: 5d:28:cf:03:46:c9:0a:5c:dd:2f:17:f6:ac:0f:27:c7: 2e:ef:97:e8:a6:f3:8e:ee:32:a6:b9:a2:a2:36:02:9e: 7a:91:63:67:e7:70:a5:3c:50:4a:5c:7a:7e:12:b2:44: 18:ea:f9:5c:85:a9:f3:73:08:42:d5:8b:d6:16:03:3a: 58:b3:18:84:e3:e5:12:fe:f7:6b:81:47:54:71:49:f1: df:41:b4:10:60:25:6e:df:ad:ee:cb:16:8b:58:c4:e6: 62:06:cd:e4:7f:4a:3e:2c:d8:17:12:f1:56:e0:fb:90: a7:0b:aa:f9:4b:23:96:3d:40:a3:fb:d2:a7:e2:0d:6e: fb:29:1c:ff:4a:17:53:c4:20:53:ee:76:78:7d:b8:ea: de:0e:5c:7e:15:93:20:6b:2d:e0:27:86:d8:a6:9b:07: 40:08:5d:29:37:27:a4:80:26:7d:c9:02:fe:02:e4:89: c6:b3:67:9f:1d:26:e4:fa:be:70:95:b9:86:ec:1d:09 Fingerprint (SHA-256): 52:5F:D6:82:FE:23:A5:C5:0D:8E:B5:57:57:F8:63:F4:3C:66:5A:BB:1A:ED:B1:99:DF:EC:D1:CB:96:26:43:7D Fingerprint (SHA1): 81:FC:71:10:AE:A2:14:72:C5:DD:75:CB:A2:E3:20:21:96:0F:4B:C0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8857: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173686 (0x1957a2b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 18:34:09 2016 Not After : Sun Apr 25 18:34:09 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:0b:e7:1c:7b:e1:4f:66:48:ba:e9:ff:46:a8:9f:27: cd:36:c5:6f:cf:7d:0c:9f:c7:38:7c:87:2a:3b:8e:40: 9a:b5:57:a2:01:41:60:b4:75:61:5c:a3:64:6d:15:c1: 9b:a2:8c:65:bf:11:bd:39:22:c7:4f:17:c6:61:c6:92: dd:8a:9e:98:8d:4c:3d:85:b3:c4:70:20:44:a9:4c:62: 55:e8:c1:5e:ce:53:8e:8b:75:2e:ff:d9:90:68:1f:c5: 61:d7:1e:99:13:34:c5:5f:27:50:b8:42:90:a4:6c:4f: 7c:14:a1:69:bd:f7:38:15:b9:b4:69:31:cb:6f:70:6f: 8f:d3:0f:8c:18:90:0c:0d:0d:fd:28:2b:29:9e:dd:2e: 93:e6:c1:ab:05:37:99:9e:ad:72:01:bb:9b:13:4e:6a: e8:17:62:86:78:cb:31:45:6c:bb:98:cf:53:63:92:36: f8:5b:f5:76:21:64:5c:64:eb:5d:e4:af:3b:e6:51:28: c7:28:a9:e7:b6:d6:25:05:19:47:5d:69:07:3e:2b:00: 78:d9:79:f9:ad:f0:f7:87:ca:b5:48:df:c8:3b:b9:fd: be:ad:a2:81:1b:68:8f:f5:05:94:c7:81:38:a8:32:98: 4f:8c:43:3d:86:e0:bb:b7:2d:51:96:26:19:38:a7:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:78:0e:86:fe:2e:7c:8b:08:2b:82:5b:05:1a:45:47: 71:de:c6:f9:64:76:04:fd:69:76:02:7d:21:70:70:74: a7:33:d6:f8:8c:75:e9:26:5b:1b:3c:5c:6e:2f:db:87: c5:20:3c:42:b9:d4:42:5c:b7:70:8d:ce:cf:fc:a4:b6: 91:0a:98:28:c4:1d:fa:05:d0:3c:b6:1f:46:e9:a3:3e: ac:42:7a:58:df:07:ba:d6:a7:30:14:11:75:ad:72:26: fb:54:c4:77:ab:ad:0b:57:89:f8:91:f4:f4:60:d3:a2: 83:e6:06:82:bb:94:d0:d7:69:ff:0f:e8:ee:60:b7:5f: 68:8f:46:d9:53:79:bb:34:83:85:70:a7:88:31:5e:c4: 95:4f:65:b8:25:3c:13:8c:37:a7:55:be:9f:30:08:97: 6b:eb:2d:44:f3:3b:db:0c:fe:a8:b7:7b:d6:34:c4:b0: 3e:30:ed:be:88:5c:cb:5d:a8:02:c7:7f:52:11:a7:82: 46:10:d0:45:79:fa:88:83:da:59:47:f8:6a:bb:40:2d: f7:a3:7f:1c:bc:6c:23:bd:c2:b6:7e:89:91:d7:6f:e1: e4:2f:69:50:21:8a:8d:58:9a:68:df:de:2a:5d:78:8d: 00:53:76:89:fd:15:6c:64:14:a3:ed:ce:e2:96:8c:98 Fingerprint (SHA-256): 2C:6C:93:96:C2:74:F1:D5:7E:B4:3E:D3:D3:6E:DA:8E:C1:38:0B:3E:FB:E8:36:2E:53:96:AF:90:D3:99:46:7D Fingerprint (SHA1): A8:F7:70:55:23:11:5E:2B:92:24:F3:9F:D6:8D:CA:DE:14:64:C3:8E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #8858: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #8859: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #8860: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #8861: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173684 (0x1957a2b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:33:40 2016 Not After : Sun Apr 25 18:33:40 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:50:86:91:31:78:50:f3:63:7e:0b:7b:67:d9:10:f5: f1:9e:5c:5b:6b:14:b0:37:58:e7:3f:88:56:8d:d2:8c: 31:d7:3f:02:a4:8c:6a:fd:72:91:b8:31:0e:ee:73:eb: 64:4e:85:d9:53:a6:8a:87:34:1a:f6:3f:fa:96:83:eb: 43:c2:d5:68:8a:d7:10:cf:7f:87:dc:b7:59:d2:11:65: 4c:00:6b:de:d0:c9:bf:79:67:38:b0:15:e4:36:26:3d: de:bd:d2:08:86:f6:75:bf:72:b0:31:b4:45:52:62:66: a1:e8:86:77:c9:d1:2f:89:5b:19:c1:f8:f5:34:5c:0e: b9:24:51:b3:49:37:b3:13:f5:03:86:05:ed:ea:80:1e: ee:be:b1:d3:af:e8:d3:da:6c:5b:70:c0:41:ca:25:1d: 9f:04:20:83:d8:5d:07:21:b1:11:af:9d:8c:03:d4:1f: 1e:90:52:76:dd:63:a8:8c:37:66:0b:3f:89:1d:b7:39: 58:bd:bb:81:ab:f3:98:b5:06:6e:ae:0a:e3:a1:ba:83: 44:25:ad:7c:d0:af:d5:40:40:8e:01:51:f0:62:07:d8: c5:c3:43:26:e6:16:d2:d4:ea:1c:68:5e:ec:4f:52:d6: 70:77:68:5e:17:a7:d9:26:0d:38:2f:f2:ed:e6:2f:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:b6:02:87:72:40:54:f9:b0:ee:8c:29:b7:04:25:a4: 9c:a4:62:87:fe:8f:5c:43:25:07:69:dc:73:ba:ff:6c: 2b:5f:e8:1d:1c:cd:27:2f:3c:d0:88:9f:06:72:20:b3: 67:a9:50:19:66:2a:9b:1c:4c:d5:9a:ad:92:e7:5a:d6: 5d:28:cf:03:46:c9:0a:5c:dd:2f:17:f6:ac:0f:27:c7: 2e:ef:97:e8:a6:f3:8e:ee:32:a6:b9:a2:a2:36:02:9e: 7a:91:63:67:e7:70:a5:3c:50:4a:5c:7a:7e:12:b2:44: 18:ea:f9:5c:85:a9:f3:73:08:42:d5:8b:d6:16:03:3a: 58:b3:18:84:e3:e5:12:fe:f7:6b:81:47:54:71:49:f1: df:41:b4:10:60:25:6e:df:ad:ee:cb:16:8b:58:c4:e6: 62:06:cd:e4:7f:4a:3e:2c:d8:17:12:f1:56:e0:fb:90: a7:0b:aa:f9:4b:23:96:3d:40:a3:fb:d2:a7:e2:0d:6e: fb:29:1c:ff:4a:17:53:c4:20:53:ee:76:78:7d:b8:ea: de:0e:5c:7e:15:93:20:6b:2d:e0:27:86:d8:a6:9b:07: 40:08:5d:29:37:27:a4:80:26:7d:c9:02:fe:02:e4:89: c6:b3:67:9f:1d:26:e4:fa:be:70:95:b9:86:ec:1d:09 Fingerprint (SHA-256): 52:5F:D6:82:FE:23:A5:C5:0D:8E:B5:57:57:F8:63:F4:3C:66:5A:BB:1A:ED:B1:99:DF:EC:D1:CB:96:26:43:7D Fingerprint (SHA1): 81:FC:71:10:AE:A2:14:72:C5:DD:75:CB:A2:E3:20:21:96:0F:4B:C0 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8862: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173688 (0x1957a2b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 18:34:29 2016 Not After : Sun Apr 25 18:34:29 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:b6:1f:01:1d:ab:ec:ca:13:b7:ca:64:11:52:4c:ac: ad:71:d7:13:24:ed:b9:35:51:8b:e0:1f:9f:d9:c1:64: f6:3e:e8:86:9d:b8:9c:b5:b0:22:a2:ab:a9:51:f6:75: 8d:64:e4:3a:8e:52:c3:81:80:ef:6c:f3:b3:3e:46:6c: b7:3f:96:77:d2:bd:68:56:82:fe:37:a3:a1:82:6e:46: 66:fc:bd:b0:63:11:7b:8a:b5:1e:1b:6d:c3:ef:0f:70: c5:0a:ac:61:11:90:01:55:7c:51:a4:af:6b:a5:6c:2f: 5c:9d:cf:d3:f3:71:d2:0f:0b:19:e9:2e:4f:97:38:73: ad:33:14:6d:31:0c:9e:40:dc:4b:3e:02:0c:0f:ed:3d: 49:e8:5f:57:0d:52:be:cb:42:3b:11:18:74:3c:26:64: 07:48:67:86:15:59:78:84:93:df:0f:ce:2d:9a:87:34: 8b:2f:d0:64:f8:ca:20:53:e7:06:35:1d:6a:8e:c9:3d: 75:14:5e:e7:82:2e:88:e1:6b:0a:da:0e:13:8f:6b:7b: d4:7e:69:05:b8:c1:df:70:30:18:f1:f3:18:36:34:1d: 6a:cc:36:d1:d4:1b:e0:84:98:b9:02:80:22:7b:c8:40: 08:3e:15:7b:83:cd:6b:af:8d:f8:00:a0:14:f2:f7:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:c3:12:e9:70:41:83:aa:da:d5:4a:78:07:12:88:2e: ed:b3:3f:f2:2c:f4:bc:f1:70:1a:bc:bb:1b:b6:46:2c: 45:90:3a:be:80:d7:8a:b4:42:4d:2b:83:9e:63:b3:33: cf:03:ea:84:4a:0f:95:75:ff:50:24:69:78:42:f0:93: 06:66:15:e9:80:b9:af:9e:c1:ff:04:65:33:1c:d5:bd: e7:c3:cf:0f:e3:f5:25:ed:0c:e0:bc:63:0f:c4:cc:31: 4c:aa:93:a3:2d:4a:4f:ae:24:ed:ff:9f:ea:b8:c2:53: 80:1d:1a:a3:fe:a7:67:9e:ef:37:0b:39:a7:89:c5:17: 6f:f5:53:8f:25:d7:52:c4:fd:fe:d3:89:55:d2:a6:e6: 90:6a:64:0d:47:57:e8:bc:30:b1:9e:aa:8f:da:02:34: 81:3c:eb:7f:f4:d9:6e:7a:10:43:1d:fe:cf:6a:54:60: 9a:1e:df:6a:30:b4:09:93:11:aa:d1:18:38:32:a1:04: 11:34:48:54:1f:ad:ad:07:73:ec:03:aa:d2:29:c3:c5: 15:b3:96:4a:14:af:2b:73:b9:d5:c8:52:e4:a1:81:3b: 72:71:66:12:46:34:b8:a4:95:b6:a7:27:0c:49:41:44: 25:dc:5b:9d:cf:7d:bb:17:bf:86:9c:9d:2b:be:75:d7 Fingerprint (SHA-256): 6A:57:B3:EC:B2:BB:ED:86:84:99:D5:E1:E7:B9:3D:70:92:57:49:56:03:46:ED:43:65:2D:A0:45:30:04:22:24 Fingerprint (SHA1): F7:66:03:FF:70:98:4A:57:30:A7:37:1F:53:ED:16:62:35:81:96:6C Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #8863: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173684 (0x1957a2b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 18:33:40 2016 Not After : Sun Apr 25 18:33:40 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:50:86:91:31:78:50:f3:63:7e:0b:7b:67:d9:10:f5: f1:9e:5c:5b:6b:14:b0:37:58:e7:3f:88:56:8d:d2:8c: 31:d7:3f:02:a4:8c:6a:fd:72:91:b8:31:0e:ee:73:eb: 64:4e:85:d9:53:a6:8a:87:34:1a:f6:3f:fa:96:83:eb: 43:c2:d5:68:8a:d7:10:cf:7f:87:dc:b7:59:d2:11:65: 4c:00:6b:de:d0:c9:bf:79:67:38:b0:15:e4:36:26:3d: de:bd:d2:08:86:f6:75:bf:72:b0:31:b4:45:52:62:66: a1:e8:86:77:c9:d1:2f:89:5b:19:c1:f8:f5:34:5c:0e: b9:24:51:b3:49:37:b3:13:f5:03:86:05:ed:ea:80:1e: ee:be:b1:d3:af:e8:d3:da:6c:5b:70:c0:41:ca:25:1d: 9f:04:20:83:d8:5d:07:21:b1:11:af:9d:8c:03:d4:1f: 1e:90:52:76:dd:63:a8:8c:37:66:0b:3f:89:1d:b7:39: 58:bd:bb:81:ab:f3:98:b5:06:6e:ae:0a:e3:a1:ba:83: 44:25:ad:7c:d0:af:d5:40:40:8e:01:51:f0:62:07:d8: c5:c3:43:26:e6:16:d2:d4:ea:1c:68:5e:ec:4f:52:d6: 70:77:68:5e:17:a7:d9:26:0d:38:2f:f2:ed:e6:2f:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:b6:02:87:72:40:54:f9:b0:ee:8c:29:b7:04:25:a4: 9c:a4:62:87:fe:8f:5c:43:25:07:69:dc:73:ba:ff:6c: 2b:5f:e8:1d:1c:cd:27:2f:3c:d0:88:9f:06:72:20:b3: 67:a9:50:19:66:2a:9b:1c:4c:d5:9a:ad:92:e7:5a:d6: 5d:28:cf:03:46:c9:0a:5c:dd:2f:17:f6:ac:0f:27:c7: 2e:ef:97:e8:a6:f3:8e:ee:32:a6:b9:a2:a2:36:02:9e: 7a:91:63:67:e7:70:a5:3c:50:4a:5c:7a:7e:12:b2:44: 18:ea:f9:5c:85:a9:f3:73:08:42:d5:8b:d6:16:03:3a: 58:b3:18:84:e3:e5:12:fe:f7:6b:81:47:54:71:49:f1: df:41:b4:10:60:25:6e:df:ad:ee:cb:16:8b:58:c4:e6: 62:06:cd:e4:7f:4a:3e:2c:d8:17:12:f1:56:e0:fb:90: a7:0b:aa:f9:4b:23:96:3d:40:a3:fb:d2:a7:e2:0d:6e: fb:29:1c:ff:4a:17:53:c4:20:53:ee:76:78:7d:b8:ea: de:0e:5c:7e:15:93:20:6b:2d:e0:27:86:d8:a6:9b:07: 40:08:5d:29:37:27:a4:80:26:7d:c9:02:fe:02:e4:89: c6:b3:67:9f:1d:26:e4:fa:be:70:95:b9:86:ec:1d:09 Fingerprint (SHA-256): 52:5F:D6:82:FE:23:A5:C5:0D:8E:B5:57:57:F8:63:F4:3C:66:5A:BB:1A:ED:B1:99:DF:EC:D1:CB:96:26:43:7D Fingerprint (SHA1): 81:FC:71:10:AE:A2:14:72:C5:DD:75:CB:A2:E3:20:21:96:0F:4B:C0 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #8864: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #8865: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #8866: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #8867: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #8868: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #8869: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425173689 (0x1957a2b9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 18:34:37 2016 Not After : Sun Apr 25 18:34:37 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:17:bb:73:87:c9:0d:4e:e5:9d:65:5f:4a:f9:c9:fb: 39:7d:ce:75:2a:4f:76:bd:dd:5c:0d:51:40:00:11:19: dc:44:9c:53:0d:9f:24:1c:1e:b6:9f:a7:c3:9c:7f:77: bc:39:32:5a:37:dc:fa:d1:e9:a4:6c:41:4c:88:44:a6: bc:35:f0:ed:1e:c5:60:24:1e:19:36:92:67:5c:ba:b5: fe:7b:10:aa:44:7d:71:0e:26:d1:09:ce:20:0c:48:0f: 84:86:69:41:a1:38:36:d7:dc:39:7f:2d:ee:d6:9c:12: 27:fc:b5:bc:c0:50:31:93:3a:fa:10:e6:b4:e3:30:a7: ad:9a:8f:c5:6d:8c:18:6f:37:91:82:b4:f8:6c:ba:07: d0:b6:87:d5:a5:72:5c:20:e4:42:e3:a2:b1:78:8a:96: a3:0a:4a:32:c1:9a:08:bb:c2:dd:14:1f:c4:c9:2d:55: 86:30:86:2a:28:ed:2d:a3:9f:65:c2:b2:ad:cf:4e:fb: 42:ef:29:c7:bb:d9:ef:34:ea:95:99:ef:1e:48:cf:d4: 62:5a:d7:b1:d2:5a:4c:7c:85:34:95:6f:9f:c6:02:84: b2:95:2f:46:41:40:1b:72:eb:04:df:62:3a:07:59:b1: 98:4e:f9:f6:f2:89:2a:52:cc:2c:e6:ac:f9:ac:cf:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:b8:f4:2f:38:e3:a8:71:bb:20:ef:d6:30:da:56:e4: db:ec:49:f4:6e:77:9e:d1:35:dc:ca:6a:ad:e4:cd:05: bf:a4:34:20:5d:c9:a3:c1:d8:ac:3a:04:ec:36:60:d8: 4f:ba:5b:f8:0e:fd:68:4f:30:bd:59:67:ec:6f:ea:63: 19:ca:6b:21:fd:69:d0:47:9d:10:6e:ec:08:f3:9a:90: 4f:ce:b0:4f:6d:3f:8d:ce:36:99:8e:1e:aa:21:d2:4b: a1:15:2d:68:9a:48:ee:35:76:9e:10:a9:5b:a6:9f:42: 87:4c:ab:08:71:0f:b7:fb:85:8d:fe:02:d9:fc:0b:3b: d1:eb:44:40:b0:86:c3:7a:0e:d6:a1:ad:59:9f:f1:54: ca:3a:f2:29:a5:6f:bf:72:80:ab:4f:5e:74:9e:11:e1: e8:c4:27:2d:bf:8a:ba:22:b2:28:a2:c0:1b:39:b6:15: 2b:24:3a:77:9a:a1:02:02:98:7d:62:a8:24:05:a5:a2: c7:78:1d:5e:7c:8a:df:89:ba:91:6f:c4:d3:75:65:b1: d2:1b:0e:6e:df:71:a8:a9:46:9c:ff:8e:b7:ea:cd:a6: 96:2f:45:8c:2e:b9:49:f5:11:37:c6:64:e7:04:96:92: 1c:e9:97:b1:55:84:24:91:16:3f:1a:21:5f:40:4e:55 Fingerprint (SHA-256): 54:E1:E6:F1:15:53:B3:AE:19:E4:D2:66:D8:CF:4C:00:A8:02:BA:23:43:05:AE:88:8A:7B:09:11:05:E1:FA:21 Fingerprint (SHA1): 86:E5:7B:CA:6A:21:57:03:41:AC:F0:7F:F1:EC:E3:72:F5:32:6D:0C Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #8870: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #8871: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #8872: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #8873: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #8874: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8875: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8876: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #8877: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8878: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8879: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #8880: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8881: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8882: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8883: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8884: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #8885: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8886: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8174: security library: bad database. Returned value is 1, expected result is fail chains.sh: #8887: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8888: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #8889: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8890: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #8891: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #8892: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #8893: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 2923 at Mon Apr 25 18:35:14 UTC 2016 kill -USR1 2923 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 2923 killed at Mon Apr 25 18:35:14 UTC 2016 TIMESTAMP chains END: Mon Apr 25 18:35:14 UTC 2016 chains.sh: Testing with upgraded library =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/cert.done': No such file or directory Checking if dbupgrade should be skipped based on skip list [] Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Mon Apr 25 18:35:15 UTC 2016 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": SEC_ERROR_BAD_DATABASE: security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #8894: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #8895: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #8896: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #8897: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #8898: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #8899: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #8900: Upgrading dave - PASSED eccurves upgrading db eccurves Generating key. This may take a few moments... dbupgrade.sh: #8901: Upgrading eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #8902: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #8903: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #8904: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #8905: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #8906: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #8907: Upgrading serverCA - PASSED ssl_gtests skipping db ssl_gtests dbupgrade.sh: #8908: No directory ssl_gtests - PASSED stapling upgrading db stapling Generating key. This may take a few moments... dbupgrade.sh: #8909: Upgrading stapling - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #8910: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. dbupgrade.sh: #8911: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Mon Apr 25 18:35:56 UTC 2016 Checking if libpkix should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Checking if cert should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Checking if dbtests should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Checking if tools should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Running tests for tools TIMESTAMP tools BEGIN: Mon Apr 25 18:35:56 UTC 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8912: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f0:00:a6:c3:ac:13:5b:3d:bf:77:c9:16:fb:60:be:16 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8913: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8914: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8915: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8916: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 36:a7:5a:74:e1:59:10:54:1c:a6:31:c5:9e:71:44:fd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Apr 25 13:44:19 2016 Not After : Sun Apr 25 13:44:19 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:e8:ec:2b:b3:36:79:06:33:9c:29:52:ff:bd:95: f9:b3:c6:b3:4e:0b:3d:51:62:fc:16:70:ca:57:00:e4: 96:8a:b1:67:01:7b:46:33:b4:45:8e:87:84:40:19:fe: 0d:6b:54:d9:83:c5:23:7d:77:08:30:22:97:c7:7a:2e: a3:cf:f5:01:6c:74:be:94:78:2b:91:a9:c2:02:7e:3c: a8:88:47:dc:5a:90:db:36:c8:00:df:bc:ae:fa:f5:5b: 57:9e:b2:5e:6b:fc:e1:af:57:55:e6:8d:41:b8:17:f2: 6d:b2:49:fd:d4:66:ff:d2:ac:31:d2:5b:e9:01:2f:ee: 53:4a:09:c3:ff Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:08:a2:fa:c6:f2:63:ea:ae:f0:4d: c2:d7:02:dc:d9:1b:01:9e:9d:e5:87:24:18:5e:00:80: 63:33:7f:40:5f:16:d1:ff:82:7a:c9:5b:dc:f5:ed:06: 78:53:c7:81:ee:87:cc:ac:ff:02:49:c6:a7:4a:22:83: b0:39:3c:e1:18:d0:9d:02:42:00:c0:64:9e:3d:74:7c: 48:14:39:14:d8:8e:78:5f:66:78:a3:d5:85:23:7d:a5: 19:b6:e7:44:aa:5d:26:7d:24:47:40:94:56:b1:02:d5: 12:2d:fe:21:c0:a9:e4:da:46:a9:ad:93:af:03:2d:cb: 87:59:68:df:78:d0:29:76:7b:a8:e2 Fingerprint (SHA-256): 95:A7:9D:E8:E9:DA:8A:CE:04:80:FD:A2:D6:51:B6:00:36:2B:54:E6:89:13:3C:BE:C7:F7:1B:61:6D:C3:83:98 Fingerprint (SHA1): 08:C8:CA:B2:E0:7B:90:9E:84:4E:37:1A:50:E2:F9:1A:01:F2:A8:29 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Apr 25 13:47:06 2016 Not After : Sun Apr 25 13:47:06 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:13:c6:d1:15:32:72:e7:50:26:d4:c8:d5:17:88:22: d0:a7:29:0b:75:2b:99:34:37:7a:84:85:11:76:8d:28: ee:75:41:23:a7:8d:9e:dc:8a:aa:a9:4b:55:4a:2e:60: 4b:ba:fa:93:84:9e:a3:9d:08:62:77:8e:3c:97:76:e4: 3e:24:f6:00:2f:31:fb:3a:37:87:37:c6:3e:91:a3:a1: 7c:2e:11:11:ae:8a:44:f9:0e:c7:cb:16:39:a1:a6:b4: 4c Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:e8:a8:37:2e:15:b9:31:4d:16:d4: 0e:66:78:91:4b:3c:05:be:3e:35:86:76:81:85:24:ea: 77:27:3f:df:90:f9:ee:10:f3:de:3d:af:bf:03:f2:bf: d2:46:ec:e4:3a:46:9c:f3:68:10:50:e2:74:95:c8:d7: 52:ef:6b:72:18:66:ea:02:42:00:c3:92:de:aa:5b:e1: 5e:4b:c0:9d:8f:48:0c:f4:51:5d:cf:2c:8f:29:c0:e9: f7:27:da:b2:7c:83:65:05:41:5c:c2:34:65:52:ce:0d: f8:8e:f7:27:5c:54:ab:3c:c0:c7:ff:c4:4e:92:3e:90: d2:d6:d7:a5:b6:55:91:57:ec:69:48 Fingerprint (SHA-256): B9:0A:9A:63:BC:25:08:91:31:F0:6F:3F:34:27:00:4A:86:A1:E9:E1:15:AC:55:B4:5C:88:47:94:C4:F6:EA:C6 Fingerprint (SHA1): EF:15:F7:0B:92:77:99:A8:F9:7B:FC:59:87:3D:F8:02:6C:15:FA:0C Friendly Name: Alice-ec tools.sh: #8917: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8918: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e7:2a:e0:d1:71:8b:38:1c:24:38:92:99:75:84:cf:93 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8919: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8920: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8921: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7a:45:a7:ce:22:43:b5:7b:73:7d:c5:c2:4f:f8:71:98 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8922: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8923: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8924: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9a:f1:3a:69:28:36:3b:6c:c7:51:a7:c0:29:9f:82:9a Iteration Count: 2000 (0x7d0) tools.sh: #8925: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8926: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8927: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 89:73:59:15:08:c9:d3:c1:17:a1:af:d3:fb:31:d2:fc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8928: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8929: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8930: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:13:a6:5a:f3:15:e9:35:3d:35:d0:d7:25:88:44:2a Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8931: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8932: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8933: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:98:57:9a:7a:01:7e:9c:24:7a:6e:6c:d3:ba:51:ac Iteration Count: 2000 (0x7d0) tools.sh: #8934: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8935: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8936: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fe:b0:51:cb:5d:15:e3:4e:a6:66:19:23:4b:fa:6b:5e Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:2c:62:08:62:d5:56:f1:0a:2c:9b:88:91:ee:00: 29:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8937: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8938: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8939: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:50:06:4f:c8:20:62:f5:3d:bb:fe:81:7b:19:81:3a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:4f:8f:94:fd:bf:3c:08:13:f3:07:3e:9d:d2:ed: b9:57 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8940: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8941: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8942: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ea:dd:46:46:b9:30:32:36:dc:fd:82:cf:84:a6:98:73 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:c1:d2:e9:f2:c0:74:0f:ce:1d:27:b4:d3:39:2b: 9f:24 tools.sh: #8943: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8944: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8945: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6a:c8:be:de:29:ba:db:12:a3:52:2d:a6:df:89:dc:01 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:4c:27:a1:54:df:2b:26:59:79:4e:db:19:6b:75: 29:b8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8946: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8947: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8948: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c5:08:d5:4f:a8:d1:60:35:ad:55:c9:ef:9d:b3:e8:6b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:8e:66:e3:7b:02:77:37:ed:19:5e:9d:48:90:fe: 6c:95 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8949: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8950: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8951: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 97:b2:15:5a:95:c3:7c:8c:1e:4e:ac:58:84:d7:f8:1c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:e8:33:fc:20:d9:e5:42:9f:5e:b0:c1:a4:61:60: 21:9d tools.sh: #8952: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8953: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8954: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ec:e7:f7:f5:57:af:b4:16:32:3f:b8:65:27:ca:fd:27 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c4:65:53:be:f9:bb:18:18:57:a4:a8:ea:2b:47: 01:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8955: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8956: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8957: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 24:a8:46:0e:b1:6f:c6:5a:fb:45:df:80:79:84:bc:e8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:22:2c:65:0c:4d:55:00:c0:09:f1:fc:bd:62:34: b5:1a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8958: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8959: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8960: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:3b:67:94:b7:a5:b9:e6:42:40:c9:3b:d9:27:9e:df Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:59:a0:8e:bd:6b:b5:65:f4:bf:7b:e3:82:1b:98: da:ad tools.sh: #8961: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8962: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8963: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6b:9e:a5:a8:47:71:93:3f:2c:66:4c:f9:6a:e2:55:4b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:fb:53:85:62:10:4e:2f:b3:e2:38:38:b2:7e:4a: 93:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8964: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8965: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8966: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7f:1d:22:5c:30:04:68:d2:0d:e8:6c:8a:c7:ba:05:c2 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:f7:29:15:f4:9b:e3:17:b1:8c:cb:52:0a:dd:d4: a0:25 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8967: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8968: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8969: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 03:9d:8f:d4:44:06:a0:80:34:4f:60:59:10:0e:b9:3c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:91:22:e3:58:d6:1e:66:c2:36:b5:a4:56:c0:cd: bb:60 tools.sh: #8970: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8971: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8972: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1b:5f:6e:f4:e1:a6:33:26:d6:a4:62:d4:61:e3:d6:56 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:1e:6e:e7:ef:8d:bc:cb:20:de:da:f6:b6:85:cd: b3:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8973: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8974: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8975: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 08:31:5d:6f:87:2f:51:9c:d0:35:08:d3:cd:42:cd:08 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:f3:3c:c9:88:bd:38:1b:60:89:5a:ce:4f:90:bd: af:ef Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8976: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8977: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8978: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fd:64:09:2b:c2:2c:d0:86:36:ba:5a:2f:22:d7:75:20 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:91:fe:ef:a0:18:a1:1a:8f:21:cb:8e:8b:24:74: b9:a3 tools.sh: #8979: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8980: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8981: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2e:d6:74:25:d7:e8:7e:df:38:f6:7f:36:4e:b6:fb:33 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:d8:d5:16:4d:30:19:42:7b:38:5a:9f:63:06:1f: 8b:c4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8982: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8983: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8984: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:bb:bd:8b:6a:1e:a2:2a:e8:e9:52:67:de:2e:c5:2c Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:b7:72:de:b7:4a:f6:e2:63:17:2a:88:be:44:ae: 65:08 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8985: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8986: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8987: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 29:c3:76:fe:ea:dc:03:68:fb:4c:c2:df:86:1c:1f:ae Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:d1:18:53:ce:2b:c7:33:12:38:67:1e:95:66:71: 47:d6 tools.sh: #8988: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8989: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8990: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 9b:0c:d9:ea:fc:39:49:8d:0a:2b:94:8a:3a:e7:76:d2 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8991: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8992: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8993: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 13:f8:c2:47:93:c0:f4:39:8c:07:70:ef:51:3a:a3:e6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8994: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8995: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8996: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b1:44:f0:f6:5d:58:77:ed:29:3a:4d:e4:1e:f7:a7:ee Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #8997: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #8998: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #8999: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 68:db:58:17:ee:a2:de:c7:34:20:9e:56:da:2a:4f:a8 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9000: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9001: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9002: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 85:4e:c1:ed:8c:27:12:c1:ae:e9:b5:60:c9:03:13:15 Iteration Count: 2000 (0x7d0) tools.sh: #9003: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9004: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9005: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: f1:72:ea:de:18:0d:9e:58:49:be:a8:1a:8c:27:be:48 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9006: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9007: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9008: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e0:6a:0b:b0:df:1d:d7:8a:99:14:d5:ba:a4:24:5c:43 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9009: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9010: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9011: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 4e:0b:7f:03:0f:a8:bf:30:dd:e0:52:e6:9a:72:10:78 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9012: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9013: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9014: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: da:b3:96:96:cd:88:7d:ee:78:45:2a:6f:d0:47:d4:6f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9015: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9016: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9017: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e5:a5:e8:66:d3:d4:44:cc:4c:9d:8e:ee:db:42:4c:08 Iteration Count: 2000 (0x7d0) tools.sh: #9018: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9019: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9020: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9a:3d:bc:18:f2:45:3b:6a:b0:91:a1:bb:c5:5a:64:98 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9021: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9022: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9023: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7d:c1:d1:09:d6:2c:3a:cf:ba:a9:a5:1b:ab:5d:97:87 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9024: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9025: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9026: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fa:b0:e9:35:8a:2b:a6:4d:40:c5:02:af:03:ac:41:c5 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9027: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9028: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9029: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 13:da:27:d9:8c:6c:82:06:5e:60:86:31:21:f4:db:43 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9030: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9031: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9032: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 96:d5:9c:18:f7:32:25:76:01:b6:71:c5:60:dd:4d:76 Iteration Count: 2000 (0x7d0) tools.sh: #9033: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9034: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9035: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 47:7a:27:0d:ec:ca:8b:36:49:8d:ba:f4:f8:95:e7:0f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9036: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9037: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9038: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 17:25:cd:c4:a1:80:79:a6:4a:a6:0b:ee:af:ea:4a:cb Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9039: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9040: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9041: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e2:5b:6c:8c:1e:9a:b7:e4:3a:51:b5:34:a4:07:a1:1e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9042: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9043: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9044: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 50:04:6e:99:69:cc:66:fd:af:4a:70:95:35:52:b2:39 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9045: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9046: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9047: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 52:b2:9c:c6:aa:ce:19:87:d0:30:05:ec:2e:cd:1a:56 Iteration Count: 2000 (0x7d0) tools.sh: #9048: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9049: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9050: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:d7:d1:95:2f:30:5c:cb:20:c0:3d:70:29:92:46:3d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9051: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9052: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9053: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:3c:b9:fd:91:22:d6:7e:13:ff:0f:11:4e:ac:77:19 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9054: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9055: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9056: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:ea:e5:2c:66:28:3e:63:87:4c:c6:6c:15:f9:ac:3e Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9057: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9058: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9059: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 58:d2:f3:b3:f3:d4:df:25:fa:d4:cf:5c:03:0d:93:21 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9060: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9061: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9062: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:27:7f:b6:55:b4:bd:19:c1:54:6c:0d:4d:75:b9:92 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9063: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9064: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9065: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 03:73:5f:69:f1:88:72:6d:de:01:a3:a7:b8:56:10:b5 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9066: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9067: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9068: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:18:be:d1:43:64:7a:73:ff:f6:ba:19:ba:ef:46:b1 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9069: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9070: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9071: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f7:49:ec:94:d5:af:46:35:69:61:51:84:86:4a:02:24 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9072: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9073: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9074: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3a:9d:f7:a9:a1:06:03:bb:16:72:ed:88:3b:61:12:4d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9075: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9076: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9077: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:c9:fc:80:3f:ca:dd:e8:ab:5e:5e:52:d4:55:63:64 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:42:27 2016 Not After : Sun Apr 25 13:42:27 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:30:37:aa:5c:5a:0e:c5:6d:8b:61:31:84:2f:f7:27: cd:f5:01:27:7e:83:46:a5:0b:7d:a0:e8:60:3f:d1:fd: bc:63:f7:90:96:1d:07:9b:e8:a7:f2:b2:79:87:05:45: 14:03:37:4f:aa:32:33:23:f3:bc:a6:74:31:08:d1:16: a7:85:b4:43:b9:42:95:c0:3b:9f:2e:16:4c:9e:c0:f1: 25:bb:18:c2:ec:f9:b8:1b:9b:42:e2:3d:dd:56:2f:ae: 7f:58:71:1c:25:ff:45:54:8d:e1:38:6f:c2:b1:30:66: 92:74:ba:f4:13:de:6c:91:19:f0:44:79:0a:47:ad:a9: 0e:9a:3b:7a:77:b8:10:5a:24:92:ee:04:14:58:7d:60: 47:e7:86:5d:1f:ca:ac:72:0a:b8:e2:27:f6:b7:ba:56: ef:c0:d0:de:64:1a:cb:ad:fa:5d:e7:5a:a6:7c:5b:e6: 11:62:42:9c:a9:90:87:e7:bf:1a:d7:60:78:88:81:eb: 05:04:31:ca:1e:27:f3:f2:fc:23:b1:00:a7:8d:60:f1: 7e:22:03:d8:76:84:0b:6e:1d:2c:53:ef:92:a2:24:09: 75:74:9c:5c:a0:65:d2:51:5d:5d:3b:b4:18:41:87:b9: 31:f5:85:cc:ca:5a:ba:c3:89:c2:26:0b:b0:e9:ae:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:6d:53:a3:c9:76:52:99:b8:99:8d:d8:fc:f3:17:4f: 22:c1:e3:30:20:cf:81:dc:65:ba:ac:0e:c8:e7:44:98: be:0e:63:59:26:9b:a8:a6:ae:9a:4c:69:1a:7e:f3:f9: 16:88:3f:b3:18:b2:30:5c:c1:d4:de:4f:de:b6:74:2e: 24:a8:5f:85:46:5d:09:b5:2f:bf:7b:8f:2c:4d:97:12: d8:bf:99:80:79:aa:37:40:1e:e8:4a:6c:69:db:3d:33: bd:63:5f:57:7e:50:47:6e:45:89:b3:59:23:ab:7a:f0: c5:95:af:07:d9:74:a4:5e:42:de:f9:3d:82:1c:85:d1: 43:d3:a3:66:2f:8f:ec:ba:cd:c7:b8:73:5a:98:ad:e3: 71:d7:6c:17:f5:0d:e0:5a:de:87:f7:9e:ed:8c:1d:2b: 67:b4:eb:81:d8:32:ed:e4:d5:4b:c8:a2:86:b2:f2:54: 8d:b9:24:61:5d:d8:52:60:0a:7c:e3:68:8a:64:48:a3: f7:3b:a6:aa:3e:22:9d:63:72:8f:9e:fe:51:b4:93:85: ca:07:5b:2f:b5:b3:75:67:11:1e:0a:55:16:f8:d5:8b: b2:da:af:77:ff:c3:b2:11:04:07:5f:ec:dc:55:b8:df: eb:e9:9b:a8:85:75:ae:e4:19:21:c0:00:b2:de:63:7f Fingerprint (SHA-256): 89:85:3C:32:0B:B7:B4:A1:CD:A9:68:B0:70:00:F9:85:40:7D:A6:A2:28:23:0A:AD:97:DE:2D:08:53:9D:A3:CF Fingerprint (SHA1): 7C:B4:C7:5F:3E:EB:A1:46:F2:14:19:68:64:24:B0:E0:27:AA:A7:9B Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:47:01 2016 Not After : Sun Apr 25 13:47:01 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:be:17:2f:77:61:0d:36:9b:cb:40:7a:a1:2e:5d:fa: df:f7:b1:42:24:e7:57:b0:4f:3f:b9:ce:dd:ec:92:85: 07:62:0e:aa:5c:e2:a2:70:9f:52:51:f8:99:7c:94:13: 8c:99:86:40:f9:57:42:fc:ca:aa:9a:fb:d9:77:50:95: bd:9d:3b:e3:b6:1e:64:4e:7c:69:d3:4b:ff:d4:f8:bb: d8:ad:2d:ca:dd:03:e6:c0:b8:ca:fe:44:9c:88:d2:a8: 05:95:96:77:d5:fe:dc:fe:88:58:be:c8:07:80:be:9d: 94:59:07:87:09:0f:6d:46:51:f1:1f:0e:b9:46:f5:f8: 23:91:da:ab:bb:16:38:28:3e:41:04:55:ed:1d:a1:89: b1:6b:92:3d:b3:47:1c:e7:97:b0:59:8d:76:50:e0:32: da:ca:3b:16:e3:b3:0d:29:f1:af:37:48:0b:20:78:fe: c1:08:b0:31:52:59:45:b6:97:00:bb:5c:a0:71:e8:9e: fa:ee:79:75:76:b0:64:f8:4a:05:33:e2:d6:b7:49:4c: e1:b4:9c:f1:8b:ff:8f:49:80:40:87:37:69:51:ef:05: 10:5d:9b:e5:b6:2a:c0:62:50:c2:2c:3a:3d:30:a8:a0: c6:5d:da:50:96:4b:be:89:80:72:8b:b3:f7:f7:23:29 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:31:5c:d7:aa:4e:9b:8c:96:c1:3d:d1:1a:81:e3:89: ef:e5:db:5e:a3:a4:4a:bf:0b:0a:bf:f6:85:eb:a9:8e: af:b6:1e:16:fc:99:d7:94:36:4b:8f:05:37:3b:79:38: 97:fa:02:51:42:57:5a:5d:88:f3:0a:a0:ab:01:5a:2a: 3c:8a:f5:7d:b7:b4:7c:e4:91:9b:4d:94:61:c7:4b:5b: 12:38:eb:4d:f8:0e:50:83:2c:e7:07:87:b3:1f:77:35: e6:e3:f1:b5:f1:80:01:e5:f5:21:ac:0c:a8:57:ed:0e: 78:a6:53:54:c8:93:91:d8:c7:43:95:05:10:5f:a1:05: 7f:94:18:ca:98:67:45:fb:32:d8:b1:c0:94:91:20:fd: cf:c5:bb:1d:20:5c:8f:5e:ee:b5:01:0c:4e:a4:24:8e: 40:20:24:d0:2d:bd:e4:db:d3:40:9d:16:f7:59:85:11: 63:34:1c:1a:b5:1f:55:82:f8:45:1a:ed:30:64:8e:7d: d7:b7:e2:64:23:b9:2b:54:2d:db:b4:1b:53:38:7f:50: aa:9c:3e:8b:eb:56:c5:3d:e3:26:0f:35:71:67:75:d6: 72:dd:71:a7:0e:98:63:60:a4:56:7d:77:cb:c6:fc:b4: 7e:90:31:f0:4b:33:c9:bb:75:91:41:e6:f3:94:42:be Fingerprint (SHA-256): F6:9B:4D:07:A9:B2:E2:93:64:C9:76:85:5F:9F:51:E9:49:A9:84:1C:D0:39:69:2A:A8:97:6C:CA:89:35:F1:A9 Fingerprint (SHA1): 75:35:8B:8A:37:00:52:DB:D8:E1:82:80:36:58:0A:7B:55:A7:CB:1E Friendly Name: Alice tools.sh: #9078: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #9079: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #9080: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9081: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #9082: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #9083: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #9084: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #9085: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #9086: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #9087: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #9088: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Apr 25 18:37:55 UTC 2016 Checking if fips should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Running tests for fips TIMESTAMP fips BEGIN: Mon Apr 25 18:37:55 UTC 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #9089: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #9090: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 0c398fa944265856994d4d6f8ab5302c6c7ec29d FIPS_PUB_140_Test_Certificate fips.sh: #9091: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #9092: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #9093: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #9094: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #9095: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #9096: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9097: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #9098: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #9099: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #9100: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #9101: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 0c398fa944265856994d4d6f8ab5302c6c7ec29d FIPS_PUB_140_Test_Certificate fips.sh: #9102: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #9103: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #9104: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #9105: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #9106: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 0c398fa944265856994d4d6f8ab5302c6c7ec29d FIPS_PUB_140_Test_Certificate fips.sh: #9107: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #9108: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #9109: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory '/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x00032fe4 (208868): from 21 (33) to 01 (1) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #9110: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Apr 25 18:38:55 UTC 2016 Checking if sdr should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Checking if crmf should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Running tests for crmf TIMESTAMP crmf BEGIN: Mon Apr 25 18:38:55 UTC 2016 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #9111: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #9112: CMMF test . - PASSED TIMESTAMP crmf END: Mon Apr 25 18:38:56 UTC 2016 Checking if smime should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Running tests for smime TIMESTAMP smime BEGIN: Mon Apr 25 18:38:56 UTC 2016 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #9113: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9114: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #9115: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #9116: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #9117: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #9118: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9119: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #9120: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #9121: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #9122: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #9123: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9124: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #9125: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #9126: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #9127: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #9128: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9129: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #9130: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #9131: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #9132: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #9133: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9134: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #9135: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #9136: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #9137: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #9138: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9139: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #9140: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #9141: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #9142: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #9143: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9144: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #9145: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #9146: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #9147: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #9148: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #9149: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #9150: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #9151: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #9152: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #9153: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #9154: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #9155: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #9156: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #9157: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #9158: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #9159: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #9160: Decrypt with a Multiple Email cert . - PASSED smime.sh: #9161: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #9162: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #9163: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #9164: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #9165: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #9166: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #9167: Decode Encrypted-Data . - PASSED smime.sh: #9168: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #9169: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #9170: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #9171: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #9172: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #9173: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Apr 25 18:39:29 UTC 2016 Checking if ssl should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Running tests for ssl TIMESTAMP ssl BEGIN: Mon Apr 25 18:39:29 UTC 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:39:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21864 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21864 found at Mon Apr 25 18:39:29 UTC 2016 selfserv_9709 with PID 21864 started at Mon Apr 25 18:39:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9174: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21864 at Mon Apr 25 18:39:31 UTC 2016 kill -USR1 21864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21864 killed at Mon Apr 25 18:39:31 UTC 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:39:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21920 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21920 found at Mon Apr 25 18:39:32 UTC 2016 selfserv_9709 with PID 21920 started at Mon Apr 25 18:39:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9175: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21920 at Mon Apr 25 18:39:34 UTC 2016 kill -USR1 21920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21920 killed at Mon Apr 25 18:39:34 UTC 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:39:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21976 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21976 found at Mon Apr 25 18:39:34 UTC 2016 selfserv_9709 with PID 21976 started at Mon Apr 25 18:39:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9176: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21976 at Mon Apr 25 18:39:36 UTC 2016 kill -USR1 21976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21976 killed at Mon Apr 25 18:39:36 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:39:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22044 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22044 found at Mon Apr 25 18:39:37 UTC 2016 selfserv_9709 with PID 22044 started at Mon Apr 25 18:39:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9177: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22044 at Mon Apr 25 18:39:39 UTC 2016 kill -USR1 22044 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22044 killed at Mon Apr 25 18:39:39 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:39:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22103 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22103 found at Mon Apr 25 18:39:40 UTC 2016 selfserv_9709 with PID 22103 started at Mon Apr 25 18:39:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9178: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22103 at Mon Apr 25 18:39:41 UTC 2016 kill -USR1 22103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22103 killed at Mon Apr 25 18:39:42 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:39:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22159 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22159 found at Mon Apr 25 18:39:42 UTC 2016 selfserv_9709 with PID 22159 started at Mon Apr 25 18:39:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9179: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22159 at Mon Apr 25 18:39:44 UTC 2016 kill -USR1 22159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22159 killed at Mon Apr 25 18:39:44 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:39:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22227 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22227 found at Mon Apr 25 18:39:45 UTC 2016 selfserv_9709 with PID 22227 started at Mon Apr 25 18:39:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9180: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22227 at Mon Apr 25 18:39:46 UTC 2016 kill -USR1 22227 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22227 killed at Mon Apr 25 18:39:47 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:39:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22284 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22284 found at Mon Apr 25 18:39:47 UTC 2016 selfserv_9709 with PID 22284 started at Mon Apr 25 18:39:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9181: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22284 at Mon Apr 25 18:39:49 UTC 2016 kill -USR1 22284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22284 killed at Mon Apr 25 18:39:49 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:39:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22340 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22340 found at Mon Apr 25 18:39:50 UTC 2016 selfserv_9709 with PID 22340 started at Mon Apr 25 18:39:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9182: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22340 at Mon Apr 25 18:39:51 UTC 2016 kill -USR1 22340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22340 killed at Mon Apr 25 18:39:52 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:39:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22408 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22408 found at Mon Apr 25 18:39:52 UTC 2016 selfserv_9709 with PID 22408 started at Mon Apr 25 18:39:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9183: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22408 at Mon Apr 25 18:39:54 UTC 2016 kill -USR1 22408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22408 killed at Mon Apr 25 18:39:54 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:39:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22464 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22464 found at Mon Apr 25 18:39:55 UTC 2016 selfserv_9709 with PID 22464 started at Mon Apr 25 18:39:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9184: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22464 at Mon Apr 25 18:39:56 UTC 2016 kill -USR1 22464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22464 killed at Mon Apr 25 18:39:57 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:39:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22520 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22520 found at Mon Apr 25 18:39:57 UTC 2016 selfserv_9709 with PID 22520 started at Mon Apr 25 18:39:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9185: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22520 at Mon Apr 25 18:39:58 UTC 2016 kill -USR1 22520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22520 killed at Mon Apr 25 18:39:59 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:39:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:39:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22588 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22588 found at Mon Apr 25 18:39:59 UTC 2016 selfserv_9709 with PID 22588 started at Mon Apr 25 18:39:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9186: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22588 at Mon Apr 25 18:40:01 UTC 2016 kill -USR1 22588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22588 killed at Mon Apr 25 18:40:01 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:40:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22644 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22644 found at Mon Apr 25 18:40:02 UTC 2016 selfserv_9709 with PID 22644 started at Mon Apr 25 18:40:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9187: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22644 at Mon Apr 25 18:40:03 UTC 2016 kill -USR1 22644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22644 killed at Mon Apr 25 18:40:04 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:40:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22715 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22715 found at Mon Apr 25 18:40:04 UTC 2016 selfserv_9709 with PID 22715 started at Mon Apr 25 18:40:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9188: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22715 at Mon Apr 25 18:40:06 UTC 2016 kill -USR1 22715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22715 killed at Mon Apr 25 18:40:06 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22784 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22784 found at Mon Apr 25 18:40:07 UTC 2016 selfserv_9709 with PID 22784 started at Mon Apr 25 18:40:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9189: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22784 at Mon Apr 25 18:40:08 UTC 2016 kill -USR1 22784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22784 killed at Mon Apr 25 18:40:09 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22840 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22840 found at Mon Apr 25 18:40:09 UTC 2016 selfserv_9709 with PID 22840 started at Mon Apr 25 18:40:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9190: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22840 at Mon Apr 25 18:40:11 UTC 2016 kill -USR1 22840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22840 killed at Mon Apr 25 18:40:11 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22896 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22896 found at Mon Apr 25 18:40:12 UTC 2016 selfserv_9709 with PID 22896 started at Mon Apr 25 18:40:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9191: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 22896 at Mon Apr 25 18:40:13 UTC 2016 kill -USR1 22896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22896 killed at Mon Apr 25 18:40:14 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22964 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22964 found at Mon Apr 25 18:40:14 UTC 2016 selfserv_9709 with PID 22964 started at Mon Apr 25 18:40:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9192: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 22964 at Mon Apr 25 18:40:16 UTC 2016 kill -USR1 22964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22964 killed at Mon Apr 25 18:40:16 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23020 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23020 found at Mon Apr 25 18:40:16 UTC 2016 selfserv_9709 with PID 23020 started at Mon Apr 25 18:40:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9193: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23020 at Mon Apr 25 18:40:18 UTC 2016 kill -USR1 23020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23020 killed at Mon Apr 25 18:40:18 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23076 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23076 found at Mon Apr 25 18:40:19 UTC 2016 selfserv_9709 with PID 23076 started at Mon Apr 25 18:40:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9194: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23076 at Mon Apr 25 18:40:20 UTC 2016 kill -USR1 23076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23076 killed at Mon Apr 25 18:40:20 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:40:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23144 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23144 found at Mon Apr 25 18:40:21 UTC 2016 selfserv_9709 with PID 23144 started at Mon Apr 25 18:40:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9195: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23144 at Mon Apr 25 18:40:22 UTC 2016 kill -USR1 23144 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23144 killed at Mon Apr 25 18:40:23 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:40:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23200 found at Mon Apr 25 18:40:23 UTC 2016 selfserv_9709 with PID 23200 started at Mon Apr 25 18:40:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9196: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23200 at Mon Apr 25 18:40:25 UTC 2016 kill -USR1 23200 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23200 killed at Mon Apr 25 18:40:25 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:40:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23256 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23256 found at Mon Apr 25 18:40:26 UTC 2016 selfserv_9709 with PID 23256 started at Mon Apr 25 18:40:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9197: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23256 at Mon Apr 25 18:40:27 UTC 2016 kill -USR1 23256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23256 killed at Mon Apr 25 18:40:27 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23325 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23325 found at Mon Apr 25 18:40:28 UTC 2016 selfserv_9709 with PID 23325 started at Mon Apr 25 18:40:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9198: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23325 at Mon Apr 25 18:40:29 UTC 2016 kill -USR1 23325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23325 killed at Mon Apr 25 18:40:30 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23381 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23381 found at Mon Apr 25 18:40:30 UTC 2016 selfserv_9709 with PID 23381 started at Mon Apr 25 18:40:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9199: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23381 at Mon Apr 25 18:40:32 UTC 2016 kill -USR1 23381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23381 killed at Mon Apr 25 18:40:32 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23437 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23437 found at Mon Apr 25 18:40:32 UTC 2016 selfserv_9709 with PID 23437 started at Mon Apr 25 18:40:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9200: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23437 at Mon Apr 25 18:40:34 UTC 2016 kill -USR1 23437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23437 killed at Mon Apr 25 18:40:34 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23505 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23505 found at Mon Apr 25 18:40:35 UTC 2016 selfserv_9709 with PID 23505 started at Mon Apr 25 18:40:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9201: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23505 at Mon Apr 25 18:40:36 UTC 2016 kill -USR1 23505 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23505 killed at Mon Apr 25 18:40:37 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23561 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23561 found at Mon Apr 25 18:40:37 UTC 2016 selfserv_9709 with PID 23561 started at Mon Apr 25 18:40:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9202: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23561 at Mon Apr 25 18:40:39 UTC 2016 kill -USR1 23561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23561 killed at Mon Apr 25 18:40:39 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23620 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23620 found at Mon Apr 25 18:40:39 UTC 2016 selfserv_9709 with PID 23620 started at Mon Apr 25 18:40:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9203: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23620 at Mon Apr 25 18:40:41 UTC 2016 kill -USR1 23620 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23620 killed at Mon Apr 25 18:40:41 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:40:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23688 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23688 found at Mon Apr 25 18:40:42 UTC 2016 selfserv_9709 with PID 23688 started at Mon Apr 25 18:40:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9204: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23688 at Mon Apr 25 18:40:43 UTC 2016 kill -USR1 23688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23688 killed at Mon Apr 25 18:40:43 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:40:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23744 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23744 found at Mon Apr 25 18:40:44 UTC 2016 selfserv_9709 with PID 23744 started at Mon Apr 25 18:40:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9205: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23744 at Mon Apr 25 18:40:45 UTC 2016 kill -USR1 23744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23744 killed at Mon Apr 25 18:40:46 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:40:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23800 found at Mon Apr 25 18:40:46 UTC 2016 selfserv_9709 with PID 23800 started at Mon Apr 25 18:40:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9206: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23800 at Mon Apr 25 18:40:48 UTC 2016 kill -USR1 23800 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23800 killed at Mon Apr 25 18:40:48 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23869 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23869 found at Mon Apr 25 18:40:48 UTC 2016 selfserv_9709 with PID 23869 started at Mon Apr 25 18:40:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9207: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23869 at Mon Apr 25 18:40:50 UTC 2016 kill -USR1 23869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23869 killed at Mon Apr 25 18:40:50 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23925 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23925 found at Mon Apr 25 18:40:51 UTC 2016 selfserv_9709 with PID 23925 started at Mon Apr 25 18:40:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9208: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 23925 at Mon Apr 25 18:40:52 UTC 2016 kill -USR1 23925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23925 killed at Mon Apr 25 18:40:53 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23981 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23981 found at Mon Apr 25 18:40:53 UTC 2016 selfserv_9709 with PID 23981 started at Mon Apr 25 18:40:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9209: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 23981 at Mon Apr 25 18:40:55 UTC 2016 kill -USR1 23981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23981 killed at Mon Apr 25 18:40:55 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24049 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24049 found at Mon Apr 25 18:40:55 UTC 2016 selfserv_9709 with PID 24049 started at Mon Apr 25 18:40:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9210: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 24049 at Mon Apr 25 18:40:57 UTC 2016 kill -USR1 24049 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24049 killed at Mon Apr 25 18:40:58 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:40:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:40:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24105 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24105 found at Mon Apr 25 18:40:58 UTC 2016 selfserv_9709 with PID 24105 started at Mon Apr 25 18:40:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9211: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 24105 at Mon Apr 25 18:41:00 UTC 2016 kill -USR1 24105 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24105 killed at Mon Apr 25 18:41:00 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24161 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24161 found at Mon Apr 25 18:41:01 UTC 2016 selfserv_9709 with PID 24161 started at Mon Apr 25 18:41:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9212: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 24161 at Mon Apr 25 18:41:03 UTC 2016 kill -USR1 24161 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24161 killed at Mon Apr 25 18:41:03 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:41:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24242 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24242 found at Mon Apr 25 18:41:04 UTC 2016 selfserv_9709 with PID 24242 started at Mon Apr 25 18:41:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9213: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 24242 at Mon Apr 25 18:41:06 UTC 2016 kill -USR1 24242 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24242 killed at Mon Apr 25 18:41:06 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:41:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24298 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24298 found at Mon Apr 25 18:41:07 UTC 2016 selfserv_9709 with PID 24298 started at Mon Apr 25 18:41:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9214: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 24298 at Mon Apr 25 18:41:08 UTC 2016 kill -USR1 24298 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24298 killed at Mon Apr 25 18:41:09 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:41:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24355 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24355 found at Mon Apr 25 18:41:09 UTC 2016 selfserv_9709 with PID 24355 started at Mon Apr 25 18:41:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9215: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 24355 at Mon Apr 25 18:41:11 UTC 2016 kill -USR1 24355 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24355 killed at Mon Apr 25 18:41:12 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24423 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24423 found at Mon Apr 25 18:41:12 UTC 2016 selfserv_9709 with PID 24423 started at Mon Apr 25 18:41:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9216: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24423 at Mon Apr 25 18:41:14 UTC 2016 kill -USR1 24423 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24423 killed at Mon Apr 25 18:41:14 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24479 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24479 found at Mon Apr 25 18:41:15 UTC 2016 selfserv_9709 with PID 24479 started at Mon Apr 25 18:41:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9217: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 24479 at Mon Apr 25 18:41:17 UTC 2016 kill -USR1 24479 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24479 killed at Mon Apr 25 18:41:17 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24535 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24535 found at Mon Apr 25 18:41:18 UTC 2016 selfserv_9709 with PID 24535 started at Mon Apr 25 18:41:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9218: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24535 at Mon Apr 25 18:41:20 UTC 2016 kill -USR1 24535 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24535 killed at Mon Apr 25 18:41:20 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24603 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24603 found at Mon Apr 25 18:41:21 UTC 2016 selfserv_9709 with PID 24603 started at Mon Apr 25 18:41:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9219: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24603 at Mon Apr 25 18:41:22 UTC 2016 kill -USR1 24603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24603 killed at Mon Apr 25 18:41:23 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24659 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24659 found at Mon Apr 25 18:41:23 UTC 2016 selfserv_9709 with PID 24659 started at Mon Apr 25 18:41:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9220: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24659 at Mon Apr 25 18:41:25 UTC 2016 kill -USR1 24659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24659 killed at Mon Apr 25 18:41:26 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24715 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24715 found at Mon Apr 25 18:41:26 UTC 2016 selfserv_9709 with PID 24715 started at Mon Apr 25 18:41:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9221: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24715 at Mon Apr 25 18:41:28 UTC 2016 kill -USR1 24715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24715 killed at Mon Apr 25 18:41:28 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:41:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24784 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24784 found at Mon Apr 25 18:41:29 UTC 2016 selfserv_9709 with PID 24784 started at Mon Apr 25 18:41:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9222: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24784 at Mon Apr 25 18:41:30 UTC 2016 kill -USR1 24784 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24784 killed at Mon Apr 25 18:41:31 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:41:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24840 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24840 found at Mon Apr 25 18:41:31 UTC 2016 selfserv_9709 with PID 24840 started at Mon Apr 25 18:41:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9223: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24840 at Mon Apr 25 18:41:33 UTC 2016 kill -USR1 24840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24840 killed at Mon Apr 25 18:41:34 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:41:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24896 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24896 found at Mon Apr 25 18:41:34 UTC 2016 selfserv_9709 with PID 24896 started at Mon Apr 25 18:41:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9224: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24896 at Mon Apr 25 18:41:36 UTC 2016 kill -USR1 24896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24896 killed at Mon Apr 25 18:41:36 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24964 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24964 found at Mon Apr 25 18:41:37 UTC 2016 selfserv_9709 with PID 24964 started at Mon Apr 25 18:41:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9225: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24964 at Mon Apr 25 18:41:39 UTC 2016 kill -USR1 24964 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24964 killed at Mon Apr 25 18:41:39 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25023 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25023 found at Mon Apr 25 18:41:40 UTC 2016 selfserv_9709 with PID 25023 started at Mon Apr 25 18:41:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9226: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 25023 at Mon Apr 25 18:41:42 UTC 2016 kill -USR1 25023 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25023 killed at Mon Apr 25 18:41:42 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25079 found at Mon Apr 25 18:41:43 UTC 2016 selfserv_9709 with PID 25079 started at Mon Apr 25 18:41:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9227: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25079 at Mon Apr 25 18:41:44 UTC 2016 kill -USR1 25079 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25079 killed at Mon Apr 25 18:41:45 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25147 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25147 found at Mon Apr 25 18:41:45 UTC 2016 selfserv_9709 with PID 25147 started at Mon Apr 25 18:41:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9228: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 25147 at Mon Apr 25 18:41:47 UTC 2016 kill -USR1 25147 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25147 killed at Mon Apr 25 18:41:48 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25203 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25203 found at Mon Apr 25 18:41:48 UTC 2016 selfserv_9709 with PID 25203 started at Mon Apr 25 18:41:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9229: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 25203 at Mon Apr 25 18:41:50 UTC 2016 kill -USR1 25203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25203 killed at Mon Apr 25 18:41:50 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:41:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25260 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25260 found at Mon Apr 25 18:41:51 UTC 2016 selfserv_9709 with PID 25260 started at Mon Apr 25 18:41:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9230: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 25260 at Mon Apr 25 18:41:53 UTC 2016 kill -USR1 25260 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25260 killed at Mon Apr 25 18:41:53 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:41:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25328 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25328 found at Mon Apr 25 18:41:54 UTC 2016 selfserv_9709 with PID 25328 started at Mon Apr 25 18:41:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9231: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 25328 at Mon Apr 25 18:41:55 UTC 2016 kill -USR1 25328 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25328 killed at Mon Apr 25 18:41:56 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:41:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25384 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25384 found at Mon Apr 25 18:41:56 UTC 2016 selfserv_9709 with PID 25384 started at Mon Apr 25 18:41:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9232: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 25384 at Mon Apr 25 18:41:58 UTC 2016 kill -USR1 25384 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25384 killed at Mon Apr 25 18:41:59 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:41:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:41:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25440 found at Mon Apr 25 18:41:59 UTC 2016 selfserv_9709 with PID 25440 started at Mon Apr 25 18:41:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9233: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 25440 at Mon Apr 25 18:42:01 UTC 2016 kill -USR1 25440 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25440 killed at Mon Apr 25 18:42:01 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25521 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25521 found at Mon Apr 25 18:42:02 UTC 2016 selfserv_9709 with PID 25521 started at Mon Apr 25 18:42:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9234: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25521 at Mon Apr 25 18:42:04 UTC 2016 kill -USR1 25521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25521 killed at Mon Apr 25 18:42:04 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25578 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25578 found at Mon Apr 25 18:42:05 UTC 2016 selfserv_9709 with PID 25578 started at Mon Apr 25 18:42:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9235: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 25578 at Mon Apr 25 18:42:07 UTC 2016 kill -USR1 25578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25578 killed at Mon Apr 25 18:42:07 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25634 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25634 found at Mon Apr 25 18:42:08 UTC 2016 selfserv_9709 with PID 25634 started at Mon Apr 25 18:42:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9236: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25634 at Mon Apr 25 18:42:10 UTC 2016 kill -USR1 25634 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25634 killed at Mon Apr 25 18:42:10 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25703 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25703 found at Mon Apr 25 18:42:11 UTC 2016 selfserv_9709 with PID 25703 started at Mon Apr 25 18:42:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9237: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25703 at Mon Apr 25 18:42:12 UTC 2016 kill -USR1 25703 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25703 killed at Mon Apr 25 18:42:13 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25759 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25759 found at Mon Apr 25 18:42:13 UTC 2016 selfserv_9709 with PID 25759 started at Mon Apr 25 18:42:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9238: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25759 at Mon Apr 25 18:42:15 UTC 2016 kill -USR1 25759 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25759 killed at Mon Apr 25 18:42:15 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25815 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25815 found at Mon Apr 25 18:42:16 UTC 2016 selfserv_9709 with PID 25815 started at Mon Apr 25 18:42:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9239: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25815 at Mon Apr 25 18:42:18 UTC 2016 kill -USR1 25815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25815 killed at Mon Apr 25 18:42:18 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:42:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25883 found at Mon Apr 25 18:42:19 UTC 2016 selfserv_9709 with PID 25883 started at Mon Apr 25 18:42:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9240: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25883 at Mon Apr 25 18:42:20 UTC 2016 kill -USR1 25883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25883 killed at Mon Apr 25 18:42:21 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:42:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25939 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25939 found at Mon Apr 25 18:42:21 UTC 2016 selfserv_9709 with PID 25939 started at Mon Apr 25 18:42:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9241: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25939 at Mon Apr 25 18:42:23 UTC 2016 kill -USR1 25939 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25939 killed at Mon Apr 25 18:42:24 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:42:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25995 found at Mon Apr 25 18:42:24 UTC 2016 selfserv_9709 with PID 25995 started at Mon Apr 25 18:42:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9242: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 25995 at Mon Apr 25 18:42:26 UTC 2016 kill -USR1 25995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25995 killed at Mon Apr 25 18:42:26 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26063 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26063 found at Mon Apr 25 18:42:27 UTC 2016 selfserv_9709 with PID 26063 started at Mon Apr 25 18:42:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9243: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26063 at Mon Apr 25 18:42:29 UTC 2016 kill -USR1 26063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26063 killed at Mon Apr 25 18:42:29 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26120 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26120 found at Mon Apr 25 18:42:30 UTC 2016 selfserv_9709 with PID 26120 started at Mon Apr 25 18:42:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9244: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 26120 at Mon Apr 25 18:42:32 UTC 2016 kill -USR1 26120 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26120 killed at Mon Apr 25 18:42:32 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26176 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26176 found at Mon Apr 25 18:42:33 UTC 2016 selfserv_9709 with PID 26176 started at Mon Apr 25 18:42:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9245: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26176 at Mon Apr 25 18:42:34 UTC 2016 kill -USR1 26176 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26176 killed at Mon Apr 25 18:42:35 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26244 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26244 found at Mon Apr 25 18:42:35 UTC 2016 selfserv_9709 with PID 26244 started at Mon Apr 25 18:42:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9246: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 26244 at Mon Apr 25 18:42:37 UTC 2016 kill -USR1 26244 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26244 killed at Mon Apr 25 18:42:37 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26303 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26303 found at Mon Apr 25 18:42:38 UTC 2016 selfserv_9709 with PID 26303 started at Mon Apr 25 18:42:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9247: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 26303 at Mon Apr 25 18:42:39 UTC 2016 kill -USR1 26303 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26303 killed at Mon Apr 25 18:42:40 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26359 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26359 found at Mon Apr 25 18:42:40 UTC 2016 selfserv_9709 with PID 26359 started at Mon Apr 25 18:42:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9248: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 26359 at Mon Apr 25 18:42:42 UTC 2016 kill -USR1 26359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26359 killed at Mon Apr 25 18:42:42 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:42:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26427 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26427 found at Mon Apr 25 18:42:43 UTC 2016 selfserv_9709 with PID 26427 started at Mon Apr 25 18:42:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9249: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 26427 at Mon Apr 25 18:42:44 UTC 2016 kill -USR1 26427 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26427 killed at Mon Apr 25 18:42:45 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:42:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26483 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26483 found at Mon Apr 25 18:42:45 UTC 2016 selfserv_9709 with PID 26483 started at Mon Apr 25 18:42:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9250: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 26483 at Mon Apr 25 18:42:47 UTC 2016 kill -USR1 26483 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26483 killed at Mon Apr 25 18:42:47 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:42:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26539 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26539 found at Mon Apr 25 18:42:48 UTC 2016 selfserv_9709 with PID 26539 started at Mon Apr 25 18:42:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9251: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 26539 at Mon Apr 25 18:42:49 UTC 2016 kill -USR1 26539 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26539 killed at Mon Apr 25 18:42:50 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26608 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26608 found at Mon Apr 25 18:42:50 UTC 2016 selfserv_9709 with PID 26608 started at Mon Apr 25 18:42:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9252: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26608 at Mon Apr 25 18:42:52 UTC 2016 kill -USR1 26608 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26608 killed at Mon Apr 25 18:42:52 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26664 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26664 found at Mon Apr 25 18:42:53 UTC 2016 selfserv_9709 with PID 26664 started at Mon Apr 25 18:42:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9253: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 26664 at Mon Apr 25 18:42:54 UTC 2016 kill -USR1 26664 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26664 killed at Mon Apr 25 18:42:55 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26720 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26720 found at Mon Apr 25 18:42:55 UTC 2016 selfserv_9709 with PID 26720 started at Mon Apr 25 18:42:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9254: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26720 at Mon Apr 25 18:42:57 UTC 2016 kill -USR1 26720 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26720 killed at Mon Apr 25 18:42:57 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:42:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:42:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26788 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26788 found at Mon Apr 25 18:42:58 UTC 2016 selfserv_9709 with PID 26788 started at Mon Apr 25 18:42:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9255: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26788 at Mon Apr 25 18:42:59 UTC 2016 kill -USR1 26788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26788 killed at Mon Apr 25 18:43:00 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26844 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26844 found at Mon Apr 25 18:43:00 UTC 2016 selfserv_9709 with PID 26844 started at Mon Apr 25 18:43:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9256: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26844 at Mon Apr 25 18:43:02 UTC 2016 kill -USR1 26844 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26844 killed at Mon Apr 25 18:43:02 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26913 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26913 found at Mon Apr 25 18:43:03 UTC 2016 selfserv_9709 with PID 26913 started at Mon Apr 25 18:43:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9257: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26913 at Mon Apr 25 18:43:04 UTC 2016 kill -USR1 26913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26913 killed at Mon Apr 25 18:43:05 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26982 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26982 found at Mon Apr 25 18:43:05 UTC 2016 selfserv_9709 with PID 26982 started at Mon Apr 25 18:43:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9258: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26982 at Mon Apr 25 18:43:07 UTC 2016 kill -USR1 26982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26982 killed at Mon Apr 25 18:43:07 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27038 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27038 found at Mon Apr 25 18:43:07 UTC 2016 selfserv_9709 with PID 27038 started at Mon Apr 25 18:43:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9259: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 27038 at Mon Apr 25 18:43:09 UTC 2016 kill -USR1 27038 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27038 killed at Mon Apr 25 18:43:09 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27094 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27094 found at Mon Apr 25 18:43:10 UTC 2016 selfserv_9709 with PID 27094 started at Mon Apr 25 18:43:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9260: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 27094 at Mon Apr 25 18:43:11 UTC 2016 kill -USR1 27094 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27094 killed at Mon Apr 25 18:43:12 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27163 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27163 found at Mon Apr 25 18:43:12 UTC 2016 selfserv_9709 with PID 27163 started at Mon Apr 25 18:43:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9261: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 27163 at Mon Apr 25 18:43:14 UTC 2016 kill -USR1 27163 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27163 killed at Mon Apr 25 18:43:14 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27219 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27219 found at Mon Apr 25 18:43:15 UTC 2016 selfserv_9709 with PID 27219 started at Mon Apr 25 18:43:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9262: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 27219 at Mon Apr 25 18:43:16 UTC 2016 kill -USR1 27219 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27219 killed at Mon Apr 25 18:43:17 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27275 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27275 found at Mon Apr 25 18:43:17 UTC 2016 selfserv_9709 with PID 27275 started at Mon Apr 25 18:43:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9263: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 27275 at Mon Apr 25 18:43:19 UTC 2016 kill -USR1 27275 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27275 killed at Mon Apr 25 18:43:19 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27352 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27352 found at Mon Apr 25 18:43:20 UTC 2016 selfserv_9709 with PID 27352 started at Mon Apr 25 18:43:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9264: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 27352 at Mon Apr 25 18:43:22 UTC 2016 kill -USR1 27352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27352 killed at Mon Apr 25 18:43:22 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27408 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27408 found at Mon Apr 25 18:43:23 UTC 2016 selfserv_9709 with PID 27408 started at Mon Apr 25 18:43:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9265: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 27408 at Mon Apr 25 18:43:24 UTC 2016 kill -USR1 27408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27408 killed at Mon Apr 25 18:43:25 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27464 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27464 found at Mon Apr 25 18:43:25 UTC 2016 selfserv_9709 with PID 27464 started at Mon Apr 25 18:43:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9266: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 27464 at Mon Apr 25 18:43:27 UTC 2016 kill -USR1 27464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27464 killed at Mon Apr 25 18:43:27 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27532 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27532 found at Mon Apr 25 18:43:28 UTC 2016 selfserv_9709 with PID 27532 started at Mon Apr 25 18:43:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9267: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 27532 at Mon Apr 25 18:43:29 UTC 2016 kill -USR1 27532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27532 killed at Mon Apr 25 18:43:30 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27588 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27588 found at Mon Apr 25 18:43:30 UTC 2016 selfserv_9709 with PID 27588 started at Mon Apr 25 18:43:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9268: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 27588 at Mon Apr 25 18:43:32 UTC 2016 kill -USR1 27588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27588 killed at Mon Apr 25 18:43:33 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27645 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27645 found at Mon Apr 25 18:43:33 UTC 2016 selfserv_9709 with PID 27645 started at Mon Apr 25 18:43:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9269: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 27645 at Mon Apr 25 18:43:35 UTC 2016 kill -USR1 27645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27645 killed at Mon Apr 25 18:43:35 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27713 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27713 found at Mon Apr 25 18:43:36 UTC 2016 selfserv_9709 with PID 27713 started at Mon Apr 25 18:43:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9270: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 27713 at Mon Apr 25 18:43:37 UTC 2016 kill -USR1 27713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27713 killed at Mon Apr 25 18:43:38 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27772 found at Mon Apr 25 18:43:38 UTC 2016 selfserv_9709 with PID 27772 started at Mon Apr 25 18:43:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9271: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 27772 at Mon Apr 25 18:43:40 UTC 2016 kill -USR1 27772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27772 killed at Mon Apr 25 18:43:40 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27828 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27828 found at Mon Apr 25 18:43:41 UTC 2016 selfserv_9709 with PID 27828 started at Mon Apr 25 18:43:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9272: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 27828 at Mon Apr 25 18:43:42 UTC 2016 kill -USR1 27828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27828 killed at Mon Apr 25 18:43:42 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27896 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27896 found at Mon Apr 25 18:43:43 UTC 2016 selfserv_9709 with PID 27896 started at Mon Apr 25 18:43:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9273: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 27896 at Mon Apr 25 18:43:45 UTC 2016 kill -USR1 27896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27896 killed at Mon Apr 25 18:43:45 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27952 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27952 found at Mon Apr 25 18:43:46 UTC 2016 selfserv_9709 with PID 27952 started at Mon Apr 25 18:43:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9274: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 27952 at Mon Apr 25 18:43:47 UTC 2016 kill -USR1 27952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27952 killed at Mon Apr 25 18:43:48 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28008 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28008 found at Mon Apr 25 18:43:48 UTC 2016 selfserv_9709 with PID 28008 started at Mon Apr 25 18:43:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9275: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 28008 at Mon Apr 25 18:43:50 UTC 2016 kill -USR1 28008 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28008 killed at Mon Apr 25 18:43:50 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28077 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28077 found at Mon Apr 25 18:43:51 UTC 2016 selfserv_9709 with PID 28077 started at Mon Apr 25 18:43:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9276: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28077 at Mon Apr 25 18:43:52 UTC 2016 kill -USR1 28077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28077 killed at Mon Apr 25 18:43:53 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28135 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28135 found at Mon Apr 25 18:43:53 UTC 2016 selfserv_9709 with PID 28135 started at Mon Apr 25 18:43:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9277: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28135 at Mon Apr 25 18:43:55 UTC 2016 kill -USR1 28135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28135 killed at Mon Apr 25 18:43:55 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:43:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28191 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28191 found at Mon Apr 25 18:43:56 UTC 2016 selfserv_9709 with PID 28191 started at Mon Apr 25 18:43:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9278: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28191 at Mon Apr 25 18:43:57 UTC 2016 kill -USR1 28191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28191 killed at Mon Apr 25 18:43:57 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:43:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:43:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28261 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28261 found at Mon Apr 25 18:43:58 UTC 2016 selfserv_9709 with PID 28261 started at Mon Apr 25 18:43:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9279: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 28261 at Mon Apr 25 18:43:59 UTC 2016 kill -USR1 28261 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28261 killed at Mon Apr 25 18:44:00 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28317 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28317 found at Mon Apr 25 18:44:00 UTC 2016 selfserv_9709 with PID 28317 started at Mon Apr 25 18:44:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9280: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28317 at Mon Apr 25 18:44:02 UTC 2016 kill -USR1 28317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28317 killed at Mon Apr 25 18:44:03 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28386 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28386 found at Mon Apr 25 18:44:03 UTC 2016 selfserv_9709 with PID 28386 started at Mon Apr 25 18:44:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9281: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 28386 at Mon Apr 25 18:44:05 UTC 2016 kill -USR1 28386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28386 killed at Mon Apr 25 18:44:05 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28454 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28454 found at Mon Apr 25 18:44:05 UTC 2016 selfserv_9709 with PID 28454 started at Mon Apr 25 18:44:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9282: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 28454 at Mon Apr 25 18:44:07 UTC 2016 kill -USR1 28454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28454 killed at Mon Apr 25 18:44:07 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28510 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28510 found at Mon Apr 25 18:44:08 UTC 2016 selfserv_9709 with PID 28510 started at Mon Apr 25 18:44:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9283: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 28510 at Mon Apr 25 18:44:09 UTC 2016 kill -USR1 28510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28510 killed at Mon Apr 25 18:44:09 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28566 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28566 found at Mon Apr 25 18:44:10 UTC 2016 selfserv_9709 with PID 28566 started at Mon Apr 25 18:44:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #9284: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 28566 at Mon Apr 25 18:44:11 UTC 2016 kill -USR1 28566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28566 killed at Mon Apr 25 18:44:12 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28635 found at Mon Apr 25 18:44:12 UTC 2016 selfserv_9709 with PID 28635 started at Mon Apr 25 18:44:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9285: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 28635 at Mon Apr 25 18:44:14 UTC 2016 kill -USR1 28635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28635 killed at Mon Apr 25 18:44:14 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28691 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28691 found at Mon Apr 25 18:44:15 UTC 2016 selfserv_9709 with PID 28691 started at Mon Apr 25 18:44:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9286: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28691 at Mon Apr 25 18:44:16 UTC 2016 kill -USR1 28691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28691 killed at Mon Apr 25 18:44:17 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28747 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28747 found at Mon Apr 25 18:44:17 UTC 2016 selfserv_9709 with PID 28747 started at Mon Apr 25 18:44:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #9287: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 28747 at Mon Apr 25 18:44:19 UTC 2016 kill -USR1 28747 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28747 killed at Mon Apr 25 18:44:19 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28815 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28815 found at Mon Apr 25 18:44:20 UTC 2016 selfserv_9709 with PID 28815 started at Mon Apr 25 18:44:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9288: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28815 at Mon Apr 25 18:44:21 UTC 2016 kill -USR1 28815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28815 killed at Mon Apr 25 18:44:22 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28871 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28871 found at Mon Apr 25 18:44:22 UTC 2016 selfserv_9709 with PID 28871 started at Mon Apr 25 18:44:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9289: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28871 at Mon Apr 25 18:44:24 UTC 2016 kill -USR1 28871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28871 killed at Mon Apr 25 18:44:25 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28927 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28927 found at Mon Apr 25 18:44:25 UTC 2016 selfserv_9709 with PID 28927 started at Mon Apr 25 18:44:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9290: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 28927 at Mon Apr 25 18:44:27 UTC 2016 kill -USR1 28927 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28927 killed at Mon Apr 25 18:44:27 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28995 found at Mon Apr 25 18:44:28 UTC 2016 selfserv_9709 with PID 28995 started at Mon Apr 25 18:44:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9291: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 28995 at Mon Apr 25 18:44:30 UTC 2016 kill -USR1 28995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28995 killed at Mon Apr 25 18:44:30 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29051 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29051 found at Mon Apr 25 18:44:31 UTC 2016 selfserv_9709 with PID 29051 started at Mon Apr 25 18:44:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9292: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29051 at Mon Apr 25 18:44:33 UTC 2016 kill -USR1 29051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29051 killed at Mon Apr 25 18:44:33 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29108 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29108 found at Mon Apr 25 18:44:34 UTC 2016 selfserv_9709 with PID 29108 started at Mon Apr 25 18:44:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9293: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29108 at Mon Apr 25 18:44:36 UTC 2016 kill -USR1 29108 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29108 killed at Mon Apr 25 18:44:36 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29176 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29176 found at Mon Apr 25 18:44:37 UTC 2016 selfserv_9709 with PID 29176 started at Mon Apr 25 18:44:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9294: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29176 at Mon Apr 25 18:44:39 UTC 2016 kill -USR1 29176 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29176 killed at Mon Apr 25 18:44:39 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29235 found at Mon Apr 25 18:44:40 UTC 2016 selfserv_9709 with PID 29235 started at Mon Apr 25 18:44:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9295: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29235 at Mon Apr 25 18:44:41 UTC 2016 kill -USR1 29235 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29235 killed at Mon Apr 25 18:44:42 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29291 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29291 found at Mon Apr 25 18:44:42 UTC 2016 selfserv_9709 with PID 29291 started at Mon Apr 25 18:44:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9296: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29291 at Mon Apr 25 18:44:44 UTC 2016 kill -USR1 29291 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29291 killed at Mon Apr 25 18:44:45 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29359 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29359 found at Mon Apr 25 18:44:45 UTC 2016 selfserv_9709 with PID 29359 started at Mon Apr 25 18:44:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9297: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29359 at Mon Apr 25 18:44:47 UTC 2016 kill -USR1 29359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29359 killed at Mon Apr 25 18:44:48 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29415 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29415 found at Mon Apr 25 18:44:48 UTC 2016 selfserv_9709 with PID 29415 started at Mon Apr 25 18:44:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9298: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29415 at Mon Apr 25 18:44:50 UTC 2016 kill -USR1 29415 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29415 killed at Mon Apr 25 18:44:51 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:44:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29471 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29471 found at Mon Apr 25 18:44:51 UTC 2016 selfserv_9709 with PID 29471 started at Mon Apr 25 18:44:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9299: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29471 at Mon Apr 25 18:44:53 UTC 2016 kill -USR1 29471 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29471 killed at Mon Apr 25 18:44:54 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29540 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29540 found at Mon Apr 25 18:44:54 UTC 2016 selfserv_9709 with PID 29540 started at Mon Apr 25 18:44:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9300: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29540 at Mon Apr 25 18:44:56 UTC 2016 kill -USR1 29540 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29540 killed at Mon Apr 25 18:44:56 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29596 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29596 found at Mon Apr 25 18:44:57 UTC 2016 selfserv_9709 with PID 29596 started at Mon Apr 25 18:44:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9301: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29596 at Mon Apr 25 18:44:59 UTC 2016 kill -USR1 29596 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29596 killed at Mon Apr 25 18:44:59 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:44:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:44:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29652 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29652 found at Mon Apr 25 18:45:00 UTC 2016 selfserv_9709 with PID 29652 started at Mon Apr 25 18:45:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9302: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29652 at Mon Apr 25 18:45:02 UTC 2016 kill -USR1 29652 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29652 killed at Mon Apr 25 18:45:02 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29734 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29734 found at Mon Apr 25 18:45:02 UTC 2016 selfserv_9709 with PID 29734 started at Mon Apr 25 18:45:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9303: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29734 at Mon Apr 25 18:45:04 UTC 2016 kill -USR1 29734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29734 killed at Mon Apr 25 18:45:05 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29790 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29790 found at Mon Apr 25 18:45:05 UTC 2016 selfserv_9709 with PID 29790 started at Mon Apr 25 18:45:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9304: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 29790 at Mon Apr 25 18:45:07 UTC 2016 kill -USR1 29790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29790 killed at Mon Apr 25 18:45:08 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29846 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29846 found at Mon Apr 25 18:45:08 UTC 2016 selfserv_9709 with PID 29846 started at Mon Apr 25 18:45:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9305: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29846 at Mon Apr 25 18:45:10 UTC 2016 kill -USR1 29846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29846 killed at Mon Apr 25 18:45:11 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:45:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29914 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29914 found at Mon Apr 25 18:45:11 UTC 2016 selfserv_9709 with PID 29914 started at Mon Apr 25 18:45:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9306: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29914 at Mon Apr 25 18:45:13 UTC 2016 kill -USR1 29914 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29914 killed at Mon Apr 25 18:45:14 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:45:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29971 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29971 found at Mon Apr 25 18:45:14 UTC 2016 selfserv_9709 with PID 29971 started at Mon Apr 25 18:45:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9307: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29971 at Mon Apr 25 18:45:16 UTC 2016 kill -USR1 29971 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29971 killed at Mon Apr 25 18:45:16 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:45:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30027 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30027 found at Mon Apr 25 18:45:17 UTC 2016 selfserv_9709 with PID 30027 started at Mon Apr 25 18:45:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9308: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30027 at Mon Apr 25 18:45:19 UTC 2016 kill -USR1 30027 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30027 killed at Mon Apr 25 18:45:19 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30095 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30095 found at Mon Apr 25 18:45:20 UTC 2016 selfserv_9709 with PID 30095 started at Mon Apr 25 18:45:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9309: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30095 at Mon Apr 25 18:45:22 UTC 2016 kill -USR1 30095 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30095 killed at Mon Apr 25 18:45:22 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30151 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30151 found at Mon Apr 25 18:45:22 UTC 2016 selfserv_9709 with PID 30151 started at Mon Apr 25 18:45:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9310: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30151 at Mon Apr 25 18:45:25 UTC 2016 kill -USR1 30151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30151 killed at Mon Apr 25 18:45:25 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30207 found at Mon Apr 25 18:45:25 UTC 2016 selfserv_9709 with PID 30207 started at Mon Apr 25 18:45:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9311: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30207 at Mon Apr 25 18:45:27 UTC 2016 kill -USR1 30207 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30207 killed at Mon Apr 25 18:45:28 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:45:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30275 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30275 found at Mon Apr 25 18:45:28 UTC 2016 selfserv_9709 with PID 30275 started at Mon Apr 25 18:45:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9312: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30275 at Mon Apr 25 18:45:30 UTC 2016 kill -USR1 30275 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30275 killed at Mon Apr 25 18:45:30 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:45:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30331 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30331 found at Mon Apr 25 18:45:31 UTC 2016 selfserv_9709 with PID 30331 started at Mon Apr 25 18:45:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9313: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30331 at Mon Apr 25 18:45:32 UTC 2016 kill -USR1 30331 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30331 killed at Mon Apr 25 18:45:33 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:45:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30387 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30387 found at Mon Apr 25 18:45:33 UTC 2016 selfserv_9709 with PID 30387 started at Mon Apr 25 18:45:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9314: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30387 at Mon Apr 25 18:45:35 UTC 2016 kill -USR1 30387 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30387 killed at Mon Apr 25 18:45:35 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30456 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30456 found at Mon Apr 25 18:45:36 UTC 2016 selfserv_9709 with PID 30456 started at Mon Apr 25 18:45:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9315: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30456 at Mon Apr 25 18:45:38 UTC 2016 kill -USR1 30456 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30456 killed at Mon Apr 25 18:45:38 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30515 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30515 found at Mon Apr 25 18:45:38 UTC 2016 selfserv_9709 with PID 30515 started at Mon Apr 25 18:45:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9316: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30515 at Mon Apr 25 18:45:40 UTC 2016 kill -USR1 30515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30515 killed at Mon Apr 25 18:45:41 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30571 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30571 found at Mon Apr 25 18:45:41 UTC 2016 selfserv_9709 with PID 30571 started at Mon Apr 25 18:45:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9317: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30571 at Mon Apr 25 18:45:43 UTC 2016 kill -USR1 30571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30571 killed at Mon Apr 25 18:45:43 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:45:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30639 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30639 found at Mon Apr 25 18:45:44 UTC 2016 selfserv_9709 with PID 30639 started at Mon Apr 25 18:45:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9318: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30639 at Mon Apr 25 18:45:46 UTC 2016 kill -USR1 30639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30639 killed at Mon Apr 25 18:45:46 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:45:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30695 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30695 found at Mon Apr 25 18:45:46 UTC 2016 selfserv_9709 with PID 30695 started at Mon Apr 25 18:45:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9319: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30695 at Mon Apr 25 18:45:48 UTC 2016 kill -USR1 30695 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30695 killed at Mon Apr 25 18:45:48 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 18:45:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30751 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30751 found at Mon Apr 25 18:45:49 UTC 2016 selfserv_9709 with PID 30751 started at Mon Apr 25 18:45:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #9320: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30751 at Mon Apr 25 18:45:50 UTC 2016 kill -USR1 30751 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30751 killed at Mon Apr 25 18:45:51 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30819 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30819 found at Mon Apr 25 18:45:51 UTC 2016 selfserv_9709 with PID 30819 started at Mon Apr 25 18:45:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9321: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30819 at Mon Apr 25 18:45:53 UTC 2016 kill -USR1 30819 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30819 killed at Mon Apr 25 18:45:53 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30875 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30875 found at Mon Apr 25 18:45:54 UTC 2016 selfserv_9709 with PID 30875 started at Mon Apr 25 18:45:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #9322: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 30875 at Mon Apr 25 18:45:56 UTC 2016 kill -USR1 30875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30875 killed at Mon Apr 25 18:45:56 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:45:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30932 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30932 found at Mon Apr 25 18:45:57 UTC 2016 selfserv_9709 with PID 30932 started at Mon Apr 25 18:45:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #9323: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30932 at Mon Apr 25 18:45:58 UTC 2016 kill -USR1 30932 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30932 killed at Mon Apr 25 18:45:59 UTC 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9709 starting at Mon Apr 25 18:45:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:45:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:45:59 UTC 2016 selfserv_9709 with PID 30995 started at Mon Apr 25 18:45:59 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:01 UTC 2016 ssl.sh: #9324: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:02 UTC 2016 ssl.sh: #9325: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:03 UTC 2016 ssl.sh: #9326: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:04 UTC 2016 ssl.sh: #9327: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:05 UTC 2016 ssl.sh: #9328: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:06 UTC 2016 ssl.sh: #9329: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:08 UTC 2016 ssl.sh: #9330: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:09 UTC 2016 ssl.sh: #9331: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:10 UTC 2016 ssl.sh: #9332: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:11 UTC 2016 ssl.sh: #9333: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:12 UTC 2016 ssl.sh: #9334: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:13 UTC 2016 ssl.sh: #9335: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:14 UTC 2016 ssl.sh: #9336: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:15 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9337: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:16 UTC 2016 ssl.sh: #9338: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:17 UTC 2016 ssl.sh: #9339: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:18 UTC 2016 ssl.sh: #9340: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:19 UTC 2016 ssl.sh: #9341: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:20 UTC 2016 ssl.sh: #9342: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:21 UTC 2016 ssl.sh: #9343: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:23 UTC 2016 ssl.sh: #9344: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:24 UTC 2016 ssl.sh: #9345: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:25 UTC 2016 ssl.sh: #9346: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:26 UTC 2016 ssl.sh: #9347: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:27 UTC 2016 ssl.sh: #9348: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:28 UTC 2016 ssl.sh: #9349: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:29 UTC 2016 ssl.sh: #9350: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:30 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9351: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:31 UTC 2016 ssl.sh: #9352: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:32 UTC 2016 ssl.sh: #9353: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:33 UTC 2016 ssl.sh: #9354: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:34 UTC 2016 ssl.sh: #9355: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:35 UTC 2016 ssl.sh: #9356: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:36 UTC 2016 ssl.sh: #9357: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:37 UTC 2016 ssl.sh: #9358: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:38 UTC 2016 ssl.sh: #9359: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:39 UTC 2016 ssl.sh: #9360: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:41 UTC 2016 ssl.sh: #9361: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:42 UTC 2016 ssl.sh: #9362: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:43 UTC 2016 ssl.sh: #9363: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 30995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30995 found at Mon Apr 25 18:46:44 UTC 2016 ssl.sh: #9364: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 30995 at Mon Apr 25 18:46:44 UTC 2016 kill -USR1 30995 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30995 killed at Mon Apr 25 18:46:44 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:46:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:46:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:45 UTC 2016 selfserv_9709 with PID 32440 started at Mon Apr 25 18:46:45 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:46 UTC 2016 ssl.sh: #9365: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:47 UTC 2016 ssl.sh: #9366: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:48 UTC 2016 ssl.sh: #9367: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:49 UTC 2016 ssl.sh: #9368: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:50 UTC 2016 ssl.sh: #9369: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:51 UTC 2016 ssl.sh: #9370: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:52 UTC 2016 ssl.sh: #9371: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:53 UTC 2016 ssl.sh: #9372: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:54 UTC 2016 ssl.sh: #9373: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:55 UTC 2016 ssl.sh: #9374: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:56 UTC 2016 ssl.sh: #9375: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:57 UTC 2016 ssl.sh: #9376: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:58 UTC 2016 ssl.sh: #9377: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:46:59 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9378: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:00 UTC 2016 ssl.sh: #9379: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:01 UTC 2016 ssl.sh: #9380: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:01 UTC 2016 ssl.sh: #9381: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:02 UTC 2016 ssl.sh: #9382: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:03 UTC 2016 ssl.sh: #9383: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:04 UTC 2016 ssl.sh: #9384: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:05 UTC 2016 ssl.sh: #9385: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:06 UTC 2016 ssl.sh: #9386: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:07 UTC 2016 ssl.sh: #9387: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:08 UTC 2016 ssl.sh: #9388: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:09 UTC 2016 ssl.sh: #9389: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:10 UTC 2016 ssl.sh: #9390: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:11 UTC 2016 ssl.sh: #9391: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:12 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9392: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:13 UTC 2016 ssl.sh: #9393: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:14 UTC 2016 ssl.sh: #9394: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:15 UTC 2016 ssl.sh: #9395: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:16 UTC 2016 ssl.sh: #9396: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:17 UTC 2016 ssl.sh: #9397: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:18 UTC 2016 ssl.sh: #9398: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:18 UTC 2016 ssl.sh: #9399: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:19 UTC 2016 ssl.sh: #9400: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:20 UTC 2016 ssl.sh: #9401: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:21 UTC 2016 ssl.sh: #9402: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:22 UTC 2016 ssl.sh: #9403: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:23 UTC 2016 ssl.sh: #9404: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 32440 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32440 found at Mon Apr 25 18:47:24 UTC 2016 ssl.sh: #9405: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 32440 at Mon Apr 25 18:47:24 UTC 2016 kill -USR1 32440 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32440 killed at Mon Apr 25 18:47:25 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:47:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:47:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:25 UTC 2016 selfserv_9709 with PID 1432 started at Mon Apr 25 18:47:25 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:27 UTC 2016 ssl.sh: #9406: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:28 UTC 2016 ssl.sh: #9407: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:29 UTC 2016 ssl.sh: #9408: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:30 UTC 2016 ssl.sh: #9409: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:31 UTC 2016 ssl.sh: #9410: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:32 UTC 2016 ssl.sh: #9411: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:34 UTC 2016 ssl.sh: #9412: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:35 UTC 2016 ssl.sh: #9413: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:36 UTC 2016 ssl.sh: #9414: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:37 UTC 2016 ssl.sh: #9415: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:38 UTC 2016 ssl.sh: #9416: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:40 UTC 2016 ssl.sh: #9417: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:41 UTC 2016 ssl.sh: #9418: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:42 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9419: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:43 UTC 2016 ssl.sh: #9420: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:44 UTC 2016 ssl.sh: #9421: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:45 UTC 2016 ssl.sh: #9422: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:46 UTC 2016 ssl.sh: #9423: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:47 UTC 2016 ssl.sh: #9424: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:48 UTC 2016 ssl.sh: #9425: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:49 UTC 2016 ssl.sh: #9426: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:51 UTC 2016 ssl.sh: #9427: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:52 UTC 2016 ssl.sh: #9428: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:53 UTC 2016 ssl.sh: #9429: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:54 UTC 2016 ssl.sh: #9430: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:55 UTC 2016 ssl.sh: #9431: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:56 UTC 2016 ssl.sh: #9432: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:57 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9433: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:47:59 UTC 2016 ssl.sh: #9434: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:00 UTC 2016 ssl.sh: #9435: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:01 UTC 2016 ssl.sh: #9436: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:02 UTC 2016 ssl.sh: #9437: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:03 UTC 2016 ssl.sh: #9438: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:04 UTC 2016 ssl.sh: #9439: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:05 UTC 2016 ssl.sh: #9440: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:06 UTC 2016 ssl.sh: #9441: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:07 UTC 2016 ssl.sh: #9442: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:08 UTC 2016 ssl.sh: #9443: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:09 UTC 2016 ssl.sh: #9444: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:11 UTC 2016 ssl.sh: #9445: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1432 found at Mon Apr 25 18:48:12 UTC 2016 ssl.sh: #9446: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 1432 at Mon Apr 25 18:48:12 UTC 2016 kill -USR1 1432 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1432 killed at Mon Apr 25 18:48:12 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:48:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:48:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:13 UTC 2016 selfserv_9709 with PID 2883 started at Mon Apr 25 18:48:13 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:14 UTC 2016 ssl.sh: #9447: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:15 UTC 2016 ssl.sh: #9448: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:16 UTC 2016 ssl.sh: #9449: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:17 UTC 2016 ssl.sh: #9450: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:18 UTC 2016 ssl.sh: #9451: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:19 UTC 2016 ssl.sh: #9452: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:20 UTC 2016 ssl.sh: #9453: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:21 UTC 2016 ssl.sh: #9454: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:22 UTC 2016 ssl.sh: #9455: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:23 UTC 2016 ssl.sh: #9456: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:24 UTC 2016 ssl.sh: #9457: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:26 UTC 2016 ssl.sh: #9458: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:27 UTC 2016 ssl.sh: #9459: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:28 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9460: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:29 UTC 2016 ssl.sh: #9461: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:30 UTC 2016 ssl.sh: #9462: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:31 UTC 2016 ssl.sh: #9463: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:32 UTC 2016 ssl.sh: #9464: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:33 UTC 2016 ssl.sh: #9465: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:34 UTC 2016 ssl.sh: #9466: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:35 UTC 2016 ssl.sh: #9467: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:36 UTC 2016 ssl.sh: #9468: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:37 UTC 2016 ssl.sh: #9469: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:38 UTC 2016 ssl.sh: #9470: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:39 UTC 2016 ssl.sh: #9471: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:40 UTC 2016 ssl.sh: #9472: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:41 UTC 2016 ssl.sh: #9473: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:42 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9474: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:43 UTC 2016 ssl.sh: #9475: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:44 UTC 2016 ssl.sh: #9476: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:45 UTC 2016 ssl.sh: #9477: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:46 UTC 2016 ssl.sh: #9478: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:47 UTC 2016 ssl.sh: #9479: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:48 UTC 2016 ssl.sh: #9480: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:49 UTC 2016 ssl.sh: #9481: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:50 UTC 2016 ssl.sh: #9482: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:51 UTC 2016 ssl.sh: #9483: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:52 UTC 2016 ssl.sh: #9484: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:53 UTC 2016 ssl.sh: #9485: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:54 UTC 2016 ssl.sh: #9486: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 2883 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2883 found at Mon Apr 25 18:48:55 UTC 2016 ssl.sh: #9487: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 2883 at Mon Apr 25 18:48:55 UTC 2016 kill -USR1 2883 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2883 killed at Mon Apr 25 18:48:55 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:48:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:48:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4359 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4359 found at Mon Apr 25 18:48:56 UTC 2016 selfserv_9709 with PID 4359 started at Mon Apr 25 18:48:56 UTC 2016 trying to kill selfserv_9709 with PID 4359 at Mon Apr 25 18:48:56 UTC 2016 kill -USR1 4359 ./ssl.sh: line 186: 4359 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4359 killed at Mon Apr 25 18:48:56 UTC 2016 selfserv_9709 starting at Mon Apr 25 18:48:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:48:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:48:57 UTC 2016 selfserv_9709 with PID 4393 started at Mon Apr 25 18:48:57 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:48:59 UTC 2016 ssl.sh: #9488: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:00 UTC 2016 ssl.sh: #9489: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:01 UTC 2016 ssl.sh: #9490: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:03 UTC 2016 ssl.sh: #9491: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:04 UTC 2016 ssl.sh: #9492: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:05 UTC 2016 ssl.sh: #9493: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:07 UTC 2016 ssl.sh: #9494: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:08 UTC 2016 ssl.sh: #9495: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:10 UTC 2016 ssl.sh: #9496: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:11 UTC 2016 ssl.sh: #9497: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:12 UTC 2016 ssl.sh: #9498: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:14 UTC 2016 ssl.sh: #9499: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:15 UTC 2016 ssl.sh: #9500: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:16 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9501: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:18 UTC 2016 ssl.sh: #9502: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:19 UTC 2016 ssl.sh: #9503: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:20 UTC 2016 ssl.sh: #9504: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:22 UTC 2016 ssl.sh: #9505: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:23 UTC 2016 ssl.sh: #9506: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:24 UTC 2016 ssl.sh: #9507: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:26 UTC 2016 ssl.sh: #9508: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:27 UTC 2016 ssl.sh: #9509: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:28 UTC 2016 ssl.sh: #9510: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:30 UTC 2016 ssl.sh: #9511: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:31 UTC 2016 ssl.sh: #9512: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:32 UTC 2016 ssl.sh: #9513: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:34 UTC 2016 ssl.sh: #9514: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:35 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9515: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:36 UTC 2016 ssl.sh: #9516: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:38 UTC 2016 ssl.sh: #9517: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:39 UTC 2016 ssl.sh: #9518: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:40 UTC 2016 ssl.sh: #9519: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:42 UTC 2016 ssl.sh: #9520: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:43 UTC 2016 ssl.sh: #9521: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:44 UTC 2016 ssl.sh: #9522: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:46 UTC 2016 ssl.sh: #9523: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:47 UTC 2016 ssl.sh: #9524: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:48 UTC 2016 ssl.sh: #9525: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:50 UTC 2016 ssl.sh: #9526: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:51 UTC 2016 ssl.sh: #9527: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4393 found at Mon Apr 25 18:49:52 UTC 2016 ssl.sh: #9528: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4393 at Mon Apr 25 18:49:52 UTC 2016 kill -USR1 4393 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4393 killed at Mon Apr 25 18:49:53 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:49:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:49:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:49:53 UTC 2016 selfserv_9709 with PID 5835 started at Mon Apr 25 18:49:53 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:49:55 UTC 2016 ssl.sh: #9529: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:49:57 UTC 2016 ssl.sh: #9530: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:49:58 UTC 2016 ssl.sh: #9531: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:49:59 UTC 2016 ssl.sh: #9532: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:01 UTC 2016 ssl.sh: #9533: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:02 UTC 2016 ssl.sh: #9534: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:03 UTC 2016 ssl.sh: #9535: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:05 UTC 2016 ssl.sh: #9536: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:06 UTC 2016 ssl.sh: #9537: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:07 UTC 2016 ssl.sh: #9538: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:09 UTC 2016 ssl.sh: #9539: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:10 UTC 2016 ssl.sh: #9540: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:12 UTC 2016 ssl.sh: #9541: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:13 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9542: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:14 UTC 2016 ssl.sh: #9543: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:15 UTC 2016 ssl.sh: #9544: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:17 UTC 2016 ssl.sh: #9545: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:18 UTC 2016 ssl.sh: #9546: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:19 UTC 2016 ssl.sh: #9547: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:21 UTC 2016 ssl.sh: #9548: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:22 UTC 2016 ssl.sh: #9549: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:23 UTC 2016 ssl.sh: #9550: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:25 UTC 2016 ssl.sh: #9551: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:26 UTC 2016 ssl.sh: #9552: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:27 UTC 2016 ssl.sh: #9553: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:29 UTC 2016 ssl.sh: #9554: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:30 UTC 2016 ssl.sh: #9555: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:32 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9556: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:33 UTC 2016 ssl.sh: #9557: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:34 UTC 2016 ssl.sh: #9558: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:35 UTC 2016 ssl.sh: #9559: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:37 UTC 2016 ssl.sh: #9560: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:38 UTC 2016 ssl.sh: #9561: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:39 UTC 2016 ssl.sh: #9562: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:41 UTC 2016 ssl.sh: #9563: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:42 UTC 2016 ssl.sh: #9564: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:43 UTC 2016 ssl.sh: #9565: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:45 UTC 2016 ssl.sh: #9566: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:46 UTC 2016 ssl.sh: #9567: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:47 UTC 2016 ssl.sh: #9568: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5835 found at Mon Apr 25 18:50:49 UTC 2016 ssl.sh: #9569: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 5835 at Mon Apr 25 18:50:49 UTC 2016 kill -USR1 5835 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5835 killed at Mon Apr 25 18:50:49 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:50:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:50:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:50:50 UTC 2016 selfserv_9709 with PID 7276 started at Mon Apr 25 18:50:50 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:50:51 UTC 2016 ssl.sh: #9570: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:50:52 UTC 2016 ssl.sh: #9571: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:50:54 UTC 2016 ssl.sh: #9572: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:50:55 UTC 2016 ssl.sh: #9573: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:50:56 UTC 2016 ssl.sh: #9574: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:50:57 UTC 2016 ssl.sh: #9575: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:50:58 UTC 2016 ssl.sh: #9576: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:50:59 UTC 2016 ssl.sh: #9577: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:00 UTC 2016 ssl.sh: #9578: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:02 UTC 2016 ssl.sh: #9579: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:03 UTC 2016 ssl.sh: #9580: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:04 UTC 2016 ssl.sh: #9581: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:05 UTC 2016 ssl.sh: #9582: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:06 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9583: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:08 UTC 2016 ssl.sh: #9584: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:09 UTC 2016 ssl.sh: #9585: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:10 UTC 2016 ssl.sh: #9586: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:11 UTC 2016 ssl.sh: #9587: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:12 UTC 2016 ssl.sh: #9588: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:13 UTC 2016 ssl.sh: #9589: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:14 UTC 2016 ssl.sh: #9590: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:15 UTC 2016 ssl.sh: #9591: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:16 UTC 2016 ssl.sh: #9592: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:18 UTC 2016 ssl.sh: #9593: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:19 UTC 2016 ssl.sh: #9594: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:20 UTC 2016 ssl.sh: #9595: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:21 UTC 2016 ssl.sh: #9596: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:22 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9597: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:23 UTC 2016 ssl.sh: #9598: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:25 UTC 2016 ssl.sh: #9599: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:26 UTC 2016 ssl.sh: #9600: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:27 UTC 2016 ssl.sh: #9601: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:28 UTC 2016 ssl.sh: #9602: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:29 UTC 2016 ssl.sh: #9603: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:30 UTC 2016 ssl.sh: #9604: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:31 UTC 2016 ssl.sh: #9605: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:32 UTC 2016 ssl.sh: #9606: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:33 UTC 2016 ssl.sh: #9607: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:35 UTC 2016 ssl.sh: #9608: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:36 UTC 2016 ssl.sh: #9609: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7276 found at Mon Apr 25 18:51:37 UTC 2016 ssl.sh: #9610: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 7276 at Mon Apr 25 18:51:37 UTC 2016 kill -USR1 7276 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7276 killed at Mon Apr 25 18:51:37 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:51:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:51:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:38 UTC 2016 selfserv_9709 with PID 8714 started at Mon Apr 25 18:51:38 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:40 UTC 2016 ssl.sh: #9611: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:41 UTC 2016 ssl.sh: #9612: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:43 UTC 2016 ssl.sh: #9613: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:44 UTC 2016 ssl.sh: #9614: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:45 UTC 2016 ssl.sh: #9615: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:47 UTC 2016 ssl.sh: #9616: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:48 UTC 2016 ssl.sh: #9617: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:50 UTC 2016 ssl.sh: #9618: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:51 UTC 2016 ssl.sh: #9619: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:53 UTC 2016 ssl.sh: #9620: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:54 UTC 2016 ssl.sh: #9621: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:56 UTC 2016 ssl.sh: #9622: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:57 UTC 2016 ssl.sh: #9623: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:51:58 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9624: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:00 UTC 2016 ssl.sh: #9625: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:01 UTC 2016 ssl.sh: #9626: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:02 UTC 2016 ssl.sh: #9627: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:04 UTC 2016 ssl.sh: #9628: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:05 UTC 2016 ssl.sh: #9629: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:06 UTC 2016 ssl.sh: #9630: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:08 UTC 2016 ssl.sh: #9631: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:09 UTC 2016 ssl.sh: #9632: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:11 UTC 2016 ssl.sh: #9633: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:12 UTC 2016 ssl.sh: #9634: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:14 UTC 2016 ssl.sh: #9635: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:15 UTC 2016 ssl.sh: #9636: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:16 UTC 2016 ssl.sh: #9637: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:18 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9638: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:19 UTC 2016 ssl.sh: #9639: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:21 UTC 2016 ssl.sh: #9640: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:22 UTC 2016 ssl.sh: #9641: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:23 UTC 2016 ssl.sh: #9642: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:25 UTC 2016 ssl.sh: #9643: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:26 UTC 2016 ssl.sh: #9644: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:27 UTC 2016 ssl.sh: #9645: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:29 UTC 2016 ssl.sh: #9646: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:30 UTC 2016 ssl.sh: #9647: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:31 UTC 2016 ssl.sh: #9648: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:33 UTC 2016 ssl.sh: #9649: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:34 UTC 2016 ssl.sh: #9650: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 8714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8714 found at Mon Apr 25 18:52:36 UTC 2016 ssl.sh: #9651: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 8714 at Mon Apr 25 18:52:36 UTC 2016 kill -USR1 8714 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8714 killed at Mon Apr 25 18:52:36 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:52:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:52:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:37 UTC 2016 selfserv_9709 with PID 10160 started at Mon Apr 25 18:52:37 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:39 UTC 2016 ssl.sh: #9652: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:40 UTC 2016 ssl.sh: #9653: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:41 UTC 2016 ssl.sh: #9654: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:43 UTC 2016 ssl.sh: #9655: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:44 UTC 2016 ssl.sh: #9656: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:46 UTC 2016 ssl.sh: #9657: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:47 UTC 2016 ssl.sh: #9658: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:48 UTC 2016 ssl.sh: #9659: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:50 UTC 2016 ssl.sh: #9660: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:51 UTC 2016 ssl.sh: #9661: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:53 UTC 2016 ssl.sh: #9662: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:54 UTC 2016 ssl.sh: #9663: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:56 UTC 2016 ssl.sh: #9664: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:57 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9665: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:52:58 UTC 2016 ssl.sh: #9666: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:00 UTC 2016 ssl.sh: #9667: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:01 UTC 2016 ssl.sh: #9668: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:03 UTC 2016 ssl.sh: #9669: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:04 UTC 2016 ssl.sh: #9670: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:05 UTC 2016 ssl.sh: #9671: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:07 UTC 2016 ssl.sh: #9672: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:08 UTC 2016 ssl.sh: #9673: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:09 UTC 2016 ssl.sh: #9674: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:11 UTC 2016 ssl.sh: #9675: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:12 UTC 2016 ssl.sh: #9676: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:14 UTC 2016 ssl.sh: #9677: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:15 UTC 2016 ssl.sh: #9678: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:17 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9679: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:18 UTC 2016 ssl.sh: #9680: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:19 UTC 2016 ssl.sh: #9681: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:21 UTC 2016 ssl.sh: #9682: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:22 UTC 2016 ssl.sh: #9683: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:23 UTC 2016 ssl.sh: #9684: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:25 UTC 2016 ssl.sh: #9685: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:26 UTC 2016 ssl.sh: #9686: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:27 UTC 2016 ssl.sh: #9687: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:29 UTC 2016 ssl.sh: #9688: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:30 UTC 2016 ssl.sh: #9689: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:31 UTC 2016 ssl.sh: #9690: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:33 UTC 2016 ssl.sh: #9691: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10160 found at Mon Apr 25 18:53:34 UTC 2016 ssl.sh: #9692: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10160 at Mon Apr 25 18:53:34 UTC 2016 kill -USR1 10160 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10160 killed at Mon Apr 25 18:53:35 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:53:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:53:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:35 UTC 2016 selfserv_9709 with PID 11604 started at Mon Apr 25 18:53:35 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:37 UTC 2016 ssl.sh: #9693: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:38 UTC 2016 ssl.sh: #9694: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:39 UTC 2016 ssl.sh: #9695: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:40 UTC 2016 ssl.sh: #9696: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:42 UTC 2016 ssl.sh: #9697: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:43 UTC 2016 ssl.sh: #9698: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:44 UTC 2016 ssl.sh: #9699: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:45 UTC 2016 ssl.sh: #9700: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:47 UTC 2016 ssl.sh: #9701: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:48 UTC 2016 ssl.sh: #9702: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:49 UTC 2016 ssl.sh: #9703: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:50 UTC 2016 ssl.sh: #9704: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:52 UTC 2016 ssl.sh: #9705: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:53 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9706: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:54 UTC 2016 ssl.sh: #9707: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:56 UTC 2016 ssl.sh: #9708: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:57 UTC 2016 ssl.sh: #9709: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:58 UTC 2016 ssl.sh: #9710: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:53:59 UTC 2016 ssl.sh: #9711: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:00 UTC 2016 ssl.sh: #9712: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:01 UTC 2016 ssl.sh: #9713: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:03 UTC 2016 ssl.sh: #9714: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:04 UTC 2016 ssl.sh: #9715: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:05 UTC 2016 ssl.sh: #9716: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:06 UTC 2016 ssl.sh: #9717: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:07 UTC 2016 ssl.sh: #9718: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:09 UTC 2016 ssl.sh: #9719: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:10 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9720: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:11 UTC 2016 ssl.sh: #9721: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:13 UTC 2016 ssl.sh: #9722: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:14 UTC 2016 ssl.sh: #9723: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:15 UTC 2016 ssl.sh: #9724: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:16 UTC 2016 ssl.sh: #9725: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:17 UTC 2016 ssl.sh: #9726: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:18 UTC 2016 ssl.sh: #9727: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:20 UTC 2016 ssl.sh: #9728: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:21 UTC 2016 ssl.sh: #9729: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:22 UTC 2016 ssl.sh: #9730: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:23 UTC 2016 ssl.sh: #9731: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:24 UTC 2016 ssl.sh: #9732: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11604 found at Mon Apr 25 18:54:25 UTC 2016 ssl.sh: #9733: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11604 at Mon Apr 25 18:54:25 UTC 2016 kill -USR1 11604 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11604 killed at Mon Apr 25 18:54:26 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:54:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:54:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13045 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13045 found at Mon Apr 25 18:54:26 UTC 2016 selfserv_9709 with PID 13045 started at Mon Apr 25 18:54:26 UTC 2016 trying to kill selfserv_9709 with PID 13045 at Mon Apr 25 18:54:26 UTC 2016 kill -USR1 13045 ./ssl.sh: line 186: 13045 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13045 killed at Mon Apr 25 18:54:27 UTC 2016 selfserv_9709 starting at Mon Apr 25 18:54:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:54:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:27 UTC 2016 selfserv_9709 with PID 13079 started at Mon Apr 25 18:54:27 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:29 UTC 2016 ssl.sh: #9734: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:30 UTC 2016 ssl.sh: #9735: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:32 UTC 2016 ssl.sh: #9736: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:33 UTC 2016 ssl.sh: #9737: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:35 UTC 2016 ssl.sh: #9738: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:36 UTC 2016 ssl.sh: #9739: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:37 UTC 2016 ssl.sh: #9740: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:39 UTC 2016 ssl.sh: #9741: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:40 UTC 2016 ssl.sh: #9742: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:41 UTC 2016 ssl.sh: #9743: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:43 UTC 2016 ssl.sh: #9744: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:44 UTC 2016 ssl.sh: #9745: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:46 UTC 2016 ssl.sh: #9746: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:47 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9747: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:48 UTC 2016 ssl.sh: #9748: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:49 UTC 2016 ssl.sh: #9749: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:51 UTC 2016 ssl.sh: #9750: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:52 UTC 2016 ssl.sh: #9751: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:53 UTC 2016 ssl.sh: #9752: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:55 UTC 2016 ssl.sh: #9753: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:56 UTC 2016 ssl.sh: #9754: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:57 UTC 2016 ssl.sh: #9755: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:54:59 UTC 2016 ssl.sh: #9756: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:00 UTC 2016 ssl.sh: #9757: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:02 UTC 2016 ssl.sh: #9758: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:03 UTC 2016 ssl.sh: #9759: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:04 UTC 2016 ssl.sh: #9760: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:06 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9761: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:07 UTC 2016 ssl.sh: #9762: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:08 UTC 2016 ssl.sh: #9763: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:10 UTC 2016 ssl.sh: #9764: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:11 UTC 2016 ssl.sh: #9765: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:12 UTC 2016 ssl.sh: #9766: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:14 UTC 2016 ssl.sh: #9767: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:15 UTC 2016 ssl.sh: #9768: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:16 UTC 2016 ssl.sh: #9769: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:18 UTC 2016 ssl.sh: #9770: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:19 UTC 2016 ssl.sh: #9771: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:20 UTC 2016 ssl.sh: #9772: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:22 UTC 2016 ssl.sh: #9773: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13079 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13079 found at Mon Apr 25 18:55:23 UTC 2016 ssl.sh: #9774: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 13079 at Mon Apr 25 18:55:23 UTC 2016 kill -USR1 13079 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13079 killed at Mon Apr 25 18:55:23 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:55:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:55:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:24 UTC 2016 selfserv_9709 with PID 14522 started at Mon Apr 25 18:55:24 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:26 UTC 2016 ssl.sh: #9775: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:27 UTC 2016 ssl.sh: #9776: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:29 UTC 2016 ssl.sh: #9777: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:30 UTC 2016 ssl.sh: #9778: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:31 UTC 2016 ssl.sh: #9779: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:33 UTC 2016 ssl.sh: #9780: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:34 UTC 2016 ssl.sh: #9781: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:35 UTC 2016 ssl.sh: #9782: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:37 UTC 2016 ssl.sh: #9783: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:38 UTC 2016 ssl.sh: #9784: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:39 UTC 2016 ssl.sh: #9785: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:41 UTC 2016 ssl.sh: #9786: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:42 UTC 2016 ssl.sh: #9787: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:44 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9788: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:45 UTC 2016 ssl.sh: #9789: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:46 UTC 2016 ssl.sh: #9790: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:48 UTC 2016 ssl.sh: #9791: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:49 UTC 2016 ssl.sh: #9792: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:50 UTC 2016 ssl.sh: #9793: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:51 UTC 2016 ssl.sh: #9794: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:53 UTC 2016 ssl.sh: #9795: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:54 UTC 2016 ssl.sh: #9796: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:55 UTC 2016 ssl.sh: #9797: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:57 UTC 2016 ssl.sh: #9798: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:55:58 UTC 2016 ssl.sh: #9799: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:00 UTC 2016 ssl.sh: #9800: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:01 UTC 2016 ssl.sh: #9801: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:02 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9802: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:04 UTC 2016 ssl.sh: #9803: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:05 UTC 2016 ssl.sh: #9804: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:06 UTC 2016 ssl.sh: #9805: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:08 UTC 2016 ssl.sh: #9806: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:09 UTC 2016 ssl.sh: #9807: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:10 UTC 2016 ssl.sh: #9808: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:12 UTC 2016 ssl.sh: #9809: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:13 UTC 2016 ssl.sh: #9810: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:14 UTC 2016 ssl.sh: #9811: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:16 UTC 2016 ssl.sh: #9812: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:17 UTC 2016 ssl.sh: #9813: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:18 UTC 2016 ssl.sh: #9814: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14522 found at Mon Apr 25 18:56:20 UTC 2016 ssl.sh: #9815: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14522 at Mon Apr 25 18:56:20 UTC 2016 kill -USR1 14522 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14522 killed at Mon Apr 25 18:56:20 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:56:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:56:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:21 UTC 2016 selfserv_9709 with PID 15963 started at Mon Apr 25 18:56:21 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:22 UTC 2016 ssl.sh: #9816: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:23 UTC 2016 ssl.sh: #9817: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:24 UTC 2016 ssl.sh: #9818: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:26 UTC 2016 ssl.sh: #9819: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:27 UTC 2016 ssl.sh: #9820: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:28 UTC 2016 ssl.sh: #9821: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:29 UTC 2016 ssl.sh: #9822: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:30 UTC 2016 ssl.sh: #9823: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:31 UTC 2016 ssl.sh: #9824: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:32 UTC 2016 ssl.sh: #9825: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:34 UTC 2016 ssl.sh: #9826: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:35 UTC 2016 ssl.sh: #9827: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:36 UTC 2016 ssl.sh: #9828: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:37 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9829: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:38 UTC 2016 ssl.sh: #9830: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:39 UTC 2016 ssl.sh: #9831: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:41 UTC 2016 ssl.sh: #9832: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:42 UTC 2016 ssl.sh: #9833: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:43 UTC 2016 ssl.sh: #9834: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:44 UTC 2016 ssl.sh: #9835: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:45 UTC 2016 ssl.sh: #9836: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:46 UTC 2016 ssl.sh: #9837: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:47 UTC 2016 ssl.sh: #9838: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:48 UTC 2016 ssl.sh: #9839: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:50 UTC 2016 ssl.sh: #9840: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:51 UTC 2016 ssl.sh: #9841: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:52 UTC 2016 ssl.sh: #9842: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 111 bytes tstclnt: Writing 111 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:53 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9843: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:54 UTC 2016 ssl.sh: #9844: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:55 UTC 2016 ssl.sh: #9845: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:57 UTC 2016 ssl.sh: #9846: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:58 UTC 2016 ssl.sh: #9847: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:56:59 UTC 2016 ssl.sh: #9848: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:57:00 UTC 2016 ssl.sh: #9849: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:57:01 UTC 2016 ssl.sh: #9850: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:57:02 UTC 2016 ssl.sh: #9851: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:57:03 UTC 2016 ssl.sh: #9852: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:57:04 UTC 2016 ssl.sh: #9853: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:57:06 UTC 2016 ssl.sh: #9854: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:57:07 UTC 2016 ssl.sh: #9855: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15963 found at Mon Apr 25 18:57:08 UTC 2016 ssl.sh: #9856: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15963 at Mon Apr 25 18:57:08 UTC 2016 kill -USR1 15963 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15963 killed at Mon Apr 25 18:57:08 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:57:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:57:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:09 UTC 2016 selfserv_9709 with PID 17406 started at Mon Apr 25 18:57:09 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:11 UTC 2016 ssl.sh: #9857: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:12 UTC 2016 ssl.sh: #9858: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:14 UTC 2016 ssl.sh: #9859: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:15 UTC 2016 ssl.sh: #9860: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:17 UTC 2016 ssl.sh: #9861: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:18 UTC 2016 ssl.sh: #9862: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:19 UTC 2016 ssl.sh: #9863: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:21 UTC 2016 ssl.sh: #9864: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:22 UTC 2016 ssl.sh: #9865: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:24 UTC 2016 ssl.sh: #9866: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:25 UTC 2016 ssl.sh: #9867: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:27 UTC 2016 ssl.sh: #9868: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:28 UTC 2016 ssl.sh: #9869: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:30 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9870: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:31 UTC 2016 ssl.sh: #9871: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:32 UTC 2016 ssl.sh: #9872: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:34 UTC 2016 ssl.sh: #9873: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:35 UTC 2016 ssl.sh: #9874: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:36 UTC 2016 ssl.sh: #9875: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:38 UTC 2016 ssl.sh: #9876: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:39 UTC 2016 ssl.sh: #9877: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:41 UTC 2016 ssl.sh: #9878: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:42 UTC 2016 ssl.sh: #9879: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:43 UTC 2016 ssl.sh: #9880: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:45 UTC 2016 ssl.sh: #9881: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:46 UTC 2016 ssl.sh: #9882: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:48 UTC 2016 ssl.sh: #9883: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:49 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9884: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:50 UTC 2016 ssl.sh: #9885: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:52 UTC 2016 ssl.sh: #9886: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:53 UTC 2016 ssl.sh: #9887: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:55 UTC 2016 ssl.sh: #9888: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:56 UTC 2016 ssl.sh: #9889: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:57 UTC 2016 ssl.sh: #9890: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:57:59 UTC 2016 ssl.sh: #9891: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:58:00 UTC 2016 ssl.sh: #9892: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:58:01 UTC 2016 ssl.sh: #9893: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:58:03 UTC 2016 ssl.sh: #9894: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:58:04 UTC 2016 ssl.sh: #9895: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:58:06 UTC 2016 ssl.sh: #9896: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 17406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17406 found at Mon Apr 25 18:58:07 UTC 2016 ssl.sh: #9897: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 17406 at Mon Apr 25 18:58:07 UTC 2016 kill -USR1 17406 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17406 killed at Mon Apr 25 18:58:07 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:58:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:58:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:08 UTC 2016 selfserv_9709 with PID 18865 started at Mon Apr 25 18:58:08 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:10 UTC 2016 ssl.sh: #9898: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:11 UTC 2016 ssl.sh: #9899: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:13 UTC 2016 ssl.sh: #9900: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:14 UTC 2016 ssl.sh: #9901: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:15 UTC 2016 ssl.sh: #9902: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:17 UTC 2016 ssl.sh: #9903: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:18 UTC 2016 ssl.sh: #9904: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:20 UTC 2016 ssl.sh: #9905: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:21 UTC 2016 ssl.sh: #9906: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:23 UTC 2016 ssl.sh: #9907: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:24 UTC 2016 ssl.sh: #9908: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:26 UTC 2016 ssl.sh: #9909: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:27 UTC 2016 ssl.sh: #9910: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:28 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9911: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:30 UTC 2016 ssl.sh: #9912: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:31 UTC 2016 ssl.sh: #9913: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:33 UTC 2016 ssl.sh: #9914: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:34 UTC 2016 ssl.sh: #9915: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:35 UTC 2016 ssl.sh: #9916: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:36 UTC 2016 ssl.sh: #9917: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:38 UTC 2016 ssl.sh: #9918: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:39 UTC 2016 ssl.sh: #9919: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:41 UTC 2016 ssl.sh: #9920: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:42 UTC 2016 ssl.sh: #9921: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:44 UTC 2016 ssl.sh: #9922: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:45 UTC 2016 ssl.sh: #9923: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:46 UTC 2016 ssl.sh: #9924: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:48 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9925: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:49 UTC 2016 ssl.sh: #9926: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:51 UTC 2016 ssl.sh: #9927: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:52 UTC 2016 ssl.sh: #9928: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:53 UTC 2016 ssl.sh: #9929: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:55 UTC 2016 ssl.sh: #9930: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:56 UTC 2016 ssl.sh: #9931: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:57 UTC 2016 ssl.sh: #9932: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:58:59 UTC 2016 ssl.sh: #9933: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:59:00 UTC 2016 ssl.sh: #9934: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:59:01 UTC 2016 ssl.sh: #9935: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:59:03 UTC 2016 ssl.sh: #9936: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:59:04 UTC 2016 ssl.sh: #9937: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 18865 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 18865 found at Mon Apr 25 18:59:06 UTC 2016 ssl.sh: #9938: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 18865 at Mon Apr 25 18:59:06 UTC 2016 kill -USR1 18865 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 18865 killed at Mon Apr 25 18:59:06 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:59:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:59:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:07 UTC 2016 selfserv_9709 with PID 20308 started at Mon Apr 25 18:59:07 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:08 UTC 2016 ssl.sh: #9939: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:10 UTC 2016 ssl.sh: #9940: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:11 UTC 2016 ssl.sh: #9941: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:12 UTC 2016 ssl.sh: #9942: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:13 UTC 2016 ssl.sh: #9943: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:14 UTC 2016 ssl.sh: #9944: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:16 UTC 2016 ssl.sh: #9945: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:17 UTC 2016 ssl.sh: #9946: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:18 UTC 2016 ssl.sh: #9947: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:19 UTC 2016 ssl.sh: #9948: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:21 UTC 2016 ssl.sh: #9949: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:22 UTC 2016 ssl.sh: #9950: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:23 UTC 2016 ssl.sh: #9951: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:25 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9952: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:26 UTC 2016 ssl.sh: #9953: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:27 UTC 2016 ssl.sh: #9954: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:28 UTC 2016 ssl.sh: #9955: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:29 UTC 2016 ssl.sh: #9956: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:31 UTC 2016 ssl.sh: #9957: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:32 UTC 2016 ssl.sh: #9958: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:33 UTC 2016 ssl.sh: #9959: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:34 UTC 2016 ssl.sh: #9960: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:35 UTC 2016 ssl.sh: #9961: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:36 UTC 2016 ssl.sh: #9962: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:38 UTC 2016 ssl.sh: #9963: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:39 UTC 2016 ssl.sh: #9964: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:40 UTC 2016 ssl.sh: #9965: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:42 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #9966: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:43 UTC 2016 ssl.sh: #9967: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:44 UTC 2016 ssl.sh: #9968: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:45 UTC 2016 ssl.sh: #9969: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:46 UTC 2016 ssl.sh: #9970: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:48 UTC 2016 ssl.sh: #9971: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:49 UTC 2016 ssl.sh: #9972: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:50 UTC 2016 ssl.sh: #9973: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:51 UTC 2016 ssl.sh: #9974: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:52 UTC 2016 ssl.sh: #9975: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:53 UTC 2016 ssl.sh: #9976: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:55 UTC 2016 ssl.sh: #9977: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:56 UTC 2016 ssl.sh: #9978: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20308 found at Mon Apr 25 18:59:57 UTC 2016 ssl.sh: #9979: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 20308 at Mon Apr 25 18:59:57 UTC 2016 kill -USR1 20308 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20308 killed at Mon Apr 25 18:59:57 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 18:59:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:59:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21741 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21741 found at Mon Apr 25 18:59:58 UTC 2016 selfserv_9709 with PID 21741 started at Mon Apr 25 18:59:58 UTC 2016 trying to kill selfserv_9709 with PID 21741 at Mon Apr 25 18:59:58 UTC 2016 kill -USR1 21741 ./ssl.sh: line 186: 21741 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21741 killed at Mon Apr 25 18:59:58 UTC 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9709 starting at Mon Apr 25 18:59:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 18:59:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21781 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21781 found at Mon Apr 25 18:59:59 UTC 2016 selfserv_9709 with PID 21781 started at Mon Apr 25 18:59:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 0 ssl.sh: #9980: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 21781 at Mon Apr 25 19:00:00 UTC 2016 kill -USR1 21781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21781 killed at Mon Apr 25 19:00:01 UTC 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9709 starting at Mon Apr 25 19:00:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:00:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21831 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21831 found at Mon Apr 25 19:00:01 UTC 2016 selfserv_9709 with PID 21831 started at Mon Apr 25 19:00:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 3 ssl.sh: #9981: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9709 with PID 21831 at Mon Apr 25 19:00:03 UTC 2016 kill -USR1 21831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21831 killed at Mon Apr 25 19:00:03 UTC 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9709 starting at Mon Apr 25 19:00:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:00:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21894 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21894 found at Mon Apr 25 19:00:04 UTC 2016 selfserv_9709 with PID 21894 started at Mon Apr 25 19:00:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #9982: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 21894 at Mon Apr 25 19:00:05 UTC 2016 kill -USR1 21894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21894 killed at Mon Apr 25 19:00:06 UTC 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9709 starting at Mon Apr 25 19:00:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:00:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21943 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21943 found at Mon Apr 25 19:00:06 UTC 2016 selfserv_9709 with PID 21943 started at Mon Apr 25 19:00:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #9983: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 21943 at Mon Apr 25 19:00:07 UTC 2016 kill -USR1 21943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21943 killed at Mon Apr 25 19:00:08 UTC 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9709 starting at Mon Apr 25 19:00:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:00:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 21992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 21992 found at Mon Apr 25 19:00:08 UTC 2016 selfserv_9709 with PID 21992 started at Mon Apr 25 19:00:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #9984: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 21992 at Mon Apr 25 19:00:10 UTC 2016 kill -USR1 21992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 21992 killed at Mon Apr 25 19:00:10 UTC 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9709 starting at Mon Apr 25 19:00:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:00:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22041 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22041 found at Mon Apr 25 19:00:11 UTC 2016 selfserv_9709 with PID 22041 started at Mon Apr 25 19:00:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #9985: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 22041 at Mon Apr 25 19:00:12 UTC 2016 kill -USR1 22041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22041 killed at Mon Apr 25 19:00:12 UTC 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9709 starting at Mon Apr 25 19:00:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:00:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22090 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22090 found at Mon Apr 25 19:00:13 UTC 2016 selfserv_9709 with PID 22090 started at Mon Apr 25 19:00:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #9986: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 22090 at Mon Apr 25 19:00:14 UTC 2016 kill -USR1 22090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22090 killed at Mon Apr 25 19:00:14 UTC 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9709 starting at Mon Apr 25 19:00:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:00:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22139 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22139 found at Mon Apr 25 19:00:15 UTC 2016 selfserv_9709 with PID 22139 started at Mon Apr 25 19:00:15 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Mon Apr 25 19:00:15 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 19:02:11 UTC 2016 ssl.sh: #9987: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22139 at Mon Apr 25 19:02:11 UTC 2016 kill -USR1 22139 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22139 killed at Mon Apr 25 19:02:11 UTC 2016 ssl.sh: SSL Stress Test - server bypass/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 19:02:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22348 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22348 found at Mon Apr 25 19:02:12 UTC 2016 selfserv_9709 with PID 22348 started at Mon Apr 25 19:02:12 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:02:14 UTC 2016 ssl.sh: #9988: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22348 at Mon Apr 25 19:02:14 UTC 2016 kill -USR1 22348 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22348 killed at Mon Apr 25 19:02:14 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 19:02:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22424 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22424 found at Mon Apr 25 19:02:15 UTC 2016 selfserv_9709 with PID 22424 started at Mon Apr 25 19:02:15 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:15 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:02:17 UTC 2016 ssl.sh: #9989: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22424 at Mon Apr 25 19:02:17 UTC 2016 kill -USR1 22424 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22424 killed at Mon Apr 25 19:02:17 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 19:02:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22500 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22500 found at Mon Apr 25 19:02:18 UTC 2016 selfserv_9709 with PID 22500 started at Mon Apr 25 19:02:18 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:18 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:02:20 UTC 2016 ssl.sh: #9990: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22500 at Mon Apr 25 19:02:20 UTC 2016 kill -USR1 22500 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22500 killed at Mon Apr 25 19:02:20 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 19:02:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22576 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22576 found at Mon Apr 25 19:02:21 UTC 2016 selfserv_9709 with PID 22576 started at Mon Apr 25 19:02:21 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:21 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:02:23 UTC 2016 ssl.sh: #9991: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22576 at Mon Apr 25 19:02:23 UTC 2016 kill -USR1 22576 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22576 killed at Mon Apr 25 19:02:23 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 19:02:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22653 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22653 found at Mon Apr 25 19:02:24 UTC 2016 selfserv_9709 with PID 22653 started at Mon Apr 25 19:02:24 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:24 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:02:26 UTC 2016 ssl.sh: #9992: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22653 at Mon Apr 25 19:02:26 UTC 2016 kill -USR1 22653 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22653 killed at Mon Apr 25 19:02:27 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 19:02:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22729 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22729 found at Mon Apr 25 19:02:27 UTC 2016 selfserv_9709 with PID 22729 started at Mon Apr 25 19:02:27 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:02:30 UTC 2016 ssl.sh: #9993: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22729 at Mon Apr 25 19:02:30 UTC 2016 kill -USR1 22729 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22729 killed at Mon Apr 25 19:02:30 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 19:02:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22805 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22805 found at Mon Apr 25 19:02:31 UTC 2016 selfserv_9709 with PID 22805 started at Mon Apr 25 19:02:31 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:31 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:02:33 UTC 2016 ssl.sh: #9994: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22805 at Mon Apr 25 19:02:33 UTC 2016 kill -USR1 22805 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22805 killed at Mon Apr 25 19:02:33 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9709 starting at Mon Apr 25 19:02:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22887 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22887 found at Mon Apr 25 19:02:34 UTC 2016 selfserv_9709 with PID 22887 started at Mon Apr 25 19:02:34 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:34 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:02:36 UTC 2016 ssl.sh: #9995: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22887 at Mon Apr 25 19:02:36 UTC 2016 kill -USR1 22887 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22887 killed at Mon Apr 25 19:02:37 UTC 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:02:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22991 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22991 found at Mon Apr 25 19:02:37 UTC 2016 selfserv_9709 with PID 22991 started at Mon Apr 25 19:02:37 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:02:42 UTC 2016 ssl.sh: #9996: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 22991 at Mon Apr 25 19:02:42 UTC 2016 kill -USR1 22991 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22991 killed at Mon Apr 25 19:02:43 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:02:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23070 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23070 found at Mon Apr 25 19:02:43 UTC 2016 selfserv_9709 with PID 23070 started at Mon Apr 25 19:02:43 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 100 -C c -V ssl3: -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:43 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:02:48 UTC 2016 ssl.sh: #9997: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23070 at Mon Apr 25 19:02:49 UTC 2016 kill -USR1 23070 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23070 killed at Mon Apr 25 19:02:49 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:02:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23145 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23145 found at Mon Apr 25 19:02:49 UTC 2016 selfserv_9709 with PID 23145 started at Mon Apr 25 19:02:49 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:02:51 UTC 2016 ssl.sh: #9998: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23145 at Mon Apr 25 19:02:51 UTC 2016 kill -USR1 23145 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23145 killed at Mon Apr 25 19:02:51 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:02:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23221 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23221 found at Mon Apr 25 19:02:52 UTC 2016 selfserv_9709 with PID 23221 started at Mon Apr 25 19:02:52 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:02:53 UTC 2016 ssl.sh: #9999: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23221 at Mon Apr 25 19:02:53 UTC 2016 kill -USR1 23221 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23221 killed at Mon Apr 25 19:02:54 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 19:02:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23297 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23297 found at Mon Apr 25 19:02:54 UTC 2016 selfserv_9709 with PID 23297 started at Mon Apr 25 19:02:54 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:02:56 UTC 2016 ssl.sh: #10000: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23297 at Mon Apr 25 19:02:56 UTC 2016 kill -USR1 23297 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23297 killed at Mon Apr 25 19:02:56 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:02:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23373 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23373 found at Mon Apr 25 19:02:57 UTC 2016 selfserv_9709 with PID 23373 started at Mon Apr 25 19:02:57 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:02:58 UTC 2016 ssl.sh: #10001: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23373 at Mon Apr 25 19:02:58 UTC 2016 kill -USR1 23373 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23373 killed at Mon Apr 25 19:02:59 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 19:02:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:02:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23449 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23449 found at Mon Apr 25 19:02:59 UTC 2016 selfserv_9709 with PID 23449 started at Mon Apr 25 19:02:59 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 19:02:59 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:03:01 UTC 2016 ssl.sh: #10002: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23449 at Mon Apr 25 19:03:01 UTC 2016 kill -USR1 23449 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23449 killed at Mon Apr 25 19:03:01 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9709 starting at Mon Apr 25 19:03:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:03:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23533 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23533 found at Mon Apr 25 19:03:02 UTC 2016 selfserv_9709 with PID 23533 started at Mon Apr 25 19:03:02 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:03:02 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:03:05 UTC 2016 ssl.sh: #10003: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23533 at Mon Apr 25 19:03:05 UTC 2016 kill -USR1 23533 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23533 killed at Mon Apr 25 19:03:05 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9709 starting at Mon Apr 25 19:03:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:03:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23629 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23629 found at Mon Apr 25 19:03:06 UTC 2016 selfserv_9709 with PID 23629 started at Mon Apr 25 19:03:06 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Apr 25 19:03:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:03:09 UTC 2016 ssl.sh: #10004: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23629 at Mon Apr 25 19:03:09 UTC 2016 kill -USR1 23629 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23629 killed at Mon Apr 25 19:03:09 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:03:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:03:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23726 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23726 found at Mon Apr 25 19:03:10 UTC 2016 selfserv_9709 with PID 23726 started at Mon Apr 25 19:03:10 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:03:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:03:17 UTC 2016 ssl.sh: #10005: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23726 at Mon Apr 25 19:03:17 UTC 2016 kill -USR1 23726 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23726 killed at Mon Apr 25 19:03:18 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:03:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:03:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23803 found at Mon Apr 25 19:03:18 UTC 2016 selfserv_9709 with PID 23803 started at Mon Apr 25 19:03:18 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:03:18 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:03:26 UTC 2016 ssl.sh: #10006: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23803 at Mon Apr 25 19:03:26 UTC 2016 kill -USR1 23803 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23803 killed at Mon Apr 25 19:03:27 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:03:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:03:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23879 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23879 found at Mon Apr 25 19:03:27 UTC 2016 selfserv_9709 with PID 23879 started at Mon Apr 25 19:03:27 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:03:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:03:35 UTC 2016 ssl.sh: #10007: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23879 at Mon Apr 25 19:03:35 UTC 2016 kill -USR1 23879 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23879 killed at Mon Apr 25 19:03:35 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:03:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:03:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23954 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23954 found at Mon Apr 25 19:03:36 UTC 2016 selfserv_9709 with PID 23954 started at Mon Apr 25 19:03:36 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:03:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:03:46 UTC 2016 ssl.sh: #10008: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 23954 at Mon Apr 25 19:03:46 UTC 2016 kill -USR1 23954 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23954 killed at Mon Apr 25 19:03:46 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:03:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:03:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24033 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24033 found at Mon Apr 25 19:03:47 UTC 2016 selfserv_9709 with PID 24033 started at Mon Apr 25 19:03:47 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:03:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:03:54 UTC 2016 ssl.sh: #10009: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24033 at Mon Apr 25 19:03:54 UTC 2016 kill -USR1 24033 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24033 killed at Mon Apr 25 19:03:54 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 19:03:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:03:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24108 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24108 found at Mon Apr 25 19:03:55 UTC 2016 selfserv_9709 with PID 24108 started at Mon Apr 25 19:03:55 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 19:03:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:03:57 UTC 2016 ssl.sh: #10010: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24108 at Mon Apr 25 19:03:57 UTC 2016 kill -USR1 24108 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24108 killed at Mon Apr 25 19:03:57 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 19:03:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:03:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24184 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24184 found at Mon Apr 25 19:03:58 UTC 2016 selfserv_9709 with PID 24184 started at Mon Apr 25 19:03:58 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 19:03:58 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:04:00 UTC 2016 ssl.sh: #10011: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24184 at Mon Apr 25 19:04:00 UTC 2016 kill -USR1 24184 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24184 killed at Mon Apr 25 19:04:00 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 19:04:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24260 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24260 found at Mon Apr 25 19:04:01 UTC 2016 selfserv_9709 with PID 24260 started at Mon Apr 25 19:04:01 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:04:03 UTC 2016 ssl.sh: #10012: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24260 at Mon Apr 25 19:04:03 UTC 2016 kill -USR1 24260 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24260 killed at Mon Apr 25 19:04:04 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 19:04:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24349 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24349 found at Mon Apr 25 19:04:04 UTC 2016 selfserv_9709 with PID 24349 started at Mon Apr 25 19:04:04 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:04:07 UTC 2016 ssl.sh: #10013: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24349 at Mon Apr 25 19:04:07 UTC 2016 kill -USR1 24349 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24349 killed at Mon Apr 25 19:04:07 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 19:04:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24426 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24426 found at Mon Apr 25 19:04:08 UTC 2016 selfserv_9709 with PID 24426 started at Mon Apr 25 19:04:08 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:04:09 UTC 2016 ssl.sh: #10014: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24426 at Mon Apr 25 19:04:09 UTC 2016 kill -USR1 24426 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24426 killed at Mon Apr 25 19:04:10 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:04:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24523 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24523 found at Mon Apr 25 19:04:10 UTC 2016 selfserv_9709 with PID 24523 started at Mon Apr 25 19:04:10 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:10 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 19:04:13 UTC 2016 ssl.sh: #10015: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24523 at Mon Apr 25 19:04:13 UTC 2016 kill -USR1 24523 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24523 killed at Mon Apr 25 19:04:13 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:04:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24598 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24598 found at Mon Apr 25 19:04:14 UTC 2016 selfserv_9709 with PID 24598 started at Mon Apr 25 19:04:14 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:04:15 UTC 2016 ssl.sh: #10016: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24598 at Mon Apr 25 19:04:16 UTC 2016 kill -USR1 24598 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24598 killed at Mon Apr 25 19:04:16 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:04:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24674 found at Mon Apr 25 19:04:16 UTC 2016 selfserv_9709 with PID 24674 started at Mon Apr 25 19:04:16 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 19:04:20 UTC 2016 ssl.sh: #10017: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24674 at Mon Apr 25 19:04:20 UTC 2016 kill -USR1 24674 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24674 killed at Mon Apr 25 19:04:20 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:04:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24749 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24749 found at Mon Apr 25 19:04:21 UTC 2016 selfserv_9709 with PID 24749 started at Mon Apr 25 19:04:21 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:21 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 19:04:23 UTC 2016 ssl.sh: #10018: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24749 at Mon Apr 25 19:04:23 UTC 2016 kill -USR1 24749 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24749 killed at Mon Apr 25 19:04:23 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 19:04:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24824 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24824 found at Mon Apr 25 19:04:24 UTC 2016 selfserv_9709 with PID 24824 started at Mon Apr 25 19:04:24 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:24 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:04:26 UTC 2016 ssl.sh: #10019: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24824 at Mon Apr 25 19:04:26 UTC 2016 kill -USR1 24824 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24824 killed at Mon Apr 25 19:04:26 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:04:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24901 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24901 found at Mon Apr 25 19:04:27 UTC 2016 selfserv_9709 with PID 24901 started at Mon Apr 25 19:04:27 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:04:28 UTC 2016 ssl.sh: #10020: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24901 at Mon Apr 25 19:04:28 UTC 2016 kill -USR1 24901 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24901 killed at Mon Apr 25 19:04:29 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:04:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24998 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24998 found at Mon Apr 25 19:04:29 UTC 2016 selfserv_9709 with PID 24998 started at Mon Apr 25 19:04:29 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:04:35 UTC 2016 ssl.sh: #10021: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 24998 at Mon Apr 25 19:04:35 UTC 2016 kill -USR1 24998 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24998 killed at Mon Apr 25 19:04:36 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 19:04:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25073 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25073 found at Mon Apr 25 19:04:36 UTC 2016 selfserv_9709 with PID 25073 started at Mon Apr 25 19:04:36 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:04:39 UTC 2016 ssl.sh: #10022: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25073 at Mon Apr 25 19:04:39 UTC 2016 kill -USR1 25073 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25073 killed at Mon Apr 25 19:04:39 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:04:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25149 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25149 found at Mon Apr 25 19:04:40 UTC 2016 selfserv_9709 with PID 25149 started at Mon Apr 25 19:04:40 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:04:46 UTC 2016 ssl.sh: #10023: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25149 at Mon Apr 25 19:04:46 UTC 2016 kill -USR1 25149 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25149 killed at Mon Apr 25 19:04:46 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:04:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25228 found at Mon Apr 25 19:04:47 UTC 2016 selfserv_9709 with PID 25228 started at Mon Apr 25 19:04:47 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:04:55 UTC 2016 ssl.sh: #10024: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25228 at Mon Apr 25 19:04:55 UTC 2016 kill -USR1 25228 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25228 killed at Mon Apr 25 19:04:55 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:04:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:04:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25317 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25317 found at Mon Apr 25 19:04:56 UTC 2016 selfserv_9709 with PID 25317 started at Mon Apr 25 19:04:56 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:04:56 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 19:06:01 UTC 2016 ssl.sh: #10025: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25317 at Mon Apr 25 19:06:01 UTC 2016 kill -USR1 25317 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25317 killed at Mon Apr 25 19:06:02 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 19:06:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:06:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25438 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25438 found at Mon Apr 25 19:06:02 UTC 2016 selfserv_9709 with PID 25438 started at Mon Apr 25 19:06:02 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:06:02 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 19:07:08 UTC 2016 ssl.sh: #10026: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25438 at Mon Apr 25 19:07:08 UTC 2016 kill -USR1 25438 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25438 killed at Mon Apr 25 19:07:08 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:07:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:07:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25535 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25535 found at Mon Apr 25 19:07:09 UTC 2016 selfserv_9709 with PID 25535 started at Mon Apr 25 19:07:09 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:07:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:07:15 UTC 2016 ssl.sh: #10027: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25535 at Mon Apr 25 19:07:15 UTC 2016 kill -USR1 25535 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25535 killed at Mon Apr 25 19:07:16 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:07:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:07:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25611 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25611 found at Mon Apr 25 19:07:16 UTC 2016 selfserv_9709 with PID 25611 started at Mon Apr 25 19:07:16 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:07:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:07:22 UTC 2016 ssl.sh: #10028: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25611 at Mon Apr 25 19:07:22 UTC 2016 kill -USR1 25611 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25611 killed at Mon Apr 25 19:07:23 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:07:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:07:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25707 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25707 found at Mon Apr 25 19:07:23 UTC 2016 selfserv_9709 with PID 25707 started at Mon Apr 25 19:07:23 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 19:07:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:07:34 UTC 2016 ssl.sh: #10029: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25707 at Mon Apr 25 19:07:34 UTC 2016 kill -USR1 25707 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25707 killed at Mon Apr 25 19:07:35 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:07:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:07:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25783 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25783 found at Mon Apr 25 19:07:35 UTC 2016 selfserv_9709 with PID 25783 started at Mon Apr 25 19:07:35 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 19:07:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:07:38 UTC 2016 ssl.sh: #10030: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25783 at Mon Apr 25 19:07:38 UTC 2016 kill -USR1 25783 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25783 killed at Mon Apr 25 19:07:38 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:07:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:07:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 25873 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 25873 found at Mon Apr 25 19:07:39 UTC 2016 selfserv_9709 with PID 25873 started at Mon Apr 25 19:07:39 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 19:07:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 19:09:17 UTC 2016 ssl.sh: #10031: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 25873 at Mon Apr 25 19:09:18 UTC 2016 kill -USR1 25873 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 25873 killed at Mon Apr 25 19:09:18 UTC 2016 ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 19:09:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26062 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26062 found at Mon Apr 25 19:09:19 UTC 2016 selfserv_9709 with PID 26062 started at Mon Apr 25 19:09:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:09:21 UTC 2016 ssl.sh: #10032: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26062 at Mon Apr 25 19:09:21 UTC 2016 kill -USR1 26062 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26062 killed at Mon Apr 25 19:09:21 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 19:09:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26138 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26138 found at Mon Apr 25 19:09:22 UTC 2016 selfserv_9709 with PID 26138 started at Mon Apr 25 19:09:22 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:09:24 UTC 2016 ssl.sh: #10033: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26138 at Mon Apr 25 19:09:24 UTC 2016 kill -USR1 26138 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26138 killed at Mon Apr 25 19:09:24 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 19:09:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26214 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26214 found at Mon Apr 25 19:09:25 UTC 2016 selfserv_9709 with PID 26214 started at Mon Apr 25 19:09:25 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:09:27 UTC 2016 ssl.sh: #10034: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26214 at Mon Apr 25 19:09:27 UTC 2016 kill -USR1 26214 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26214 killed at Mon Apr 25 19:09:28 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 19:09:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26290 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26290 found at Mon Apr 25 19:09:28 UTC 2016 selfserv_9709 with PID 26290 started at Mon Apr 25 19:09:28 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:28 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:09:30 UTC 2016 ssl.sh: #10035: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26290 at Mon Apr 25 19:09:31 UTC 2016 kill -USR1 26290 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26290 killed at Mon Apr 25 19:09:31 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 19:09:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26366 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26366 found at Mon Apr 25 19:09:31 UTC 2016 selfserv_9709 with PID 26366 started at Mon Apr 25 19:09:31 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:31 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:09:34 UTC 2016 ssl.sh: #10036: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26366 at Mon Apr 25 19:09:34 UTC 2016 kill -USR1 26366 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26366 killed at Mon Apr 25 19:09:34 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 19:09:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26443 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26443 found at Mon Apr 25 19:09:35 UTC 2016 selfserv_9709 with PID 26443 started at Mon Apr 25 19:09:35 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:35 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:09:38 UTC 2016 ssl.sh: #10037: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26443 at Mon Apr 25 19:09:38 UTC 2016 kill -USR1 26443 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26443 killed at Mon Apr 25 19:09:38 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 19:09:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26519 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26519 found at Mon Apr 25 19:09:39 UTC 2016 selfserv_9709 with PID 26519 started at Mon Apr 25 19:09:39 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:09:41 UTC 2016 ssl.sh: #10038: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26519 at Mon Apr 25 19:09:41 UTC 2016 kill -USR1 26519 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26519 killed at Mon Apr 25 19:09:42 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:09:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26627 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26627 found at Mon Apr 25 19:09:42 UTC 2016 selfserv_9709 with PID 26627 started at Mon Apr 25 19:09:42 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:42 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:09:50 UTC 2016 ssl.sh: #10039: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26627 at Mon Apr 25 19:09:50 UTC 2016 kill -USR1 26627 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26627 killed at Mon Apr 25 19:09:50 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:09:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26702 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26702 found at Mon Apr 25 19:09:50 UTC 2016 selfserv_9709 with PID 26702 started at Mon Apr 25 19:09:51 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3: -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:51 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:09:58 UTC 2016 ssl.sh: #10040: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26702 at Mon Apr 25 19:09:58 UTC 2016 kill -USR1 26702 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26702 killed at Mon Apr 25 19:09:58 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:09:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:09:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26778 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26778 found at Mon Apr 25 19:09:59 UTC 2016 selfserv_9709 with PID 26778 started at Mon Apr 25 19:09:59 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:09:59 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:10:00 UTC 2016 ssl.sh: #10041: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26778 at Mon Apr 25 19:10:00 UTC 2016 kill -USR1 26778 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26778 killed at Mon Apr 25 19:10:01 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:10:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:10:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26867 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26867 found at Mon Apr 25 19:10:01 UTC 2016 selfserv_9709 with PID 26867 started at Mon Apr 25 19:10:01 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 19:10:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:10:03 UTC 2016 ssl.sh: #10042: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26867 at Mon Apr 25 19:10:03 UTC 2016 kill -USR1 26867 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26867 killed at Mon Apr 25 19:10:03 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 19:10:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:10:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26943 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26943 found at Mon Apr 25 19:10:04 UTC 2016 selfserv_9709 with PID 26943 started at Mon Apr 25 19:10:04 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 19:10:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:10:06 UTC 2016 ssl.sh: #10043: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 26943 at Mon Apr 25 19:10:06 UTC 2016 kill -USR1 26943 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26943 killed at Mon Apr 25 19:10:06 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:10:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:10:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27019 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27019 found at Mon Apr 25 19:10:07 UTC 2016 selfserv_9709 with PID 27019 started at Mon Apr 25 19:10:07 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 19:10:07 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:10:08 UTC 2016 ssl.sh: #10044: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27019 at Mon Apr 25 19:10:08 UTC 2016 kill -USR1 27019 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27019 killed at Mon Apr 25 19:10:09 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 19:10:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:10:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27095 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27095 found at Mon Apr 25 19:10:09 UTC 2016 selfserv_9709 with PID 27095 started at Mon Apr 25 19:10:09 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 19:10:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:10:11 UTC 2016 ssl.sh: #10045: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27095 at Mon Apr 25 19:10:11 UTC 2016 kill -USR1 27095 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27095 killed at Mon Apr 25 19:10:12 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:10:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:10:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27200 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27200 found at Mon Apr 25 19:10:12 UTC 2016 selfserv_9709 with PID 27200 started at Mon Apr 25 19:10:12 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:10:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:10:23 UTC 2016 ssl.sh: #10046: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27200 at Mon Apr 25 19:10:24 UTC 2016 kill -USR1 27200 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27200 killed at Mon Apr 25 19:10:24 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:10:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:10:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27276 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27276 found at Mon Apr 25 19:10:24 UTC 2016 selfserv_9709 with PID 27276 started at Mon Apr 25 19:10:24 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:10:24 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:10:36 UTC 2016 ssl.sh: #10047: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27276 at Mon Apr 25 19:10:36 UTC 2016 kill -USR1 27276 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27276 killed at Mon Apr 25 19:10:36 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:10:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:10:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27352 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27352 found at Mon Apr 25 19:10:37 UTC 2016 selfserv_9709 with PID 27352 started at Mon Apr 25 19:10:37 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:10:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:10:48 UTC 2016 ssl.sh: #10048: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27352 at Mon Apr 25 19:10:48 UTC 2016 kill -USR1 27352 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27352 killed at Mon Apr 25 19:10:48 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:10:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:10:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27430 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27430 found at Mon Apr 25 19:10:49 UTC 2016 selfserv_9709 with PID 27430 started at Mon Apr 25 19:10:49 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:10:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:11:00 UTC 2016 ssl.sh: #10049: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27430 at Mon Apr 25 19:11:00 UTC 2016 kill -USR1 27430 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27430 killed at Mon Apr 25 19:11:00 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:11:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27506 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27506 found at Mon Apr 25 19:11:01 UTC 2016 selfserv_9709 with PID 27506 started at Mon Apr 25 19:11:01 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:11:03 UTC 2016 ssl.sh: #10050: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27506 at Mon Apr 25 19:11:03 UTC 2016 kill -USR1 27506 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27506 killed at Mon Apr 25 19:11:04 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 19:11:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27596 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27596 found at Mon Apr 25 19:11:04 UTC 2016 selfserv_9709 with PID 27596 started at Mon Apr 25 19:11:04 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:11:07 UTC 2016 ssl.sh: #10051: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27596 at Mon Apr 25 19:11:07 UTC 2016 kill -USR1 27596 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27596 killed at Mon Apr 25 19:11:07 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 19:11:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27672 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27672 found at Mon Apr 25 19:11:08 UTC 2016 selfserv_9709 with PID 27672 started at Mon Apr 25 19:11:08 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:11:10 UTC 2016 ssl.sh: #10052: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27672 at Mon Apr 25 19:11:10 UTC 2016 kill -USR1 27672 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27672 killed at Mon Apr 25 19:11:10 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 19:11:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27748 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27748 found at Mon Apr 25 19:11:11 UTC 2016 selfserv_9709 with PID 27748 started at Mon Apr 25 19:11:11 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:11 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:11:13 UTC 2016 ssl.sh: #10053: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27748 at Mon Apr 25 19:11:13 UTC 2016 kill -USR1 27748 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27748 killed at Mon Apr 25 19:11:14 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 19:11:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27825 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27825 found at Mon Apr 25 19:11:14 UTC 2016 selfserv_9709 with PID 27825 started at Mon Apr 25 19:11:14 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:14 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 19:11:17 UTC 2016 ssl.sh: #10054: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27825 at Mon Apr 25 19:11:17 UTC 2016 kill -USR1 27825 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27825 killed at Mon Apr 25 19:11:17 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 19:11:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27901 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27901 found at Mon Apr 25 19:11:18 UTC 2016 selfserv_9709 with PID 27901 started at Mon Apr 25 19:11:18 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:18 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:11:19 UTC 2016 ssl.sh: #10055: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27901 at Mon Apr 25 19:11:19 UTC 2016 kill -USR1 27901 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27901 killed at Mon Apr 25 19:11:20 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:11:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27998 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27998 found at Mon Apr 25 19:11:20 UTC 2016 selfserv_9709 with PID 27998 started at Mon Apr 25 19:11:20 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:20 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 19:11:24 UTC 2016 ssl.sh: #10056: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 27998 at Mon Apr 25 19:11:24 UTC 2016 kill -USR1 27998 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27998 killed at Mon Apr 25 19:11:25 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:11:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28074 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28074 found at Mon Apr 25 19:11:25 UTC 2016 selfserv_9709 with PID 28074 started at Mon Apr 25 19:11:25 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:11:27 UTC 2016 ssl.sh: #10057: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28074 at Mon Apr 25 19:11:27 UTC 2016 kill -USR1 28074 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28074 killed at Mon Apr 25 19:11:28 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:11:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28151 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28151 found at Mon Apr 25 19:11:28 UTC 2016 selfserv_9709 with PID 28151 started at Mon Apr 25 19:11:28 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:28 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 19:11:32 UTC 2016 ssl.sh: #10058: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28151 at Mon Apr 25 19:11:32 UTC 2016 kill -USR1 28151 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28151 killed at Mon Apr 25 19:11:32 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:11:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28228 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28228 found at Mon Apr 25 19:11:33 UTC 2016 selfserv_9709 with PID 28228 started at Mon Apr 25 19:11:33 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:33 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 19:11:35 UTC 2016 ssl.sh: #10059: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28228 at Mon Apr 25 19:11:35 UTC 2016 kill -USR1 28228 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28228 killed at Mon Apr 25 19:11:35 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 19:11:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28304 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28304 found at Mon Apr 25 19:11:36 UTC 2016 selfserv_9709 with PID 28304 started at Mon Apr 25 19:11:36 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:11:38 UTC 2016 ssl.sh: #10060: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28304 at Mon Apr 25 19:11:38 UTC 2016 kill -USR1 28304 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28304 killed at Mon Apr 25 19:11:38 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:11:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28380 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28380 found at Mon Apr 25 19:11:39 UTC 2016 selfserv_9709 with PID 28380 started at Mon Apr 25 19:11:39 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 19:11:40 UTC 2016 ssl.sh: #10061: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28380 at Mon Apr 25 19:11:40 UTC 2016 kill -USR1 28380 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28380 killed at Mon Apr 25 19:11:41 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:11:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28477 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28477 found at Mon Apr 25 19:11:41 UTC 2016 selfserv_9709 with PID 28477 started at Mon Apr 25 19:11:41 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:41 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:11:48 UTC 2016 ssl.sh: #10062: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28477 at Mon Apr 25 19:11:48 UTC 2016 kill -USR1 28477 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28477 killed at Mon Apr 25 19:11:49 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 19:11:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28555 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28555 found at Mon Apr 25 19:11:49 UTC 2016 selfserv_9709 with PID 28555 started at Mon Apr 25 19:11:49 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:11:52 UTC 2016 ssl.sh: #10063: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28555 at Mon Apr 25 19:11:52 UTC 2016 kill -USR1 28555 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28555 killed at Mon Apr 25 19:11:52 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:11:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:11:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28631 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28631 found at Mon Apr 25 19:11:53 UTC 2016 selfserv_9709 with PID 28631 started at Mon Apr 25 19:11:53 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:11:53 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:11:59 UTC 2016 ssl.sh: #10064: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28631 at Mon Apr 25 19:11:59 UTC 2016 kill -USR1 28631 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28631 killed at Mon Apr 25 19:12:00 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:12:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:12:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28707 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28707 found at Mon Apr 25 19:12:00 UTC 2016 selfserv_9709 with PID 28707 started at Mon Apr 25 19:12:00 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:12:00 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:12:10 UTC 2016 ssl.sh: #10065: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28707 at Mon Apr 25 19:12:11 UTC 2016 kill -USR1 28707 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28707 killed at Mon Apr 25 19:12:11 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:12:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:12:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28809 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28809 found at Mon Apr 25 19:12:12 UTC 2016 selfserv_9709 with PID 28809 started at Mon Apr 25 19:12:12 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:12:12 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 19:13:43 UTC 2016 ssl.sh: #10066: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28809 at Mon Apr 25 19:13:43 UTC 2016 kill -USR1 28809 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28809 killed at Mon Apr 25 19:13:44 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 19:13:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:13:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 28922 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 28922 found at Mon Apr 25 19:13:44 UTC 2016 selfserv_9709 with PID 28922 started at Mon Apr 25 19:13:44 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:13:44 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 19:15:15 UTC 2016 ssl.sh: #10067: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 28922 at Mon Apr 25 19:15:16 UTC 2016 kill -USR1 28922 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 28922 killed at Mon Apr 25 19:15:16 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:15:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:15:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29032 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29032 found at Mon Apr 25 19:15:16 UTC 2016 selfserv_9709 with PID 29032 started at Mon Apr 25 19:15:16 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:15:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:15:23 UTC 2016 ssl.sh: #10068: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 29032 at Mon Apr 25 19:15:23 UTC 2016 kill -USR1 29032 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29032 killed at Mon Apr 25 19:15:23 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 19:15:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:15:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29108 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29108 found at Mon Apr 25 19:15:24 UTC 2016 selfserv_9709 with PID 29108 started at Mon Apr 25 19:15:24 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 19:15:24 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:15:30 UTC 2016 ssl.sh: #10069: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 29108 at Mon Apr 25 19:15:31 UTC 2016 kill -USR1 29108 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29108 killed at Mon Apr 25 19:15:31 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:15:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:15:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29204 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29204 found at Mon Apr 25 19:15:32 UTC 2016 selfserv_9709 with PID 29204 started at Mon Apr 25 19:15:32 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 19:15:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 19:15:49 UTC 2016 ssl.sh: #10070: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 29204 at Mon Apr 25 19:15:49 UTC 2016 kill -USR1 29204 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29204 killed at Mon Apr 25 19:15:49 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:15:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:15:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29283 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29283 found at Mon Apr 25 19:15:50 UTC 2016 selfserv_9709 with PID 29283 started at Mon Apr 25 19:15:50 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 19:15:50 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 19:15:53 UTC 2016 ssl.sh: #10071: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 29283 at Mon Apr 25 19:15:53 UTC 2016 kill -USR1 29283 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29283 killed at Mon Apr 25 19:15:53 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 19:15:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:15:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29373 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29373 found at Mon Apr 25 19:15:54 UTC 2016 selfserv_9709 with PID 29373 started at Mon Apr 25 19:15:54 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 19:15:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 19:18:34 UTC 2016 ssl.sh: #10072: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 29373 at Mon Apr 25 19:18:34 UTC 2016 kill -USR1 29373 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29373 killed at Mon Apr 25 19:18:34 UTC 2016 TIMESTAMP ssl END: Mon Apr 25 19:18:34 UTC 2016 Checking if ocsp should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Checking if merge should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Running tests for merge TIMESTAMP merge BEGIN: Mon Apr 25 19:18:34 UTC 2016 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/tests.v3.28098 -t Test2 -f ../tests.pw merge.sh: #10073: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #10074: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #10075: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #10076: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #10077: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #10078: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:55:47 2016 Not After : Sun Apr 25 13:55:47 2021 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:eb:05:32:47:b9:4c:9d:05:60:6a:ba:b1:7c:27:06: 8f:37:bd:8b:cf:1d:b8:ad:8f:f3:47:90:53:39:ef:61: 23:a0:2b:b0:ba:a5:cd:72:f4:33:db:16:07:0b:b4:70: 3c:ec:d8:ce:21:a5:31:d3:35:80:95:fa:6d:96:26:5e: 49:92:a1:68:9f:9e:fb:71:8c:cd:4d:4e:92:14:9b:0f: 3e:ce:bc:ad:0a:06:ee:93:97:aa:8f:c2:2f:3a:1f:24: 12:2d:7a:6a:5f:1b:69:ed:32:66:8d:9d:e0:ac:ee:f9: ea:f4:27:a4:f7:67:f4:9c:a3:cb:c4:38:9b:50:29:74: 08:cb:2b:83:55:c3:f9:91:ef:7f:c8:0d:c4:41:df:86: 99:e8:1d:74:de:99:3f:41:ed:1d:7c:81:13:6c:e9:96: 7b:3c:cd:77:66:63:04:55:02:94:a1:bb:4b:92:67:c0: bd:40:1a:70:a2:72:4d:71:6e:ca:74:5f:52:35:4c:65: 65:97:0e:e3:10:d4:e1:12:da:5c:86:4d:fb:92:e5:7e: 02:68:cd:5f:a8:92:16:7c:3d:24:9f:ce:ea:2c:60:aa: b7:ee:3b:e3:3b:c2:d2:9b:66:fc:9e:bc:a7:28:ee:22: d1:79:47:ef:62:6a:9a:34:6c:37:48:93:ea:8d:3f:e3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:7d:ab:08:5e:c3:f3:32:d7:a8:80:fb:65:e2:64:76: 3f:5c:79:79:fe:89:f2:c0:e5:6d:4a:2c:d7:77:ed:2b: 00:97:fc:97:c1:82:04:a2:25:dd:5d:50:ae:c7:f3:a9: c5:f7:dc:fe:c8:81:16:16:36:e1:ff:94:77:20:ac:77: 3f:ef:42:55:51:60:db:1d:cf:2c:47:d2:f9:7d:59:12: 13:fe:d0:36:1a:a8:b7:81:4c:6e:fd:81:80:4a:c6:19: 7f:2a:59:ef:6b:3e:aa:e4:23:57:69:63:03:18:2b:7e: 89:7a:65:c6:1f:26:79:38:cc:f4:15:a7:43:88:81:34: fe:4e:ae:2a:34:2b:b6:7d:af:82:74:14:de:0a:b9:5c: de:8a:4a:cd:f1:ed:7a:1b:67:db:ee:be:8a:2f:9b:39: 7c:1d:1b:ad:be:75:6b:e5:04:81:76:c3:74:de:b5:01: 09:a8:cc:9c:8f:f5:7e:5b:01:9e:e0:06:d2:ca:2d:63: 6e:4d:8c:1e:ec:36:a2:9b:7a:81:c7:b5:b9:32:df:e0: 7f:8b:c7:ac:92:58:9d:a4:f5:32:28:34:12:5d:95:6a: e2:2b:5f:05:d7:27:52:97:49:e2:a7:10:46:ad:bf:1b: 85:d7:05:50:df:3b:49:bf:fa:74:e6:04:97:5e:d0:f3 Fingerprint (SHA-256): 91:06:35:72:0F:44:D4:AB:48:94:09:4A:E4:04:10:15:22:75:C1:83:3F:76:4C:F3:44:13:D5:C3:F0:4E:A5:10 Fingerprint (SHA1): B4:F0:7A:0E:F0:EC:CC:C7:92:76:2B:C6:D2:83:12:BD:D5:9C:AF:57 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #10079: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 13:56:04 2016 Not After : Sun Apr 25 13:56:04 2021 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:cd:ed:3c:b5:a3:c4:54:7b:83:48:7f:15:38:d5:18: 75:69:f6:e6:c0:cf:4b:ae:67:3d:eb:d6:de:a2:b8:b6: b8:8c:c3:cf:9d:24:83:4f:70:37:d5:0d:d5:19:c0:c4: fc:2c:bc:00:0c:b0:fe:3c:9f:89:8f:64:c0:1c:69:cb: ba:fa:30:37:4a:aa:39:2f:b9:b0:4b:1b:6c:69:d7:04: ad:dc:33:78:98:9a:2f:fc:1c:d0:03:6c:fd:1b:64:bf: 4f:0f:59:3d:d2:4f:ca:b7:42:a7:b9:b8:15:93:6f:19: 01:2e:76:cc:70:fb:4f:9f:51:98:2b:72:a0:ce:18:e8: b3:9c:1a:81:73:ee:bd:a8:ae:0a:1b:9d:40:42:14:b4: 83:69:47:dd:1d:c3:8b:18:7f:b1:c0:7d:97:23:c5:e6: 7f:38:8e:7c:c5:64:2a:c0:ef:55:07:a7:6a:78:dd:7d: cb:7e:3e:2c:b1:1c:d8:07:e1:72:4c:55:af:ee:c2:5c: 09:74:3e:3f:be:c2:f2:cf:2c:6c:b3:89:83:2e:0c:d2: 6c:a0:6a:ae:6f:6f:8b:89:77:92:e0:c8:84:3c:b9:51: a2:26:3c:01:c7:fe:0c:c9:58:db:ef:ae:83:31:c7:bb: 52:14:87:ea:d7:38:da:e4:0f:82:61:bd:a7:b9:08:47 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:73:97:a7:d9:b4:1a:0b:65:60:9a:cf:44:d7:42:3f: 5c:2c:cc:36:41:bf:c0:4b:0a:d6:9d:75:20:83:c9:2e: 24:12:44:ff:6c:21:5f:cb:f7:e2:db:47:c2:0f:84:9b: 9d:3f:a6:eb:a5:b5:f7:68:34:0f:7f:34:97:c2:fa:c2: 36:da:71:34:ec:8c:6c:04:95:7f:f5:3d:9b:32:67:a6: 2c:cf:86:32:d2:32:3c:e1:79:e3:1b:72:c1:79:eb:31: 92:87:d4:00:c4:16:ae:b5:c8:ee:77:23:9f:b0:10:cb: 51:69:68:68:e8:bf:d0:17:5a:42:48:5a:49:fc:0d:80: 61:da:b3:e7:a7:ab:0e:25:03:5e:bf:76:dd:3f:a0:0c: b2:99:71:c1:ee:59:dc:0e:27:1f:10:e2:8e:57:b5:31: e5:38:70:41:ee:01:63:ce:28:b4:fb:6f:5f:a5:cb:6f: 44:69:86:5c:98:1d:d9:bb:31:87:79:ef:55:46:80:b3: 8d:b7:a0:30:36:2c:fb:80:ac:1a:c6:42:20:fb:79:5a: 98:04:75:46:8c:1f:7e:d8:25:64:f6:73:c0:a6:5d:1d: 50:6b:ab:25:67:34:e4:a0:ff:39:43:ab:7d:58:77:df: fc:cf:b8:7a:93:d6:e2:7d:07:26:f3:5e:77:f5:ff:f0 Fingerprint (SHA-256): 5D:DA:04:1E:E1:EF:41:26:73:2D:E4:4D:6C:90:8B:8D:40:DF:37:E4:09:EA:D3:1B:D4:4C:80:BD:D3:3F:5D:08 Fingerprint (SHA1): F3:01:52:29:E5:53:9A:0A:46:EA:55:AB:83:5E:1C:E7:C3:9E:4D:F5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #10080: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #10081: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u TestCA CT,C,C TestCA-ec CT,C,C Alice-dsa u,u,u Alice-ecmixed u,u,u Dave-dsamixed u,u,u Dave-dsa u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-ecmixed u,u,u clientCA-ec T,C,C chain-2-clientCA-ec ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, clientCA T,C,C ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C chain-1-clientCA ,, clientCA-dsa T,C,C chain-2-clientCA-dsa ,, chain-1-clientCA-ec ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/tests.v3.28098 -t Test2 -f ../tests.pw merge.sh: #10082: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/upgradedb/tests.v1.28098 -t Test1 -f ../tests.pw merge.sh: #10083: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #10084: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #10085: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #10086: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Apr 25 13:58:11 2016 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Mon Apr 25 13:42:07 2016 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Mon Apr 25 13:58:04 2016 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #10087: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Mon Apr 25 19:18:52 UTC 2016 Checking if pkits should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] Checking if chains should be skipped based on skip list [cipher libpkix cert dbtests sdr ocsp pkits chains ssl_gtests] merge.sh: Testing with shared library =============================== Checking if libpkix should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Checking if cert should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Running tests for cert TIMESTAMP cert BEGIN: Mon Apr 25 19:18:52 UTC 2016 cert.sh: Certutil and Crlutil Tests with ECC =============================== cert.sh: #10088: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #10089: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10090: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10091: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #10092: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #10093: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10094: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10095: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #10096: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10097: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #10098: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10099: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #10100: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #10101: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10102: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10103: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #10104: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10105: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #10106: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10107: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #10108: Exporting Root Cert - PASSED cert.sh: Creating an DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10109: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #10110: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10111: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #10112: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10113: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #10114: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10115: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #10116: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10117: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #10118: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10119: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #10120: Exporting DSA Root Cert - PASSED cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10121: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #10122: Exporting DSA Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10123: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #10124: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10125: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #10126: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10127: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #10128: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10129: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #10130: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10131: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #10132: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10133: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #10134: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10135: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #10136: Exporting EC Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #10137: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10138: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10139: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #10140: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10141: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #10142: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10143: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #10144: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10145: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #10146: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10147: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #10148: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10149: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10150: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #10151: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10152: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #10153: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10154: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #10155: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10156: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10157: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10158: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10159: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #10160: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10161: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10162: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #10163: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #10164: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10165: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #10166: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10167: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10168: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #10169: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10170: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #10171: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10172: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #10173: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10174: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #10175: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10176: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #10177: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10178: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10179: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #10180: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10181: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #10182: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10183: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #10184: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10185: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10186: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #10187: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #10188: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10189: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10190: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10191: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10192: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10193: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #10194: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #10195: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10196: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #10197: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #10198: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-ec.ca.cert cert.sh: #10199: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10200: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #10201: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10202: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10203: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #10204: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10205: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10206: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #10207: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10208: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10209: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #10210: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10211: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10212: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #10213: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10214: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #10215: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10216: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #10217: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #10218: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-ec.ca.cert cert.sh: #10219: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10220: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #10221: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10222: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10223: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #10224: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10225: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10226: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #10227: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10228: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10229: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #10230: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10231: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10232: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #10233: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10234: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10235: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #10236: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10237: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10238: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #10239: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10240: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10241: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #10242: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10243: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10244: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #10245: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10246: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10247: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #10248: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10249: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #10250: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #10251: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #10252: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #10253: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10254: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #10255: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #10256: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #10257: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10258: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #10259: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10260: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10261: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #10262: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10263: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10264: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #10265: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10266: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10267: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #10268: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10269: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10270: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #10271: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10272: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #10273: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10274: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #10275: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #10276: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #10277: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10278: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #10279: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10280: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10281: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #10282: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10283: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10284: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #10285: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10286: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10287: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #10288: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10289: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10290: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #10291: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10292: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #10293: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10294: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #10295: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #10296: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #10297: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10298: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #10299: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10300: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10301: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #10302: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10303: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10304: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #10305: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10306: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10307: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #10308: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10309: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10310: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #10311: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10312: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #10313: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10314: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #10315: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #10316: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #10317: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10318: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #10319: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10320: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10321: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #10322: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10323: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10324: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #10325: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10326: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10327: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #10328: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10329: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10330: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #10331: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10332: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #10333: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #10334: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #10335: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #10336: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #10337: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #10338: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #10339: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #10340: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #10341: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10342: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #10343: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10344: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw cert.sh: #10345: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10346: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #10347: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10348: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #10349: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10350: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10351: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #10352: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10353: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10354: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #10355: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10356: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #10357: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10358: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #10359: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #10360: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #10361: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10362: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #10363: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10364: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10365: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #10366: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10367: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10368: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #10369: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10370: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10371: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #10372: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10373: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10374: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #10375: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10376: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:84:67 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:25:46 2016 Not After : Mon Jul 25 19:25:46 2016 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4b:d1:d8:97:57:94:5d:df:7f:c1:95:3a:86:ad:24: ef:c9:6b:da:62:74:7b:be:44:fd:93:b9:2b:cc:60:3a: 77:28:ab:05:d7:f6:01:19:d8:5b:17:6c:11:f3:58:1d: c6:75:10:c5:1c:b4:66:b4:a3:c3:84:27:52:36:90:d1: fd:45:dd:69:f0:ea:b9:70:be:fe:f9:02:d1:19:99:b7: db:e1:e5:f5:ff:63:02:9d:7c:c2:eb:9f:a4:04:fd:6a: 58:93:a2:4e:df:18:ec:6a:e2:20:f2:1e:ea:8f:da:71: eb:7e:95:8c:7f:f5:74:3f:63:58:cf:a0:28:d7:44:84: ba:6e:80:66:7b:b3:db:7c:39:fe:04:ce:7a:fe:0f:1e: ef:38:70:64:0c:a3:3b:a7:51:e7:87:4f:1d:4f:42:0f: cf:c6:1c:87:46:09:db:b5:fe:59:b8:3d:06:b2:86:7f: 9e:f9:e4:37:50:73:5f:f9:71:05:4e:b1:10:54:39:81: 8c:27:84:1b:47:28:d8:64:b8:92:6a:7f:93:25:b0:1d: 92:96:a2:11:58:4b:f1:b0:f3:a9:61:dc:68:7b:95:0a: 1e:b2:ef:67:36:02:19:bf:01:af:32:0b:9e:97:ee:fb: 44:41:1d:84:aa:28:c7:7d:f8:c3:01:71:85:46:7f:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:c5:89:e4:c1:12:94:7c:4c:04:06:0c:f1:c5:70:c6: b4:95:f2:32:b1:ce:c2:61:13:b8:a1:31:06:87:d3:90: 7b:8c:5c:22:e0:1e:a9:7c:01:25:3b:b8:c6:42:87:5f: d2:4b:02:2a:95:c2:f4:0e:9e:54:75:4b:e8:99:af:11: 87:9c:41:d2:91:31:b5:4e:7f:a5:fc:e5:1a:9f:e7:2e: bb:93:1c:4c:a5:dc:af:e0:24:d5:92:55:28:c9:67:e4: 9e:55:46:79:77:b2:5d:f3:00:bb:5f:38:5d:3e:e1:4b: e4:07:9a:19:02:36:01:5a:7e:ff:25:7f:d1:22:a7:91: 43:14:25:ac:fc:9c:b1:d7:9b:14:cc:bf:96:f9:c3:d4: 6f:bc:da:61:ec:36:1d:65:0e:ef:07:ec:66:57:13:42: 6e:2a:13:f0:c0:91:33:b1:16:1e:44:b5:39:8a:78:a5: 94:0b:33:a4:94:57:4c:8d:15:07:16:ba:e3:14:02:cb: e4:9b:ae:95:13:59:43:a0:e4:9e:6b:97:0a:49:91:24: 9e:4a:ab:10:51:b9:8e:41:dd:de:09:c5:d2:d8:01:90: 7c:d1:c9:10:db:27:69:c2:1b:48:aa:9f:4f:6d:80:64: f1:67:d5:fd:9f:06:b8:36:4a:99:71:b7:c8:67:41:60 Fingerprint (SHA-256): 61:67:6F:B6:36:B3:17:5D:07:0F:26:22:E1:DE:D9:FE:6F:EA:B1:66:8D:4C:43:7F:03:C4:70:43:6A:F4:23:87 Fingerprint (SHA1): 2C:E6:69:E2:1A:65:16:68:2A:DD:71:12:DE:8C:B2:75:3C:90:D4:25 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10377: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:84:99 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:25:55 2016 Not After : Mon Jul 25 19:25:55 2016 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:bb:63:11:05:93:2e:44:a7:82:37:3d:dc:7d:68:b2: 3f:0e:9c:6a:a7:31:3f:78:6f:c2:c7:1c:b4:80:a8:0a: c8:94:b7:bd:a3:23:c6:bf:a1:ba:b4:13:3b:f8:5f:74: db:1f:3e:42:a8:e5:a4:c6:5f:c3:62:0b:33:5f:86:a2: 6d:0c:9a:c2:48:6d:84:f0:18:de:ee:59:03:7d:57:b7: 9f:89:09:7a:4a:62:a7:22:c5:6d:9c:fb:0d:f1:57:11: ca:c9:1b:72:35:a9:90:c5:ec:b3:c2:c2:b0:de:cb:f8: 17:b2:64:f8:bb:dd:71:87:5f:77:2d:22:90:3d:9f:fe: 36:7f:84:73:26:80:ea:d8:d8:63:66:dd:d3:7c:2c:92: 4d:4e:c1:2a:55:de:06:f8:61:f2:32:bd:28:e5:1d:ba: e5:59:e6:1f:5d:39:24:04:c1:fc:3d:04:61:f5:c4:dd: 89:17:26:b7:ea:82:be:82:73:4f:91:0e:30:51:7c:f4: de:da:0a:0f:13:0d:42:93:c7:83:b1:ec:74:93:15:ae: e6:d9:17:18:93:e6:a8:96:83:3e:29:6a:8b:fa:97:73: 06:99:d2:bc:26:e3:2f:ab:d7:bb:e0:5d:63:58:98:a2: 89:17:61:11:04:33:90:23:9c:34:73:44:19:f3:0e:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:40:96:9b:83:ab:21:b1:d1:20:04:8f:b1:86:dc:22: 1b:44:9c:35:be:ef:e2:ac:23:a4:d4:69:c5:ac:69:ab: bf:0f:50:dc:33:36:74:d0:eb:93:ee:38:38:c7:39:c5: 70:1c:18:ee:c5:c4:69:81:0b:49:99:7a:0c:07:85:91: 60:28:c5:19:7c:ee:b8:ee:2e:34:82:0c:42:18:08:c8: 5d:db:15:a5:11:27:37:88:34:3f:7b:14:3b:19:4c:0d: 55:6c:e6:85:48:08:15:1b:a7:e8:53:21:9d:fd:3d:33: bd:72:23:d8:8d:f4:4d:47:6b:b9:a2:cd:e9:57:9b:fa: 52:46:a8:d2:bc:df:eb:4a:3f:bc:8b:63:1a:ed:8d:c2: 22:cd:58:bb:fb:a5:36:d0:63:99:6d:64:11:55:e0:de: c6:91:4a:73:8d:98:ed:0f:a1:84:36:49:f3:be:99:90: 64:80:56:93:59:d7:0f:89:4f:13:1c:eb:2f:05:8c:8a: b2:b9:1d:33:3c:25:58:0e:dd:d4:4f:ec:98:9a:55:96: 13:7a:d2:a5:19:fb:9b:a5:3c:da:cb:1d:a9:e3:6c:52: 9c:ed:4a:5d:c0:4e:9f:46:e9:0c:3e:cd:ad:fe:ee:7e: e3:bd:7d:9c:c4:31:36:ac:ca:12:a3:c5:ca:62:11:0f Fingerprint (SHA-256): A5:41:9E:65:7B:3B:85:9E:1B:56:9A:A7:E8:FA:4D:D5:EB:FA:46:07:B4:5E:4E:C8:D3:E0:3C:30:5D:25:F4:A7 Fingerprint (SHA1): 9E:38:04:DC:C8:32:C9:44:A6:08:91:08:31:8E:49:B0:CB:30:5D:D0 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10378: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:84:a9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:26:25 2016 Not After : Mon Jul 25 19:26:25 2016 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:77:f6:69:69:b0:b5:49:f8:6e:27:61:aa:0b:00:03: fe:11:3a:81:fd:6e:ef:b5:e9:a3:65:43:4f:01:1f:49: da:3d:02:34:11:5d:fc:f8:5d:30:cc:c4:ad:0d:4c:af: 52:36:9a:20:cb:d8:04:68:7c:9e:68:a6:db:46:02:b4: 07:12:27:00:82:2d:bb:2c:f2:12:6f:7c:93:d8:19:33: 7d:fb:ed:7f:1d:85:d2:fb:9b:00:d9:f0:8b:f7:0b:d5: 1b:d7:36:d4:03:59:ec:1c:64:26:37:91:d8:2c:43:b2: 9b:d8:26:50:41:ae:3b:50:7a:25:25:90:81:7a:12:dc: a6:8b:d1:3b:6a:e9:a5:39:f5:15:08:6c:57:9f:38:eb: aa:36:1b:25:8d:be:85:71:7a:da:ae:20:9c:a6:3d:00: 80:81:ef:c2:3d:f4:0c:d8:39:b2:ee:7f:16:08:8f:b9: ae:0e:c9:8f:97:3d:1b:e8:13:9d:f9:8d:b6:0b:7f:b4: 61:b0:b9:4e:8b:a5:fd:7e:fd:09:84:bf:ce:4f:e1:17: b9:08:e3:95:f1:98:46:fd:cd:19:15:91:3f:bc:82:b1: d2:d3:21:67:4f:d2:21:3a:9b:75:51:34:c5:33:bd:24: 8c:88:54:50:62:c0:29:16:09:23:03:97:fd:d1:5b:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:1b:ed:c5:82:3c:1d:c1:51:0e:2b:96:d5:f9:11:24: 22:b7:91:40:58:15:c4:31:96:0e:17:f1:1e:53:eb:22: ab:81:11:8d:f6:eb:e5:15:ea:6d:86:db:af:1d:40:bc: 30:4c:1b:de:71:d3:30:06:b1:5b:2a:b3:11:8a:d9:88: e6:45:e5:cc:e2:bb:8f:f2:1c:9a:84:70:4a:d3:ef:3f: a8:b4:60:9e:f0:4b:f5:9d:00:e9:fe:79:1e:41:ae:e1: 18:9d:39:82:ce:d4:ca:17:4a:aa:ec:72:d7:03:2c:b9: 2c:19:23:bc:4b:8f:34:54:8b:fe:2d:1e:d3:d0:0a:95: 6a:5e:d7:77:91:72:df:43:53:52:f4:81:41:f9:31:24: 9c:94:37:7f:2b:6f:5c:0b:34:55:55:ae:9e:fb:d9:fa: e1:2a:f5:39:03:85:5c:e2:b6:c0:b6:b3:4d:e9:89:ef: a0:46:9c:c3:e9:50:7a:b0:b6:ec:90:96:87:c8:ac:ba: e1:b2:6d:58:eb:72:08:f0:4d:c1:79:2a:f2:ca:e8:39: e0:0a:90:9f:1d:db:13:62:6e:bf:8b:5a:8d:61:51:6b: 68:ec:91:1f:25:bb:2e:40:39:c3:e9:a4:92:52:7e:3d: 9c:e6:30:fc:2f:0a:25:de:f1:b1:b2:41:c9:ab:75:23 Fingerprint (SHA-256): 73:81:0E:96:6E:F2:CD:4F:19:6E:9A:93:7A:7F:CB:D8:11:79:53:78:4C:AF:66:23:C4:B0:E9:D9:06:8A:C8:B2 Fingerprint (SHA1): 06:EA:D9:B0:97:81:74:05:A3:0A:D4:0B:4C:CD:81:EA:6B:78:AC:D1 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10379: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:84:e3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:26:35 2016 Not After : Mon Jul 25 19:26:35 2016 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:0c:02:95:0b:ce:24:9b:cf:a4:c5:5b:8c:de:1c:2c: b4:b9:f9:4d:b5:e1:da:17:2f:85:a2:0e:98:fa:35:5e: ea:12:49:c0:aa:bc:c8:2b:a6:44:d8:20:4f:83:da:a7: a3:ac:cb:75:46:08:ea:5c:20:89:24:66:b6:aa:69:98: 64:d6:61:cd:3a:bb:59:5f:70:10:4e:ee:0a:f7:2d:43: 35:e6:b6:37:d8:4e:04:10:e5:6f:2b:05:6a:79:9d:01: 21:68:03:04:65:39:47:86:37:5b:fb:c6:62:98:ab:89: 56:68:e3:d7:18:48:e7:46:bb:04:ed:cd:ad:71:67:09: 78:e0:47:af:4a:f4:d1:21:76:83:0b:4a:03:f7:59:8b: e3:10:39:5b:9e:bc:f0:b5:f4:e4:35:44:a9:4f:8d:5f: 83:26:fa:fb:02:34:12:e9:6f:81:a5:a0:d4:85:5d:f8: 24:e4:66:c8:ab:cd:fa:64:3f:34:8e:77:3e:da:87:5b: cf:52:90:a4:40:56:e8:56:93:9e:f3:6f:69:86:9a:7c: d4:e3:61:f4:b3:e1:61:24:3d:c4:a3:d0:4a:ae:7a:5b: df:5e:07:04:43:ad:7f:81:e7:0d:a3:d6:8e:5a:3c:e9: 97:21:45:4f:a5:69:22:8d:61:c5:61:e5:2a:4d:7f:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:63:27:7c:2a:ca:79:72:ab:8d:36:48:76:08:1f:25: af:df:1f:01:21:6b:66:79:8c:8d:d0:e7:3a:47:bb:e3: cb:ef:83:4b:9f:4b:df:ba:d0:1c:6e:7a:fa:11:95:01: 3b:f6:87:b3:65:23:60:8f:8f:a4:ac:42:07:fd:3b:0a: a5:16:e9:cb:16:ed:98:1d:a3:2b:2d:41:d9:54:0d:b6: e9:eb:29:51:97:63:47:93:28:65:69:37:21:06:a1:36: 43:77:39:51:2e:9d:1b:19:05:95:d1:ad:8e:97:7f:f4: c3:ae:a6:0e:a9:37:e1:9d:08:f4:45:2d:21:ed:9a:b0: 4d:ca:0f:e7:c2:1e:d3:19:86:f1:6b:fc:d8:3f:e9:16: fc:3f:e3:0e:8d:34:2a:3f:ae:97:b1:48:f3:20:9a:fb: 63:6e:d7:ea:c1:4e:46:e1:73:b6:39:da:ed:f6:4b:4d: ac:c0:77:b1:01:01:eb:0c:88:c3:54:4c:c3:84:cb:68: d9:eb:cd:3c:ec:cf:99:d1:6a:c7:ed:7c:39:ef:01:95: 1a:dd:56:46:80:59:6b:88:e3:5d:1d:75:7a:23:9b:85: 54:8d:61:10:8c:53:fd:94:fd:ce:a3:81:16:75:d1:81: 41:c6:d8:12:2c:4f:9e:ea:7a:db:fb:00:4d:7c:ff:10 Fingerprint (SHA-256): CD:AD:54:53:C0:31:10:C7:07:28:CB:C2:60:AF:0D:C6:AA:BC:D6:0C:15:A6:61:CD:30:3B:D1:99:2B:A3:E9:A8 Fingerprint (SHA1): 40:C0:8B:0B:35:C5:97:BD:51:44:6C:B4:45:39:EF:59:D0:1F:00:C6 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10380: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:84:f7 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:26:53 2016 Not After : Mon Jul 25 19:26:53 2016 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:f0:ef:e0:57:fa:68:5e:8c:62:6e:5f:05:11:56:74: 18:0a:2c:17:46:a5:d7:da:42:54:68:7c:4b:e3:b0:43: d6:4a:6b:86:a5:b4:be:07:b3:be:8f:18:d6:6c:2f:13: ed:c9:c9:96:5d:77:fa:9c:5c:59:2c:9b:a8:27:b0:66: ae:b8:69:c5:33:8f:06:15:90:2b:58:49:83:c8:01:99: f7:cf:2f:19:09:60:a4:99:6f:36:3a:62:a6:57:cf:03: d2:da:4a:16:a9:26:2e:e0:ac:91:ea:37:a2:29:2b:5d: 35:5b:43:9f:a8:d4:b4:08:78:aa:99:6e:ec:e9:f7:e0: 0c:57:f8:a3:a2:43:89:77:1d:01:32:04:d6:92:05:80: ee:09:c3:1c:3b:dc:84:52:e2:88:6b:a3:76:25:47:e2: ee:3a:7c:9a:3a:97:b6:8a:73:77:9f:6f:b3:8e:89:7c: 09:d5:79:09:0d:bf:80:1a:74:0c:42:f2:8f:14:52:dd: 1f:a8:14:5a:35:26:d7:9f:fb:fb:1c:58:c2:f6:7d:58: 69:f1:e7:a9:68:53:fc:12:69:7c:8d:a1:d2:d3:19:c5: 60:25:e9:2a:34:cd:ff:37:d6:02:97:84:b0:a7:9a:da: ea:d0:6b:bb:9a:8e:5b:bb:d7:98:4c:2b:aa:32:51:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:18:28:6e:1f:b7:78:96:cc:12:d9:6b:c1:52:8a:e2: ad:99:59:d7:d9:5c:aa:2f:4a:bd:ee:6d:68:66:f3:e6: e4:f6:f8:3a:63:0e:08:62:4e:40:95:3b:ce:ff:c8:c9: 5b:f7:8f:a7:52:e0:9c:47:43:a0:5b:cb:24:34:c3:a8: 44:82:a7:f7:2e:81:1b:62:c1:c8:59:81:7e:32:73:48: d8:d5:4e:52:ff:a7:51:c3:5f:b5:85:2a:fd:9c:c2:f1: 20:7f:61:f3:4d:c9:87:74:cb:e7:95:90:95:f4:14:c3: 8d:50:fa:b9:e8:7d:ca:51:3d:c9:b9:bd:dd:db:80:9e: 50:91:3b:b0:b2:5c:a6:50:9d:6c:b1:4c:08:f8:81:18: 50:5a:02:9a:e9:9c:f7:0d:71:06:52:7e:14:69:30:65: 9a:ce:9a:21:a3:e7:ef:4e:50:97:85:a7:00:db:a5:f2: 5c:c1:b9:2f:25:1b:b5:01:19:27:f1:7a:b8:a0:94:02: b5:dd:da:97:16:15:5c:30:c7:6e:79:1b:56:af:36:22: 76:b9:54:05:08:fc:06:d1:95:2f:52:20:9c:26:52:83: 2b:16:0a:c6:c8:51:ce:54:0b:37:f2:8f:17:f9:95:d3: d8:f5:64:ea:7b:da:4f:c8:4b:92:63:29:df:c4:63:23 Fingerprint (SHA-256): 99:67:93:77:08:24:1D:C4:88:A9:7C:10:2B:E5:FA:5F:68:E1:34:FF:56:D9:E2:9C:1F:B5:D2:E6:36:5C:D5:16 Fingerprint (SHA1): 4E:C1:A0:72:3C:32:68:45:1C:70:47:A8:13:09:21:64:46:BB:2F:31 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10381: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:85:18 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:27:00 2016 Not After : Mon Jul 25 19:27:00 2016 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:01:3f:ce:56:06:42:b1:13:84:70:c4:b5:09:ad:91: 83:39:cd:0c:21:4b:c0:30:53:29:95:9d:f0:c7:d2:8e: 0f:43:e3:1b:14:e9:f9:fc:27:a1:18:92:d9:bc:a3:65: 3f:48:65:57:ab:f4:dd:30:44:83:90:91:48:90:f0:83: 66:a3:12:a9:d5:90:38:50:ff:b8:bd:fe:8a:88:30:fb: 7a:e1:2b:08:aa:9e:f1:f0:8a:4b:64:84:db:42:0d:c4: e5:28:13:0a:48:f8:69:e4:e5:7d:7f:fa:d8:01:1f:0e: 57:ea:5c:6f:c7:2f:ec:e5:a2:ba:e2:e1:a1:94:c0:52: 5d:97:bb:a6:73:0a:1c:c5:09:9d:a5:3a:57:8c:56:de: e0:f5:db:21:15:8a:e0:eb:3b:a3:98:fa:ff:aa:4b:69: 48:c2:3f:5d:97:11:69:75:47:36:70:3b:e3:4b:1e:ee: a0:9f:a5:1f:84:0a:ff:c8:3e:1d:4a:4a:0e:81:48:3b: 63:43:77:1c:50:0e:66:06:1f:0c:e0:be:c5:80:9a:29: dc:82:c4:9d:9a:27:7b:71:a7:76:d1:40:39:27:af:cf: ff:a3:c7:9f:7c:f7:43:9f:dc:53:7e:a8:66:5f:67:ab: cb:2c:07:5f:71:20:63:bf:a2:37:71:1e:6c:b3:8a:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:dd:bf:b9:a1:a3:53:55:76:b7:b3:d4:09:69:39:d6: 73:d8:07:64:f5:d5:ae:d5:15:f7:5d:26:34:7a:a8:7e: 17:13:b4:a0:25:b5:80:81:3c:d9:d4:d4:24:70:d4:bb: bb:94:c9:78:b8:dd:5e:6f:6a:df:2b:1d:b1:f2:5b:00: 5e:ee:4d:4e:c7:9f:87:92:2d:d4:76:1b:65:07:46:52: e5:ce:49:fc:5c:5d:48:ce:5f:d2:98:ef:cc:9a:50:e3: ef:d8:f1:52:96:19:43:b5:36:f5:d3:6e:30:27:31:48: 98:f9:69:14:8b:5b:bf:68:09:26:5e:f2:ab:a2:6d:28: 60:6b:0e:1a:4f:1a:55:81:d0:bc:df:30:bc:f8:89:9b: 41:d0:f6:a9:75:31:fa:69:46:63:3e:99:8c:4a:91:7a: 73:47:b3:65:16:22:36:42:cd:a0:ce:38:30:d8:7d:38: d3:d4:8f:35:43:dc:fd:9f:b8:49:7e:73:b3:ec:eb:2d: 45:3f:98:29:fd:0d:86:b1:29:2e:30:b8:aa:b2:d3:38: a0:5d:c7:2e:c8:77:c5:a0:6f:1c:00:e0:6e:43:53:9b: 8e:19:3a:23:e7:e7:1a:03:13:cb:d4:12:33:54:6d:8c: 98:f2:c4:97:36:e3:34:b8:da:4f:18:6f:94:30:cd:c9 Fingerprint (SHA-256): 9C:95:71:75:31:B0:73:6E:98:B1:F3:1B:5F:6D:6A:AD:9D:8D:6A:1A:78:ED:7A:57:10:21:14:1D:4A:1F:17:7F Fingerprint (SHA1): A9:13:83:7D:E3:F9:BC:F5:1B:C9:66:C7:AD:80:50:DE:73:7A:7E:80 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10382: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:85:27 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:27:04 2016 Not After : Mon Jul 25 19:27:04 2016 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:12:23:2b:39:37:e1:c1:bb:77:f0:11:c1:aa:d5:0a: c4:0b:8c:9f:e9:51:07:bf:dc:8a:cd:4b:c9:5b:d8:ef: 4c:72:29:73:83:e5:f3:7e:1f:3b:4f:fe:f9:2d:9f:21: 3b:3b:b8:2a:ad:b7:4d:2a:5f:c6:1d:0c:78:f3:b8:60: bd:ce:7a:05:41:4e:49:33:f2:b0:35:2c:2f:5a:3a:98: 9b:9e:b2:41:1d:e8:63:0a:8a:e2:7f:9d:19:56:b4:76: da:96:73:96:8b:ef:50:0f:28:3a:2b:1e:ee:46:dd:93: 3a:19:98:99:77:35:b6:1e:32:e1:81:52:52:d7:dd:0f: 61:9d:7f:ce:29:f4:e5:0b:fa:51:87:46:2d:92:cb:9f: 54:46:e3:2e:f9:33:75:de:cf:3f:f0:70:2f:8e:49:60: 86:66:11:75:d8:16:74:62:f7:6b:4b:7c:04:b8:01:31: 9e:1e:79:d7:92:38:2b:71:e9:9f:0a:23:26:ac:77:3c: 33:6d:1e:fc:6f:91:fd:8b:26:c7:da:ee:59:92:09:ad: 6b:9d:02:8c:60:07:81:3c:a0:47:b4:d4:8e:5f:e6:3e: 28:b0:ce:ee:d7:0c:99:15:01:f1:3b:26:77:b4:ae:51: d0:b0:c3:dd:db:00:c0:72:31:dc:53:e7:dd:ab:0c:bf Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:de:54:26:b1:36:e5:95:e2:bc:cb:44:3f:50:78:5f: dd:c7:e9:bd:2a:de:8e:93:c6:27:33:4b:18:5a:42:5f: 43:c4:8b:f8:43:3a:af:f7:c9:e9:0c:ce:80:a6:23:9a: d5:1a:da:ef:54:1d:eb:16:e0:ca:5f:0e:28:9e:8c:67: 23:97:4e:0f:30:40:71:d5:ba:d8:15:88:f5:09:44:21: 2e:e7:e9:d9:3e:e2:7b:f8:e1:8d:a5:aa:ae:00:b2:f1: 0d:41:95:c9:bb:34:28:76:64:d6:3e:ae:6c:73:4d:17: fa:f0:ca:64:24:d0:a8:2f:13:7c:9a:d8:af:3e:64:a2: b6:4b:82:c5:1c:97:05:b9:cf:90:1a:f2:54:9d:59:48: 63:b8:d8:06:3a:c6:b3:64:24:4e:2a:94:48:5d:dd:3b: d1:e6:8f:c7:16:18:fc:c3:dc:36:cb:b3:e3:59:ba:4b: 62:20:0d:d1:e3:69:19:ac:98:df:ac:db:e7:87:ac:c4: 25:8a:88:ed:7d:52:0a:a0:7c:56:e1:9b:cb:5d:0b:8a: 7b:64:a1:b1:f8:49:a5:6f:32:c7:c1:8b:b2:55:c4:ba: da:11:3f:08:79:9c:12:cc:b4:b3:be:61:21:81:d9:d0: 7b:83:4f:d6:de:c2:2c:55:f1:54:8a:c8:26:95:37:c5 Fingerprint (SHA-256): 96:48:19:8B:DB:75:53:97:87:7E:E1:AB:4E:84:AF:34:90:DB:AF:21:1E:2B:B5:7E:A4:42:1A:BB:15:3E:92:E4 Fingerprint (SHA1): 4F:85:61:AF:F8:37:88:74:E2:06:5F:22:86:BD:DA:63:FB:4C:D1:2E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10383: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:85:2e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:27:08 2016 Not After : Mon Jul 25 19:27:08 2016 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:7d:e7:8e:a2:24:e6:9a:e6:c3:bd:85:ae:d0:8d:5f: 5e:ee:d8:1b:1d:d3:a7:de:ee:06:46:5e:cc:97:eb:8a: b7:a1:b6:96:f7:3d:97:2c:59:f7:95:1d:54:55:de:ec: c9:1d:d4:04:39:40:e3:f4:ea:5f:4a:be:37:4c:f6:3a: c0:ce:11:24:9e:f0:c6:48:b4:b3:16:19:79:07:bb:7d: 9c:e3:93:dc:83:fe:8f:42:8d:d7:14:4d:7a:62:90:3a: 9e:40:5c:32:74:a5:49:d2:a9:79:05:6f:41:f8:77:e1: ee:ca:1f:de:5a:1d:d0:e8:fa:94:66:b3:9f:48:e9:1f: d5:f9:b2:90:18:8f:3d:98:9b:22:cb:01:27:b4:97:ce: 7a:1c:95:ea:be:4f:60:75:a9:e6:83:e2:a4:12:fb:0d: d0:12:a7:f3:ca:d2:28:96:69:23:b7:f6:09:68:96:bd: 1e:ff:03:aa:e9:3d:18:ef:dd:48:67:91:c5:57:0f:2d: ae:d2:67:03:73:3b:e3:a4:e7:f6:4a:b0:79:6b:12:51: 3a:16:91:30:57:4c:51:50:75:7c:b9:01:d6:a9:29:ff: 59:c0:e4:b6:9b:d7:43:d6:88:7b:eb:3e:d0:df:16:66: 7d:9f:c9:ff:84:19:6d:97:c9:3e:0a:fd:6c:25:9d:ef Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:28:53:2c:01:ce:dc:4e:d5:5c:b8:26:3c:a9:0b:3b: e9:3d:c9:59:6e:bd:c7:ca:b4:01:f5:31:92:7f:85:5a: 12:19:be:c7:24:36:35:47:56:de:93:0a:49:29:67:c5: b6:70:c5:00:11:74:a9:99:db:68:4e:db:2c:40:e3:0e: b9:8a:55:e4:23:a8:8e:eb:f7:2f:54:48:10:8d:fc:77: cb:8b:64:e4:01:23:92:ea:9b:bc:6d:ba:90:c2:71:df: 9b:91:11:20:9c:ed:01:e6:3a:b2:7b:26:e4:69:fc:04: 91:29:fb:6a:3c:a4:11:fb:d2:e4:90:19:8b:0e:5b:d7: 47:f5:eb:2a:1d:b0:d0:b5:ef:1a:c5:aa:a2:5d:11:3e: 34:fd:5f:67:d2:d6:93:ff:64:5e:44:7a:c9:e4:75:b1: 94:94:a1:93:f4:96:01:d4:cb:7e:0a:ab:d7:b2:2f:44: fa:74:f2:26:0f:80:15:6d:52:27:e9:0f:fb:04:59:d4: 08:a6:e1:85:5c:d4:f7:43:ac:3f:be:10:7b:60:f2:24: c5:ca:23:a9:06:82:4e:21:69:b7:c2:4f:c9:fa:ea:47: 8d:6c:94:4c:8b:e6:44:b1:29:0a:ac:e4:ef:5c:68:a2: e0:40:d5:21:7f:df:f4:32:81:33:b9:90:43:1c:b5:c9 Fingerprint (SHA-256): D4:84:A2:B0:D6:1C:7E:15:8F:FC:6E:A0:5E:81:8A:FF:0E:44:0F:DB:1E:62:5F:C5:D2:54:05:9E:81:B1:4B:A7 Fingerprint (SHA1): 3F:3A:94:D2:E2:8D:19:9C:2F:EE:8C:F3:3E:DC:D4:C7:A6:6F:35:66 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10384: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:85:36 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:27:16 2016 Not After : Mon Jul 25 19:27:16 2016 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:93:1d:5f:c0:0c:ec:78:56:f6:b2:c9:42:29:a7:44: d2:5f:a1:07:d8:99:e9:79:7d:0b:93:85:63:69:68:1f: 28:39:7b:80:07:39:2b:3d:ea:bc:87:af:fd:b1:47:3c: e8:f6:05:03:c5:ec:80:ef:88:83:ca:ec:07:b9:f0:a3: 05:c5:68:f7:e4:d8:3f:5b:e3:f4:b7:10:38:e8:9e:6b: ae:81:89:59:f2:21:5f:8f:a0:6f:e1:77:85:98:7c:3f: 37:7e:18:d4:93:6f:b7:e7:2e:8e:b5:aa:c7:90:46:02: 41:8b:ce:bb:47:cc:20:08:7c:1d:d3:af:a5:bb:b5:52: 75:ed:26:82:8b:93:51:3d:22:4d:4e:90:f3:94:6d:7c: ce:30:b2:d7:99:2f:de:15:25:68:61:d7:5a:99:98:04: 75:15:1a:a7:6d:6f:41:09:2e:38:4d:8b:ad:b3:c6:93: e4:08:8b:77:82:90:d0:94:43:9c:4e:fa:57:b3:80:fe: bc:d2:dc:f9:a4:8c:3e:5b:f7:b1:cb:5d:56:d0:af:dd: 2b:b1:19:e6:58:69:d7:89:6a:74:8f:cd:e7:85:06:69: 69:86:61:74:5c:81:f9:95:46:2f:c2:37:ad:3f:fd:de: 59:21:f9:0c:9d:42:a5:58:f6:b4:da:5c:92:4b:79:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:b5:51:38:29:48:7d:3f:72:43:22:14:dc:8a:79:2e: bf:c9:8c:29:dc:40:ce:a8:67:d3:b3:67:75:2e:b6:09: 79:6c:1e:55:4f:63:98:3a:ff:35:cf:7b:50:c9:e0:13: 48:8d:ea:65:62:7f:b4:6e:fc:bd:c0:0a:32:5f:ed:c9: f7:12:88:00:f3:2f:06:5d:8a:2b:03:a7:2b:02:5d:0a: ce:f1:94:7d:ca:b7:7d:6a:ff:94:95:d6:43:b6:6d:c8: 8a:3e:66:dd:8f:79:15:b4:f5:cb:0d:6b:b8:66:7d:a0: 81:60:a4:64:04:34:cf:e1:9e:da:d5:21:d7:7d:f3:28: e5:c3:42:c5:a0:7d:e9:51:e3:7c:4a:92:49:af:45:5d: 79:a1:17:e8:02:f7:78:62:77:63:a3:8c:47:8f:a4:66: 15:70:5d:1e:34:76:3e:78:fc:c7:92:fa:1f:f8:7a:c3: c7:a3:7c:4a:91:4c:0a:fa:a2:11:8f:3a:2e:65:b2:76: 2a:e3:8a:69:f6:3d:3b:b5:f6:9b:f3:be:55:1b:84:00: 1e:33:02:a9:7f:01:45:c5:f4:18:31:26:af:12:ca:d6: f8:d2:28:d0:ca:5c:d6:59:21:d9:7b:fc:ef:06:b4:2f: 28:4a:40:d0:87:64:7b:e7:ac:41:55:27:5a:1d:c4:c0 Fingerprint (SHA-256): 8F:5C:BF:14:CE:52:86:54:5C:93:28:34:11:F6:D3:AF:87:ED:6C:1E:45:46:94:F0:B2:CC:53:BF:88:A1:A1:81 Fingerprint (SHA1): F2:93:51:39:EA:D0:26:7C:27:51:30:B7:59:E9:F2:0C:FE:9C:40:30 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10385: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:85:45 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:27:23 2016 Not After : Mon Jul 25 19:27:23 2016 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:8d:b6:98:46:86:c9:55:0f:2b:89:68:ca:4c:d1:4c: 46:d4:1c:80:d4:52:19:ba:fa:05:6a:22:d8:03:e4:7b: 2a:ef:94:06:fc:60:e4:57:55:64:79:e1:5d:20:5d:dc: 8d:c4:e4:bc:90:db:49:ac:d3:29:0d:10:87:47:79:3b: 37:6a:db:89:ba:89:a3:04:6c:40:db:9c:98:8f:eb:95: 7f:01:ef:7c:df:48:e0:97:fe:f3:79:71:0b:15:99:fd: 9c:c3:30:3a:44:f7:a9:34:43:f8:0d:33:77:d1:81:13: 3e:53:dc:bc:98:c8:cc:34:76:94:5f:dc:68:70:97:fb: a2:4b:40:74:84:7c:11:23:73:8c:f8:79:68:e9:48:bb: 4d:6e:35:7b:61:99:07:2d:56:54:58:1e:8c:9b:fe:e4: 1b:ee:75:ba:b1:13:2f:6f:55:ca:5b:a6:18:49:12:2f: f1:e2:aa:0c:97:4d:3d:5c:68:c9:ea:37:c6:8b:96:eb: c8:40:12:3b:d9:e7:6f:ee:85:5c:af:ee:f4:80:00:26: 45:f0:ad:d7:bf:d7:4f:ca:57:8a:63:1f:2c:4c:c4:ee: 68:31:73:f9:45:a5:55:0c:c4:a5:cc:5c:11:ae:5c:46: 36:c2:91:2f:30:b8:ac:4a:62:3b:74:ad:c6:bc:41:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:b9:a0:dc:4e:54:2c:5f:1e:45:4f:cf:10:05:62:38: 0c:47:5a:ce:cf:fa:e1:33:83:d2:8a:6f:b6:d5:dc:1c: aa:ad:5a:c9:da:01:f7:d2:ec:c0:ae:fc:08:68:34:10: 83:7d:e4:34:d9:67:93:2b:42:de:fe:3c:e7:ac:d2:04: 3c:e4:68:64:76:ef:17:b3:c8:0e:cf:33:29:68:91:17: f1:33:8d:50:72:25:87:fc:0d:ee:84:4f:a7:7e:43:c6: f6:1a:a4:81:c2:de:e3:29:d8:52:b5:b7:a3:92:46:9d: 6d:b9:0d:ec:6d:48:16:3a:d9:3a:69:a6:42:fb:2a:74: 33:28:c9:1c:34:af:e7:e7:81:9c:0d:d0:72:d2:f5:1b: 9b:14:fe:2b:8e:69:ff:fb:12:94:2d:cd:b0:49:4a:6f: 1b:e0:41:23:db:c9:26:12:3f:66:f8:78:28:aa:72:52: e7:ff:4a:bd:a9:85:a3:c7:77:c5:62:a6:e6:8b:0e:74: 89:7d:a3:c7:cb:1e:da:6f:57:69:32:d5:58:f9:aa:0b: 52:66:31:33:59:61:24:61:af:95:d8:83:7e:f0:2f:a1: c0:db:6a:e0:b3:39:6d:81:30:5a:54:1f:41:c1:20:88: 7e:d0:dc:ae:8e:e0:70:90:c7:3f:94:99:de:4e:be:98 Fingerprint (SHA-256): A5:C1:BB:0F:F1:77:95:AB:29:A6:4C:78:BA:77:A5:33:2A:D2:8A:71:62:B8:90:7C:A8:15:42:8E:B1:ED:FA:F1 Fingerprint (SHA1): EC:23:AF:B5:33:C2:16:62:70:A0:01:2B:E1:E9:4C:8C:22:DB:5A:74 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10386: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:85:52 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Mon Apr 25 19:27:33 2016 Not After : Mon Jul 25 19:27:33 2016 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:ae:9f:a4:d2:42:5d:8c:e2:d7:32:c7:a6:5b:36:1b: 9c:13:48:bd:cf:85:36:c3:56:a3:98:ab:62:f7:27:f0: b7:bc:4f:cb:3f:6f:a2:19:b4:54:f4:1e:25:21:6b:50: 9d:5e:9b:2c:ca:fe:dd:a9:e1:ed:f8:52:6a:df:04:8c: b4:e7:26:58:04:44:c8:af:50:a1:2d:b3:f9:ac:9d:62: 6b:82:1a:69:70:a6:aa:b5:23:0f:84:ea:84:d0:f4:c1: 65:16:ec:50:d5:f5:91:b4:49:ea:07:54:fa:79:ff:24: 16:c8:e9:70:e4:6c:07:45:3c:01:b4:0e:27:3f:f9:b2: 1f:f4:61:ae:bf:14:ea:83:18:da:9f:2f:57:2e:1b:39: 42:22:81:a0:16:e6:1a:8d:44:c0:20:63:50:aa:16:9d: f2:76:16:ff:20:3c:df:24:c3:91:e7:ac:34:ee:f6:df: 09:71:10:da:c7:cc:fe:e4:f6:c1:f8:38:e3:f4:49:af: 99:b3:0c:a0:9e:7b:08:ba:22:4d:2d:a0:f3:3d:08:35: b6:b3:0f:a4:b6:18:41:2c:7e:b8:d1:17:a9:ca:94:a9: 47:04:ba:0d:9b:8b:9d:e6:01:9a:a6:71:f0:c9:ac:a6: f4:1f:94:0e:db:83:cb:31:6d:0f:1c:f3:c8:4e:7a:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:66:0e:90:a7:ca:1d:3a:63:da:a7:7f:47:e9:87:24: d1:db:21:85:1d:cf:f0:5c:b4:76:8b:b3:de:df:ad:17: ef:eb:ae:68:93:22:fe:e3:33:12:df:c0:79:f2:05:e2: 8c:d8:84:d2:74:00:67:c2:16:73:4d:16:d1:a8:55:17: 05:a3:d7:c0:bb:6c:f0:c5:e6:6a:6b:44:27:c4:aa:29: 1e:a4:12:c4:17:c2:35:64:de:f7:f2:ad:17:ec:85:a6: b6:4a:95:b9:22:74:e4:34:09:fd:96:d7:00:bd:1d:4e: 4a:45:ba:07:6f:af:7b:f8:87:9b:a9:36:51:8a:8d:ac: f2:86:58:88:51:f7:11:8c:70:4e:01:2c:a0:0a:81:93: 17:0e:e5:9e:43:e5:35:26:b5:3a:3c:ba:19:38:7d:be: 87:c5:6f:9d:10:22:76:f5:a2:3d:89:50:7b:2e:5e:a6: d3:fb:27:4d:ef:3a:74:db:26:2f:49:e8:ad:1f:cf:43: dd:58:8e:ed:2c:14:72:27:ef:47:b5:70:a2:b4:18:c4: 13:a3:02:ac:5a:d7:ca:8f:10:76:06:08:4a:5e:70:6d: e6:3b:da:51:30:99:34:cb:cf:7b:bf:f0:34:8b:2a:67: 84:99:eb:67:4d:bc:2d:58:0b:61:1f:b6:80:ff:bc:05 Fingerprint (SHA-256): E1:58:63:DF:79:63:01:54:87:29:2E:72:E0:11:96:C1:A3:BF:64:5B:87:F9:8B:7B:7D:CF:5E:7C:61:02:91:8A Fingerprint (SHA1): F2:E1:DA:93:B7:D2:7E:0E:E8:94:10:EA:B9:19:7E:DF:A8:78:99:3A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10387: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #10388: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #10389: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #10390: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:85:90 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Apr 25 19:28:10 2016 Not After : Mon Jul 25 19:28:10 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:85:68:43:15:ee:b3:bb:e5:c8:d9:df:a9:e1:40:98: 73:6e:29:30:45:76:98:9c:a1:6a:b5:d5:12:4c:74:82: 04:c5:28:b8:66:eb:ad:6d:5a:3a:f0:4e:3a:68:fa:b6: 5e:ed:df:55:56:59:72:fa:f2:a6:71:ac:86:e2:16:22: 31:18:29:af:ef:34:0d:b1:51:c3:cc:77:ce:e6:63:1b: 93:f7:86:7a:37:9b:a2:9f:3c:80:53:cf:be:22:eb:20: eb:6d:f3:2b:8a:1c:d8:a4:04:f6:20:3a:f7:94:e9:f7: 34:98:d9:96:1c:f1:c7:f7:dd:cd:73:f6:dd:87:e6:ee: e2:68:f0:a1:46:97:26:18:59:41:d0:db:20:a2:b2:dc: 40:d8:ca:de:a1:d0:f6:b8:ca:0e:ab:f6:e5:3b:d9:e6: 5e:3c:9f:fa:24:57:46:28:3a:6f:f4:27:74:a4:50:dd: 3d:66:24:ff:61:eb:19:fc:79:df:b4:bf:55:3b:d9:28: c7:4f:67:8c:94:64:c1:a4:d1:b5:95:14:c4:d9:89:ce: 17:3c:4c:c8:94:e9:d1:15:00:91:f7:de:88:3e:23:93: e2:f0:e5:08:5e:12:52:64:db:69:ef:5a:d6:c2:b8:5a: 85:16:e6:ad:7f:ce:da:5b:12:2b:a4:3f:4c:c3:0b:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:b8:d2:44:7f:81:83:18:51:3a:12:73:9b:50:1d:74: c4:4e:26:5c:86:92:a0:88:a1:42:ed:66:26:b7:09:e9: bc:64:3c:68:13:f4:06:5e:04:9d:84:00:29:3e:ec:a6: 35:79:18:a5:23:fb:89:4e:34:f5:ca:f9:45:ba:96:e7: 85:59:e3:82:6f:5a:04:07:ae:60:6a:08:fa:5e:32:92: c3:f7:4a:59:a8:77:08:d5:c9:7d:42:ef:f0:c7:27:bd: 3b:36:0d:35:5f:a8:46:41:12:f4:dc:34:3e:f7:42:da: 55:34:f0:46:cd:b1:f6:eb:d1:2f:a9:67:80:50:13:d7: fe:08:24:a2:10:47:b0:7d:3a:73:c7:50:3f:86:57:08: 89:e4:6f:9e:2a:b6:a0:12:98:41:3d:5d:00:1b:03:20: 06:18:4d:6f:5b:0f:8f:20:3a:2e:5c:42:72:20:32:9b: bd:eb:a5:42:f5:5f:b9:fa:ac:aa:30:de:cd:a0:4b:11: 2b:98:49:84:5d:9a:57:b1:3f:43:18:8a:77:48:73:17: 8e:1b:e3:da:cc:f7:1f:27:d3:2e:ac:cf:e6:b3:26:ff: 88:77:3c:2f:53:bd:fd:bb:23:7f:d2:e0:57:6b:1d:b0: c1:bd:eb:58:8a:75:a2:35:78:7c:80:7a:69:29:6d:5f Fingerprint (SHA-256): 4F:B0:2A:43:34:7B:B6:D1:9A:E4:96:4B:53:5D:9A:A0:2A:E3:9F:7F:3A:A2:50:5C:45:39:A9:6C:7A:D8:A3:D1 Fingerprint (SHA1): E2:EA:7D:FB:07:AE:EE:8B:60:02:26:D6:65:86:9A:87:48:D2:BB:8F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10391: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der cert.sh: #10392: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #10393: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #10394: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #10395: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #10396: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #10397: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #10398: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:a6:2a:85:e3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Mon Apr 25 19:29:00 2016 Not After : Mon Jul 25 19:29:00 2016 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:58:9c:20:0b:ad:46:17:2b:52:3e:0b:ab:6c:c5:2e: c8:f6:40:9f:ec:85:99:ae:08:f2:f2:91:a7:f7:2b:02: a5:c7:8c:92:25:f0:21:f4:1c:e8:cd:d0:c3:c7:ac:a7: d0:d3:3f:67:25:a0:5b:e9:69:75:e5:57:5f:e5:9d:77: 34:98:29:c7:2b:cc:7f:8c:c7:b7:f2:3a:f6:dd:8f:70: 18:4f:f9:a4:d5:a9:0c:08:d3:21:c6:aa:6a:d3:c7:34: 4c:0c:7e:70:fd:a3:b7:65:06:68:e0:38:5b:7c:e9:59: 60:e5:82:bf:d7:10:1d:22:1d:8c:73:70:96:d8:ab:79: 74:14:ee:08:99:ef:0a:17:b4:24:8e:b9:be:aa:eb:72: 3d:ae:19:4f:3c:02:5a:5e:b5:07:39:53:39:a9:4a:9e: 60:10:3a:c1:27:4b:20:3e:0c:7c:fe:72:96:ff:df:62: c2:95:c6:31:f2:7a:30:1a:8d:aa:8c:5f:d3:e8:83:e5: 45:3e:51:12:b3:14:67:da:8c:2e:cb:84:46:b2:9f:e7: 88:47:d6:ea:5d:7d:bf:fb:3c:21:52:5b:f8:03:5d:38: 2e:fa:aa:39:53:fd:55:96:28:f9:9a:4c:9f:dc:80:5e: c6:e7:1d:20:d3:f1:49:ba:2d:7c:38:13:f0:99:ca:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:76:e9:71:7f:8b:bd:bc:92:1f:b9:03:6f:9f:e4:36: 09:f5:31:71:84:16:eb:dc:03:4b:17:e0:8d:f7:27:75: fa:cb:e7:89:bc:8f:5e:91:7c:eb:2d:0b:bf:33:77:27: 91:36:bd:95:b0:e4:2a:c5:f8:44:04:49:cd:a9:93:c2: 0c:a1:54:93:c2:6b:f3:af:e3:42:5b:6b:4d:b0:f7:2a: 3c:c2:59:4d:05:b8:98:33:e0:91:e2:b4:68:66:67:89: 17:6a:a4:97:c4:ad:03:87:84:a4:0b:cc:ab:06:94:f3: 90:d9:f9:9a:87:7f:c9:a4:76:61:f2:25:f1:c6:7a:84: 12:45:39:e6:d6:b7:d1:36:f4:0d:f9:9e:fe:07:35:2f: 58:40:f6:07:17:a5:1c:b0:96:ad:91:3b:b3:e6:a9:de: 75:bc:2d:cc:d3:90:17:e2:36:ec:34:ed:6d:af:81:bb: 6c:74:3e:b3:cf:df:ac:72:fe:f1:26:93:16:f9:05:90: ca:2a:ab:5d:d0:32:7c:da:a6:b1:18:c9:ae:43:a6:18: 40:2f:2b:b1:32:0f:18:0f:33:32:72:56:e3:52:bf:d3: b0:6c:c3:b1:46:75:d9:a8:7d:36:20:dd:21:bb:6f:56: 9a:f5:82:f4:01:1c:a0:0b:14:7a:81:6d:2e:53:85:dd Fingerprint (SHA-256): 9E:45:9F:CD:98:24:16:2E:CE:B2:02:FA:43:B5:A4:F7:F9:AB:DA:05:7F:2C:DE:E0:94:5E:72:58:DD:C5:B0:07 Fingerprint (SHA1): BF:49:94:AD:E9:75:F3:53:71:14:43:AB:A5:E9:13:5B:8B:F6:85:DE Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #10399: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #10400: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #10401: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #10402: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10403: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10404: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #10405: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #10406: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10407: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #10408: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #10409: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #10410: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #10411: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #10412: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #10413: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10414: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #10415: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10416: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10417: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #10418: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10419: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10420: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #10421: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10422: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10423: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #10424: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10425: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10426: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #10427: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10428: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #10429: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #10430: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #10431: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #10432: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10433: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #10434: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10435: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #10436: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #10437: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #10438: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #10439: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #10440: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #10441: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #10442: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #10443: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #10444: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #10445: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #10446: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #10447: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #10448: perform selftest - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10449: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #10450: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10451: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10452: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #10453: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10454: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10455: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #10456: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10457: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10458: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #10459: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10460: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10461: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #10462: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10463: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10464: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #10465: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10466: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10467: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #10468: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10469: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10470: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #10471: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10472: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10473: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #10474: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10475: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10476: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #10477: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10478: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10479: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #10480: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10481: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10482: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #10483: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10484: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10485: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #10486: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10487: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10488: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #10489: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10490: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10491: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #10492: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10493: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10494: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #10495: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10496: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10497: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #10498: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10499: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10500: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #10501: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10502: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10503: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #10504: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10505: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10506: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #10507: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10508: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10509: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #10510: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10511: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10512: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #10513: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10514: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10515: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #10516: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10517: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10518: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #10519: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10520: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10521: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #10522: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10523: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10524: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #10525: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10526: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10527: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #10528: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10529: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10530: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #10531: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10532: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10533: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #10534: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10535: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10536: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #10537: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10538: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10539: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #10540: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10541: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10542: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #10543: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10544: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10545: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #10546: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10547: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10548: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #10549: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10550: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10551: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #10552: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10553: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10554: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #10555: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10556: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10557: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #10558: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10559: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10560: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #10561: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10562: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10563: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #10564: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10565: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10566: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #10567: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10568: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10569: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #10570: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10571: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10572: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #10573: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10574: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10575: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #10576: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10577: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10578: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #10579: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10580: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10581: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #10582: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10583: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10584: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #10585: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10586: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10587: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #10588: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10589: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10590: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #10591: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10592: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10593: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #10594: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10595: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10596: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #10597: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10598: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10599: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #10600: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10601: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10602: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #10603: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10604: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10605: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #10606: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10607: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10608: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #10609: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10610: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10611: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #10612: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10613: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10614: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #10615: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10616: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10617: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #10618: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10619: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10620: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #10621: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10622: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10623: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #10624: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10625: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10626: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #10627: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10628: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10629: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #10630: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10631: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10632: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #10633: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10634: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10635: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #10636: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10637: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10638: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #10639: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10640: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #10641: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #10642: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #10643: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #10644: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #10645: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #10646: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #10647: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #10648: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #10649: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #10650: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #10651: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #10652: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #10653: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #10654: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #10655: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #10656: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #10657: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #10658: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #10659: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #10660: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Mon Apr 25 19:35:36 UTC 2016 Checking if dbtests should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Running tests for dbtests TIMESTAMP dbtests BEGIN: Mon Apr 25 19:35:36 UTC 2016 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #10661: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #10662: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #10663: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #10664: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #10665: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #10666: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #10667: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #10668: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtests.sh: #10669: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #10670: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_UNRECOGNIZED_OID: Unrecognized Object Identifier. dbtests.sh: #10671: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #10672: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #10673: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir -r--r-----. 1 mockbuild mockbuild 1220 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1424 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 577 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 705 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 870 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 205824 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/cert9.db -r--------. 1 mockbuild mockbuild 102400 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/key4.db -r--------. 1 mockbuild mockbuild 622 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mockbuild 394 Apr 25 19:35 /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #10674: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:35 2016 Not After : Sun Apr 25 19:23:35 2021 Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:1d:d3:30:e8:8d:1c:81:fa:56:81:e3:8f:bf:70:ca: 32:e1:b9:d5:2b:dd:a8:92:00:20:12:3c:6e:38:cf:f5: d3:58:d3:ec:a3:55:21:43:13:7f:af:52:42:96:67:c0: 3c:4e:4d:a0:be:44:f8:07:7f:06:bd:8b:6b:e5:60:66: 9a:44:9c:6c:d6:d5:00:06:07:ba:64:ee:39:28:e8:bb: 43:55:0a:b9:4d:08:30:a3:5b:6f:c8:c9:95:32:b3:35: 49:33:ec:67:d1:44:2e:b0:f9:6a:31:0b:3a:31:f4:d3: 81:00:70:e0:7a:a3:e5:c9:65:90:63:96:50:80:6b:70: ef:13:cc:6d:84:43:b6:94:d4:42:f5:7c:2b:88:b0:20: 50:d0:5c:94:79:5b:46:f5:63:b0:6b:34:66:96:99:21: 9c:7e:79:c7:ba:50:63:58:40:86:12:c8:9f:de:4d:38: 94:61:f4:f0:09:c3:70:7e:cc:5b:28:41:96:5d:86:2c: d4:73:ed:eb:53:11:ce:01:e6:52:27:d3:63:bd:17:84: 5d:40:f4:5c:15:97:a4:3a:11:f1:e1:90:cc:d9:5d:2c: 90:81:e4:5d:8b:16:c0:e4:e9:a2:78:fb:26:61:4b:92: 1f:fc:e0:1c:9f:c5:dc:97:e1:47:30:4d:eb:96:a7:01 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:d3:c0:15:b6:e9:9e:88:50:d9:50:77:c6:53:54:00: 54:a0:10:23:3b:1e:13:fd:3f:03:54:9a:e2:82:e6:d2: a9:9f:c0:d2:40:02:bc:91:b6:c3:15:c6:73:b0:cb:a3: 06:17:21:2b:76:d9:97:7f:a1:60:22:d4:a0:fb:21:ef: 92:5b:f2:18:57:44:c4:23:0d:fd:14:da:d4:a5:93:a2: 27:d5:51:00:90:9f:13:4f:3b:aa:48:5a:68:e9:29:81: 7f:dc:97:7b:ae:8c:e2:fa:fd:d3:a5:de:fe:7c:c1:ae: 07:b0:05:93:51:59:3c:82:9b:bb:71:44:a5:67:44:64: b5:0f:be:d3:f5:dc:f7:ba:1d:cb:1e:30:da:e2:7e:e9: 25:04:ea:50:06:9a:a3:16:71:cf:3f:4f:49:f9:ad:e8: e8:cd:a2:6d:9f:18:e3:32:05:68:3e:53:c9:eb:de:45: 48:c1:ae:20:f8:72:c6:87:d7:a9:21:62:0a:5d:4d:1e: ca:36:13:17:ee:db:6b:b2:0f:7b:19:65:3a:f1:24:ac: 0c:79:8b:2e:9b:b6:e7:68:22:14:98:e4:c5:00:ae:76: bb:ce:ab:a5:32:8f:68:73:78:90:bc:48:f4:02:20:86: de:7c:a2:3c:b1:4e:55:8d:57:2f:ad:72:11:56:d0:a3 Fingerprint (SHA-256): C7:CF:38:B1:A9:51:B1:87:1F:A4:B9:B6:9C:7B:75:6D:CF:E1:7B:96:25:78:86:F6:C9:EE:78:F1:9C:DD:39:A8 Fingerprint (SHA1): E9:FF:6B:8A:2A:90:20:E4:31:15:CE:E3:B3:CC:CC:3E:B4:AA:0F:94 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #10675: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED TIMESTAMP dbtests END: Mon Apr 25 19:35:47 UTC 2016 Checking if tools should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Running tests for tools TIMESTAMP tools BEGIN: Mon Apr 25 19:35:47 UTC 2016 tools.sh: Tools Tests with ECC =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10676: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: df:42:6b:55:46:bf:6a:91:86:96:08:17:ec:3b:f8:bd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10677: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10678: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10679: Exporting Alice's email EC cert & key (pk12util -o) - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10680: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6e:f4:fd:93:28:59:25:2b:21:c5:1d:24:52:1b:7d:2b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Apr 25 19:20:36 2016 Not After : Sun Apr 25 19:20:36 2066 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:3e:cd:cf:26:92:14:e1:08:1b:88:ba:7e:8f:aa: df:d5:cb:ea:7c:8f:c7:e2:64:ee:34:61:50:0a:fd:20: 7c:da:f6:a5:a8:9d:d5:6b:cf:fc:a6:00:d6:7f:fe:db: 20:32:df:9a:95:8e:34:6f:ea:4e:a0:0a:5b:26:3c:68: 11:76:45:01:9b:8b:55:37:a6:6f:a0:42:54:50:59:7b: 92:57:61:41:35:a7:5f:9f:4c:8f:4a:87:b6:95:e3:2b: 5b:bf:1c:7b:42:9c:5b:ce:40:44:82:97:d6:df:cd:c1: dd:e4:70:6a:a9:38:d7:ef:35:13:6b:3f:69:71:62:f2: 8b:45:b8:26:5b Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:86:02:41:78:81:37:ed:42:e1:bb:58:93:bf:e2: 20:f5:8e:11:c2:65:91:16:0a:ff:eb:ec:f9:d2:c2:67: 1e:34:34:76:43:8d:9e:63:1f:e7:38:59:dc:2c:47:05: b9:33:ec:b1:91:06:5f:1f:66:a9:c0:0a:83:e8:a8:58: 1c:2e:e8:f4:94:50:02:41:40:26:a7:43:20:3d:86:a8: 69:b6:61:ae:24:db:de:3a:f2:75:df:ad:76:16:e6:77: aa:e0:e5:ad:2d:28:49:06:51:07:66:89:07:a8:05:74: 31:8d:77:e5:6f:95:da:04:03:f1:af:95:e7:ed:5b:99: a3:20:7d:06:47:72:fd:4f:c0 Fingerprint (SHA-256): 09:F4:F4:6E:61:11:A9:58:7F:A0:91:9E:42:BC:2F:25:14:77:1A:C0:AF:3E:1E:A2:44:FE:9D:76:67:0D:A8:FE Fingerprint (SHA1): 0B:1E:A7:B7:2F:45:AD:02:CB:FE:A0:13:F5:ED:49:03:DC:5F:E2:5D Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Mon Apr 25 19:23:15 2016 Not After : Sun Apr 25 19:23:15 2021 Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:34:02:99:94:1e:0f:6b:fb:a6:83:49:87:e7:d4:99: 9d:0b:5b:4b:36:05:c1:02:8b:0c:1d:1c:c6:32:76:47: 15:52:57:12:63:db:03:04:cf:86:5a:96:03:38:2a:01: da:ba:d6:7d:12:eb:71:4a:b4:09:a3:46:78:2d:be:4a: 6a:02:55:72:74:47:1b:3d:a8:c1:f4:a6:3a:6b:bf:ec: 95:c1:03:91:dd:93:f8:2b:38:59:7a:8a:a4:b5:2b:69: ac Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA-1 Signature: 30:81:88:02:42:01:14:37:91:9b:ac:2b:f4:65:b0:10: 63:62:2a:bb:c3:88:24:6e:d7:57:69:b5:b3:7b:10:6e: e5:aa:12:12:2b:1c:a9:57:ff:e9:59:35:a6:0c:63:c7: ce:77:75:e4:6e:b0:e8:b4:1e:bc:a3:a7:14:6c:37:53: 34:4b:ee:bd:e4:2e:5f:02:42:00:f3:84:3c:b6:0c:d0: 83:cc:c3:b0:a4:b2:40:9a:8c:7d:f2:88:7f:a8:7e:91: ac:bd:a4:1d:ea:14:93:ca:d7:b1:ee:f1:f9:23:5e:a6: 4b:f1:74:7a:b4:6d:a1:41:5c:2d:e4:bd:f9:22:5e:4e: 2d:a7:92:6e:2a:e2:b9:6a:df:05:d5 Fingerprint (SHA-256): 94:5F:77:C6:74:8B:B6:6E:DA:06:62:BF:04:37:AF:AF:79:A2:9B:D9:A0:2C:8B:42:B3:B0:65:3D:05:B2:BC:6E Fingerprint (SHA1): 2F:2B:8D:BB:93:B2:6B:55:FC:BB:F8:FA:9C:58:87:3C:DF:EF:57:15 Friendly Name: Alice-ec tools.sh: #10681: Listing Alice's pk12 EC file (pk12util -l) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10682: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 3c:a2:bb:ff:94:3f:3f:a6:55:3c:3c:56:7b:f5:e0:be Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10683: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10684: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10685: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c2:62:9c:20:b0:8f:6a:73:c8:57:11:d6:7c:8a:96:aa Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10686: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10687: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10688: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 0c:28:50:0c:73:37:64:bd:a1:89:d6:03:e8:d4:da:15 Iteration Count: 2000 (0x7d0) tools.sh: #10689: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10690: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10691: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8d:88:f7:a3:9c:52:c7:28:02:ae:76:8b:eb:c5:03:0b Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10692: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10693: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10694: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 84:4a:b7:8b:72:21:01:18:1b:59:71:77:21:3d:b3:55 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10695: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10696: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10697: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9c:e9:df:c7:27:ac:8d:74:bb:bf:5f:ac:25:37:4f:b8 Iteration Count: 2000 (0x7d0) tools.sh: #10698: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10699: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10700: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d2:bf:0d:83:17:52:74:f5:7a:6e:ee:42:3c:71:08:f7 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:4b:4b:33:f7:5f:89:e6:e2:be:a0:8d:4a:ca:00: fd:c1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10701: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10702: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10703: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9d:fb:d2:73:87:2c:cc:5c:a6:02:e4:50:8b:ac:64:db Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:d7:4e:86:9c:90:83:c3:dc:53:1f:79:2d:4c:2b: 49:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10704: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10705: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10706: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:40:95:5a:72:18:7c:17:76:35:7d:73:dd:6b:36:ad Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:a7:22:08:b8:46:08:b0:b9:28:ca:b1:57:48:6a: 6e:96 tools.sh: #10707: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10708: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10709: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 80:48:e0:b9:75:5b:ae:01:9d:8d:19:b1:a7:b7:e6:24 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:4e:a8:c0:be:1b:42:72:45:40:43:d0:db:f1:bb: 8e:11 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10710: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10711: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10712: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 07:3d:4c:29:80:2f:cd:c9:45:4b:a3:5b:d4:1b:27:6f Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:30:7e:0a:55:4b:85:f9:cd:e6:da:60:2c:7f:9a: c6:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10713: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10714: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10715: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 07:d0:bc:35:db:58:03:dc:2b:82:15:97:9f:0d:f3:d6 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:3a:c2:ed:ff:84:a9:36:e9:71:53:10:0e:30:85: 8d:26 tools.sh: #10716: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10717: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10718: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:f7:53:34:f3:a8:92:8c:1d:f6:5b:54:46:54:3c:c8 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:02:42:fd:9f:7b:41:c7:5f:45:fb:56:da:60:a4: b5:64 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10719: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10720: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10721: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a2:3b:38:dc:9b:f4:7f:75:4a:d4:d2:c7:ba:05:96:b2 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:88:df:c1:51:93:97:ac:c7:33:4f:ce:62:98:e1: 72:7b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10722: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10723: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10724: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:dd:97:4f:99:eb:d3:66:66:2d:43:22:ee:ca:dd:df Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e3:83:7b:c5:ab:b8:7a:2b:34:02:03:2a:1b:48: 55:18 tools.sh: #10725: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10726: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10727: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 75:fe:8a:b6:ab:9e:c0:a1:80:64:ed:21:7f:a7:77:c5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:e9:10:2f:7b:2a:48:5b:70:d0:21:23:cf:f9:36: 61:24 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10728: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10729: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10730: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 48:1f:d4:a3:77:fd:c2:d4:63:29:8b:e2:de:3a:5c:54 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:02:11:fc:e4:00:28:ab:ca:aa:33:45:a3:44:50: 04:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10731: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10732: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10733: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:7c:cc:d4:d1:e1:a1:39:87:70:d5:a4:39:ac:b5:3a Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:cd:c8:4c:59:0e:4b:fb:f4:7a:c3:03:a5:fe:98: 94:b5 tools.sh: #10734: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10735: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10736: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:a1:0d:86:69:1b:10:b7:52:0f:70:ef:1d:ed:7c:69 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:c0:f4:b1:c5:8e:72:d9:38:a9:d6:11:0b:10:08: 60:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10737: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10738: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10739: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9b:31:0f:36:d4:e8:b4:73:e8:f0:40:d4:0f:89:94:5b Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:95:c0:90:77:f3:57:7b:89:48:4d:e1:da:c9:44: 96:7e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10740: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10741: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10742: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f3:76:b5:0d:84:03:0f:d2:9a:2a:17:a0:83:14:03:e5 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:dd:7d:a5:aa:f9:28:11:79:46:2f:95:ec:1a:7e: f8:2e tools.sh: #10743: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10744: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10745: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e3:1f:28:c6:52:bf:e9:43:e9:34:0c:d8:50:b3:b1:19 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:79:bf:17:53:7c:54:36:64:10:fb:91:cc:a7:b4: d1:76 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10746: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10747: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10748: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5e:ee:ba:32:63:17:fa:94:22:00:e3:2b:06:69:63:74 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:b8:ab:22:83:92:85:7d:c2:d7:c3:a3:50:f3:95: 7c:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10749: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10750: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10751: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:4c:71:a5:9b:a3:cd:67:b1:53:26:0d:26:5e:c2:22 Iteration Count: 2000 (0x7d0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:2f:68:d6:d8:e8:3d:f1:4e:ca:0e:7f:9c:a1:22: 5a:6f tools.sh: #10752: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10753: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10754: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ac:15:2d:58:31:45:12:ac:b9:76:37:2c:b5:5e:08:c3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10755: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10756: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10757: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a4:70:90:eb:51:68:93:0a:47:0f:81:eb:89:2b:4b:81 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10758: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10759: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10760: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: cc:bc:31:54:71:d1:88:cf:79:72:e5:22:86:1f:7f:40 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10761: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10762: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10763: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 19:1a:d4:d0:94:c5:1d:d9:58:a4:f3:5f:b1:3e:75:d6 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10764: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10765: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10766: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 0b:89:68:14:78:03:67:a5:0b:25:ce:86:6f:b1:8f:9f Iteration Count: 2000 (0x7d0) tools.sh: #10767: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10768: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10769: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 9c:ac:d3:7f:16:fe:d1:ba:88:68:e5:09:19:6d:2a:20 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10770: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10771: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10772: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 47:8a:c9:f1:36:45:b9:2a:5b:a6:03:27:27:8e:c6:6c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10773: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10774: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10775: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 6c:5b:14:3c:c3:8c:7a:a0:9e:22:19:7b:47:a1:27:21 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10776: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10777: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10778: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a1:23:0f:6e:e0:53:7a:a3:66:12:93:c4:e9:2e:7e:fd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10779: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10780: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10781: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: cf:e2:8f:1d:f3:3d:1c:d9:ee:86:a7:89:7c:17:54:e1 Iteration Count: 2000 (0x7d0) tools.sh: #10782: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10783: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10784: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 16:42:0e:ab:3c:38:46:88:15:21:70:72:70:d3:0f:b0 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10785: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10786: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10787: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e3:1f:57:4d:2d:86:fe:f0:7b:17:19:8e:ba:33:ad:8d Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10788: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10789: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10790: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 58:1a:d2:d3:1b:42:4f:c0:79:51:73:03:bd:3b:f3:4f Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10791: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10792: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10793: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2c:b6:04:df:d8:b2:83:6e:4a:14:03:3c:4d:50:e6:32 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10794: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10795: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10796: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c3:42:16:5c:89:26:6d:be:c5:b4:c4:96:c4:ba:72:28 Iteration Count: 2000 (0x7d0) tools.sh: #10797: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10798: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10799: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: de:a8:4d:29:7c:a7:dd:34:e4:cc:1f:f5:9a:89:13:5c Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10800: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10801: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10802: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 47:7c:68:4f:e7:5c:0c:4d:0f:4d:5a:e3:11:46:3d:65 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10803: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10804: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10805: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3c:bc:3a:95:65:68:55:c9:5d:da:2a:7a:67:6d:4e:dd Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10806: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10807: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10808: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fc:e5:e9:15:cb:b8:95:a5:01:4b:6d:70:05:59:85:dc Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10809: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10810: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10811: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 18:c0:ee:64:54:b7:ca:1e:90:9f:05:5d:d6:24:26:b5 Iteration Count: 2000 (0x7d0) tools.sh: #10812: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10813: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10814: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e1:78:13:b7:78:18:1c:cb:c9:a3:81:9e:d1:ad:6f:34 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10815: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10816: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10817: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 85:db:29:73:ce:01:35:d2:1e:4d:5b:55:a9:c9:2c:66 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10818: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10819: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10820: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ed:6d:00:61:7b:71:e4:cb:e6:44:94:bc:7f:05:c5:db Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10821: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10822: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10823: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8f:f4:5a:15:e4:9b:59:14:bd:67:08:bc:f6:8e:64:a3 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10824: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10825: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10826: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: be:2b:aa:b4:26:bd:53:1c:b9:19:3b:8d:a9:45:83:36 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10827: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10828: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10829: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 98:eb:4a:39:d2:88:7a:af:50:4d:1b:c4:03:b6:d6:15 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10830: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10831: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10832: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 25:7e:79:d0:62:4e:73:10:5f:12:ee:1d:b1:5f:a0:50 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10833: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10834: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10835: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8b:32:d8:a4:45:3f:b9:f9:d0:09:ac:f3:27:5d:f7:e4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10836: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10837: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10838: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ed:5e:86:44:a8:b7:24:66:e3:1a:4d:19:86:c0:e6:f4 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10839: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10840: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10841: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3e:df:0d:5a:5a:5e:68:92:02:5d:b0:e4:6a:43:fd:e9 Iteration Count: 2000 (0x7d0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:18:56 2016 Not After : Sun Apr 25 19:18:56 2066 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:98:13:dd:f0:25:37:0c:32:19:26:f3:b4:c2:80:2d: 52:41:8d:33:74:f3:27:17:09:2a:94:fa:3a:de:6e:12: 0d:ef:9b:c8:e7:59:fb:c8:f2:ae:0a:2a:92:b3:06:47: 94:4b:e2:83:8e:a4:d0:76:26:e7:c7:0c:4e:c8:87:95: f7:76:4d:eb:0f:70:32:05:d5:66:4d:d2:8f:17:b1:db: 77:80:7b:86:d1:70:c9:36:88:20:4b:57:9c:f6:39:a6: 49:c7:cc:f3:00:ff:f6:42:40:a4:64:cd:c0:f8:cf:6b: 28:f0:54:0e:47:ec:2c:f2:ae:80:cc:97:6d:0f:7b:a5: 9c:da:83:cc:be:78:25:28:c2:ab:21:df:0c:7a:b7:97: 6e:3f:1f:86:de:6a:c2:fe:08:e2:cd:93:e1:0d:c0:9a: 19:d3:0e:be:0a:dc:1c:01:81:78:09:c9:69:0e:6a:ea: 0c:58:60:a6:62:c4:0f:30:a5:8d:f8:ee:44:22:36:af: 76:28:98:1d:fb:05:3d:4e:78:f0:32:ea:29:b6:18:b5: 21:b8:4f:ac:ef:db:de:cf:33:89:da:45:12:74:2d:7d: 9f:4e:a8:4b:cf:f8:b9:b1:68:8a:0d:53:2c:38:56:f5: af:b3:60:62:5b:84:2b:2e:92:da:27:67:00:c2:5d:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:fd:70:16:b2:41:87:44:76:3d:52:57:83:13:3b:e2: 2f:e8:7a:35:73:13:b2:61:9d:bc:4e:9a:66:12:ea:de: c5:2c:d2:f2:3c:da:04:c4:2e:63:4d:cc:50:2c:43:db: 6c:65:63:43:83:d8:9b:63:f4:26:a3:d6:56:52:65:72: 27:1c:38:fc:02:9b:49:ca:6b:ab:6b:fd:3e:43:01:e8: 0e:eb:13:a0:a9:34:61:b7:6c:f4:38:36:41:05:29:e3: c5:71:6f:bd:e5:01:82:ff:1c:b0:c9:10:5c:6b:da:e1: 02:2f:b8:94:c9:f4:03:a3:e0:24:e5:8d:27:81:4c:65: ee:da:c0:65:a4:86:4b:8c:0d:46:07:05:d2:fd:e5:f9: ca:2d:8a:e7:ae:47:0c:c5:27:0a:dc:5c:68:49:c3:9f: ef:b5:04:25:1e:6d:44:ea:f2:85:80:8a:1f:6a:46:8e: bc:68:f3:e6:66:dc:20:90:0c:58:65:51:e7:e4:0a:1e: e7:2a:2f:47:81:42:0e:85:6a:a9:50:ad:04:9c:c9:d4: 91:08:79:81:04:34:85:ca:72:b6:9f:a4:4f:e0:c1:4f: ba:5c:27:bc:70:91:5c:56:46:e4:d7:f0:1b:f0:c0:2b: cc:8b:d3:f5:11:33:0d:3d:a4:99:2a:09:ca:ba:12:6a Fingerprint (SHA-256): 82:E9:CF:9D:85:25:12:BC:46:CE:BC:8F:4E:BB:D1:9D:C9:27:D6:A5:1F:0D:D2:21:A1:51:76:84:FA:E9:27:21 Fingerprint (SHA1): C0:78:8D:D4:32:41:AB:F5:E1:19:5C:D0:46:A1:BF:08:5D:0D:E9:EB Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:23:08 2016 Not After : Sun Apr 25 19:23:08 2021 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:51:4d:7b:2b:68:46:01:a5:f8:c6:b3:e2:bc:dc:88: c7:0c:e9:84:cd:09:42:4e:ce:e1:ba:b8:23:f1:f4:17: 40:b7:bb:c1:e7:fc:91:52:71:a7:6f:d8:24:f4:c0:be: 40:02:64:48:16:38:5c:25:6f:4c:68:31:02:ab:d7:74: d9:6e:df:a2:f7:3f:f0:09:94:32:2e:61:4f:df:fc:8c: c7:69:76:6e:f8:6d:cd:06:fb:30:0f:e7:7e:e1:b4:60: f0:24:09:75:88:8d:06:41:9a:1b:a9:a0:23:e1:08:bb: 9f:8b:cc:93:51:c7:9a:86:bd:4b:c0:2f:58:56:98:f3: 32:c8:12:15:0c:fc:9a:5c:8f:f1:ae:1c:00:22:21:4d: 60:3c:8a:93:0a:ee:e7:c6:21:35:59:61:15:51:72:df: ce:9a:0f:6f:31:85:e5:c6:c3:e9:d2:f5:44:e6:e8:d2: 92:44:0f:cb:72:0d:0f:4e:66:2f:4f:d9:2b:fb:e0:3e: ef:66:ad:36:4a:49:10:dd:27:7c:a7:6a:56:af:53:c2: 55:9c:3b:ae:ad:56:dc:68:cb:77:e3:7c:25:d6:51:39: 6e:59:fb:54:5e:bf:e9:f4:60:bf:3b:35:d5:60:a9:4e: 36:78:c6:12:1d:2b:6c:05:be:79:b3:27:b4:29:3f:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:dc:30:24:dc:72:18:bd:97:24:ce:43:f9:2f:3a:1f: 1c:99:c5:2a:66:57:42:06:ff:59:9b:bd:a5:b0:07:be: 77:09:20:44:8a:57:83:65:4e:e2:f0:bc:fd:b0:67:39: d6:93:4a:2a:c3:db:ae:f1:3b:53:9a:5d:50:15:22:d3: 2b:54:6d:9e:08:ba:bd:00:b8:cb:97:06:53:db:87:89: 3a:a9:d5:40:c3:a8:da:dd:68:02:b6:1b:95:6d:f5:2f: 52:ae:37:9c:57:e1:db:c8:2e:b8:b7:e4:35:5b:7a:56: 83:da:70:72:f7:9c:fe:a4:c9:49:cf:27:96:57:0f:90: ca:e7:b4:0d:e6:7a:83:0b:b5:49:ee:93:2c:15:53:c5: 4c:5e:23:10:f9:31:72:0e:fc:9d:f4:d6:54:1f:fe:d5: fd:65:9e:47:36:4d:ab:ea:77:90:ea:98:76:90:de:dd: d0:8a:f6:17:fb:60:3c:a5:f4:33:20:a9:95:dd:54:57: ac:da:89:88:6f:c0:12:fb:f0:ea:e4:01:cb:5d:8c:83: 65:30:0a:e7:bc:9b:ab:4a:fc:fd:66:3e:a1:3f:74:2c: d7:5f:f3:e0:d1:94:09:ec:ea:2f:49:85:86:f1:6d:1a: c4:c7:30:24:b7:bd:81:59:d9:11:82:0d:a1:38:f1:73 Fingerprint (SHA-256): 07:44:E0:CE:7C:D7:C2:D2:D1:AB:E3:B4:9F:01:25:99:F5:90:4E:D4:47:75:C8:90:63:AA:32:BB:89:C0:EE:AA Fingerprint (SHA1): 7C:80:53:45:1B:0C:55:4D:F1:82:8F:A4:89:98:D9:7D:E5:74:D2:32 Friendly Name: Alice tools.sh: #10842: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #10843: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #10844: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #10845: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #10846: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #10847: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #10848: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #10849: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #10850: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #10851: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #10852: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Mon Apr 25 19:37:47 UTC 2016 Checking if fips should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Running tests for fips TIMESTAMP fips BEGIN: Mon Apr 25 19:37:47 UTC 2016 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #10853: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #10854: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 71ef03f727546570ea1846203d2b352985cd5e2a NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #10855: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #10856: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #10857: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #10858: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #10859: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #10860: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #10861: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10862: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #10863: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #10864: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #10865: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 71ef03f727546570ea1846203d2b352985cd5e2a FIPS_PUB_140_Test_Certificate fips.sh: #10866: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #10867: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10868: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #10869: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #10870: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 71ef03f727546570ea1846203d2b352985cd5e2a FIPS_PUB_140_Test_Certificate fips.sh: #10871: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #10872: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #10873: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libgtest1.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle Changing byte 0x00032fe4 (208868): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #10874: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Mon Apr 25 19:39:35 UTC 2016 Checking if sdr should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Checking if crmf should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Running tests for crmf TIMESTAMP crmf BEGIN: Mon Apr 25 19:39:35 UTC 2016 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #10875: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #10876: CMMF test . - PASSED TIMESTAMP crmf END: Mon Apr 25 19:39:36 UTC 2016 Checking if smime should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Running tests for smime TIMESTAMP smime BEGIN: Mon Apr 25 19:39:36 UTC 2016 smime.sh: S/MIME Tests with ECC =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #10877: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10878: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #10879: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #10880: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #10881: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #10882: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10883: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #10884: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1 smime.sh: #10885: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED diff alice.txt alice-ec.data.SHA1 smime.sh: #10886: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #10887: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10888: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #10889: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #10890: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #10891: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #10892: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10893: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #10894: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256 smime.sh: #10895: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED diff alice.txt alice-ec.data.SHA256 smime.sh: #10896: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #10897: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10898: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #10899: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #10900: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #10901: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #10902: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10903: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #10904: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384 smime.sh: #10905: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED diff alice.txt alice-ec.data.SHA384 smime.sh: #10906: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #10907: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10908: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #10909: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #10910: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #10911: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #10912: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #10913: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #10914: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512 smime.sh: #10915: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED diff alice.txt alice-ec.data.SHA512 smime.sh: #10916: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #10917: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #10918: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #10919: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #10920: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #10921: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #10922: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #10923: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #10924: Decrypt with a Multiple Email cert . - PASSED smime.sh: #10925: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #10926: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #10927: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #10928: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #10929: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #10930: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #10931: Decode Encrypted-Data . - PASSED smime.sh: #10932: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #10933: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #10934: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #10935: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #10936: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #10937: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Mon Apr 25 19:40:09 UTC 2016 Checking if ssl should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Running tests for ssl TIMESTAMP ssl BEGIN: Mon Apr 25 19:40:09 UTC 2016 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests - with ECC =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7196 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7196 found at Mon Apr 25 19:40:09 UTC 2016 selfserv_9709 with PID 7196 started at Mon Apr 25 19:40:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10938: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7196 at Mon Apr 25 19:40:11 UTC 2016 kill -USR1 7196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7196 killed at Mon Apr 25 19:40:11 UTC 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7252 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7252 found at Mon Apr 25 19:40:12 UTC 2016 selfserv_9709 with PID 7252 started at Mon Apr 25 19:40:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10939: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7252 at Mon Apr 25 19:40:14 UTC 2016 kill -USR1 7252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7252 killed at Mon Apr 25 19:40:14 UTC 2016 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7308 found at Mon Apr 25 19:40:14 UTC 2016 selfserv_9709 with PID 7308 started at Mon Apr 25 19:40:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10940: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7308 at Mon Apr 25 19:40:16 UTC 2016 kill -USR1 7308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7308 killed at Mon Apr 25 19:40:16 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:40:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7376 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7376 found at Mon Apr 25 19:40:17 UTC 2016 selfserv_9709 with PID 7376 started at Mon Apr 25 19:40:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10941: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7376 at Mon Apr 25 19:40:19 UTC 2016 kill -USR1 7376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7376 killed at Mon Apr 25 19:40:19 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:40:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7433 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7433 found at Mon Apr 25 19:40:19 UTC 2016 selfserv_9709 with PID 7433 started at Mon Apr 25 19:40:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10942: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7433 at Mon Apr 25 19:40:21 UTC 2016 kill -USR1 7433 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7433 killed at Mon Apr 25 19:40:21 UTC 2016 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:40:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7489 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7489 found at Mon Apr 25 19:40:22 UTC 2016 selfserv_9709 with PID 7489 started at Mon Apr 25 19:40:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10943: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7489 at Mon Apr 25 19:40:24 UTC 2016 kill -USR1 7489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7489 killed at Mon Apr 25 19:40:24 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7557 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7557 found at Mon Apr 25 19:40:24 UTC 2016 selfserv_9709 with PID 7557 started at Mon Apr 25 19:40:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #10944: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7557 at Mon Apr 25 19:40:26 UTC 2016 kill -USR1 7557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7557 killed at Mon Apr 25 19:40:27 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7613 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7613 found at Mon Apr 25 19:40:27 UTC 2016 selfserv_9709 with PID 7613 started at Mon Apr 25 19:40:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10945: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7613 at Mon Apr 25 19:40:29 UTC 2016 kill -USR1 7613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7613 killed at Mon Apr 25 19:40:29 UTC 2016 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:29 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7669 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7669 found at Mon Apr 25 19:40:30 UTC 2016 selfserv_9709 with PID 7669 started at Mon Apr 25 19:40:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #10946: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7669 at Mon Apr 25 19:40:31 UTC 2016 kill -USR1 7669 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7669 killed at Mon Apr 25 19:40:32 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7737 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7737 found at Mon Apr 25 19:40:32 UTC 2016 selfserv_9709 with PID 7737 started at Mon Apr 25 19:40:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10947: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7737 at Mon Apr 25 19:40:34 UTC 2016 kill -USR1 7737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7737 killed at Mon Apr 25 19:40:34 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7793 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7793 found at Mon Apr 25 19:40:35 UTC 2016 selfserv_9709 with PID 7793 started at Mon Apr 25 19:40:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10948: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7793 at Mon Apr 25 19:40:36 UTC 2016 kill -USR1 7793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7793 killed at Mon Apr 25 19:40:37 UTC 2016 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7849 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7849 found at Mon Apr 25 19:40:37 UTC 2016 selfserv_9709 with PID 7849 started at Mon Apr 25 19:40:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10949: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7849 at Mon Apr 25 19:40:38 UTC 2016 kill -USR1 7849 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7849 killed at Mon Apr 25 19:40:39 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:40:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7918 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7918 found at Mon Apr 25 19:40:39 UTC 2016 selfserv_9709 with PID 7918 started at Mon Apr 25 19:40:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10950: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7918 at Mon Apr 25 19:40:41 UTC 2016 kill -USR1 7918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7918 killed at Mon Apr 25 19:40:41 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:40:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7974 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7974 found at Mon Apr 25 19:40:42 UTC 2016 selfserv_9709 with PID 7974 started at Mon Apr 25 19:40:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10951: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 7974 at Mon Apr 25 19:40:43 UTC 2016 kill -USR1 7974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7974 killed at Mon Apr 25 19:40:44 UTC 2016 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:40:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8030 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8030 found at Mon Apr 25 19:40:44 UTC 2016 selfserv_9709 with PID 8030 started at Mon Apr 25 19:40:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10952: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 8030 at Mon Apr 25 19:40:46 UTC 2016 kill -USR1 8030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8030 killed at Mon Apr 25 19:40:46 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8101 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8101 found at Mon Apr 25 19:40:47 UTC 2016 selfserv_9709 with PID 8101 started at Mon Apr 25 19:40:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #10953: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 8101 at Mon Apr 25 19:40:48 UTC 2016 kill -USR1 8101 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8101 killed at Mon Apr 25 19:40:49 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8157 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8157 found at Mon Apr 25 19:40:49 UTC 2016 selfserv_9709 with PID 8157 started at Mon Apr 25 19:40:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10954: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8157 at Mon Apr 25 19:40:51 UTC 2016 kill -USR1 8157 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8157 killed at Mon Apr 25 19:40:51 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8213 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8213 found at Mon Apr 25 19:40:52 UTC 2016 selfserv_9709 with PID 8213 started at Mon Apr 25 19:40:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #10955: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 8213 at Mon Apr 25 19:40:53 UTC 2016 kill -USR1 8213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8213 killed at Mon Apr 25 19:40:54 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8281 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8281 found at Mon Apr 25 19:40:54 UTC 2016 selfserv_9709 with PID 8281 started at Mon Apr 25 19:40:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10956: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8281 at Mon Apr 25 19:40:56 UTC 2016 kill -USR1 8281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8281 killed at Mon Apr 25 19:40:56 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8337 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8337 found at Mon Apr 25 19:40:57 UTC 2016 selfserv_9709 with PID 8337 started at Mon Apr 25 19:40:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10957: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8337 at Mon Apr 25 19:40:58 UTC 2016 kill -USR1 8337 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8337 killed at Mon Apr 25 19:40:58 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:40:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:40:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8393 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8393 found at Mon Apr 25 19:40:59 UTC 2016 selfserv_9709 with PID 8393 started at Mon Apr 25 19:40:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10958: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8393 at Mon Apr 25 19:41:00 UTC 2016 kill -USR1 8393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8393 killed at Mon Apr 25 19:41:01 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:41:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8465 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8465 found at Mon Apr 25 19:41:01 UTC 2016 selfserv_9709 with PID 8465 started at Mon Apr 25 19:41:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10959: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8465 at Mon Apr 25 19:41:02 UTC 2016 kill -USR1 8465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8465 killed at Mon Apr 25 19:41:03 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:41:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8531 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8531 found at Mon Apr 25 19:41:03 UTC 2016 selfserv_9709 with PID 8531 started at Mon Apr 25 19:41:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10960: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8531 at Mon Apr 25 19:41:05 UTC 2016 kill -USR1 8531 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8531 killed at Mon Apr 25 19:41:05 UTC 2016 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:41:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8587 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8587 found at Mon Apr 25 19:41:06 UTC 2016 selfserv_9709 with PID 8587 started at Mon Apr 25 19:41:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10961: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8587 at Mon Apr 25 19:41:07 UTC 2016 kill -USR1 8587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8587 killed at Mon Apr 25 19:41:07 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8655 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8655 found at Mon Apr 25 19:41:08 UTC 2016 selfserv_9709 with PID 8655 started at Mon Apr 25 19:41:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #10962: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 8655 at Mon Apr 25 19:41:09 UTC 2016 kill -USR1 8655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8655 killed at Mon Apr 25 19:41:10 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8711 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8711 found at Mon Apr 25 19:41:10 UTC 2016 selfserv_9709 with PID 8711 started at Mon Apr 25 19:41:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10963: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 8711 at Mon Apr 25 19:41:12 UTC 2016 kill -USR1 8711 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8711 killed at Mon Apr 25 19:41:12 UTC 2016 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8767 found at Mon Apr 25 19:41:13 UTC 2016 selfserv_9709 with PID 8767 started at Mon Apr 25 19:41:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #10964: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 8767 at Mon Apr 25 19:41:14 UTC 2016 kill -USR1 8767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8767 killed at Mon Apr 25 19:41:14 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8835 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8835 found at Mon Apr 25 19:41:15 UTC 2016 selfserv_9709 with PID 8835 started at Mon Apr 25 19:41:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10965: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 8835 at Mon Apr 25 19:41:16 UTC 2016 kill -USR1 8835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8835 killed at Mon Apr 25 19:41:17 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8891 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8891 found at Mon Apr 25 19:41:17 UTC 2016 selfserv_9709 with PID 8891 started at Mon Apr 25 19:41:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10966: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 8891 at Mon Apr 25 19:41:18 UTC 2016 kill -USR1 8891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8891 killed at Mon Apr 25 19:41:19 UTC 2016 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8947 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8947 found at Mon Apr 25 19:41:19 UTC 2016 selfserv_9709 with PID 8947 started at Mon Apr 25 19:41:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10967: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 8947 at Mon Apr 25 19:41:21 UTC 2016 kill -USR1 8947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8947 killed at Mon Apr 25 19:41:21 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:41:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9016 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9016 found at Mon Apr 25 19:41:22 UTC 2016 selfserv_9709 with PID 9016 started at Mon Apr 25 19:41:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10968: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 9016 at Mon Apr 25 19:41:23 UTC 2016 kill -USR1 9016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9016 killed at Mon Apr 25 19:41:23 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:41:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9072 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9072 found at Mon Apr 25 19:41:24 UTC 2016 selfserv_9709 with PID 9072 started at Mon Apr 25 19:41:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10969: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 9072 at Mon Apr 25 19:41:25 UTC 2016 kill -USR1 9072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9072 killed at Mon Apr 25 19:41:26 UTC 2016 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:41:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9128 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9128 found at Mon Apr 25 19:41:26 UTC 2016 selfserv_9709 with PID 9128 started at Mon Apr 25 19:41:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #10970: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 9128 at Mon Apr 25 19:41:27 UTC 2016 kill -USR1 9128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9128 killed at Mon Apr 25 19:41:28 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9196 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9196 found at Mon Apr 25 19:41:28 UTC 2016 selfserv_9709 with PID 9196 started at Mon Apr 25 19:41:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #10971: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 9196 at Mon Apr 25 19:41:30 UTC 2016 kill -USR1 9196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9196 killed at Mon Apr 25 19:41:30 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9252 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9252 found at Mon Apr 25 19:41:31 UTC 2016 selfserv_9709 with PID 9252 started at Mon Apr 25 19:41:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10972: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9252 at Mon Apr 25 19:41:32 UTC 2016 kill -USR1 9252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9252 killed at Mon Apr 25 19:41:32 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9308 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9308 found at Mon Apr 25 19:41:33 UTC 2016 selfserv_9709 with PID 9308 started at Mon Apr 25 19:41:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #10973: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 9308 at Mon Apr 25 19:41:35 UTC 2016 kill -USR1 9308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9308 killed at Mon Apr 25 19:41:35 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9376 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9376 found at Mon Apr 25 19:41:35 UTC 2016 selfserv_9709 with PID 9376 started at Mon Apr 25 19:41:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10974: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9376 at Mon Apr 25 19:41:37 UTC 2016 kill -USR1 9376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9376 killed at Mon Apr 25 19:41:38 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9432 found at Mon Apr 25 19:41:38 UTC 2016 selfserv_9709 with PID 9432 started at Mon Apr 25 19:41:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10975: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9432 at Mon Apr 25 19:41:40 UTC 2016 kill -USR1 9432 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9432 killed at Mon Apr 25 19:41:40 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9489 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9489 found at Mon Apr 25 19:41:41 UTC 2016 selfserv_9709 with PID 9489 started at Mon Apr 25 19:41:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10976: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9489 at Mon Apr 25 19:41:43 UTC 2016 kill -USR1 9489 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9489 killed at Mon Apr 25 19:41:43 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:41:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9557 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9557 found at Mon Apr 25 19:41:44 UTC 2016 selfserv_9709 with PID 9557 started at Mon Apr 25 19:41:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10977: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9557 at Mon Apr 25 19:41:46 UTC 2016 kill -USR1 9557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9557 killed at Mon Apr 25 19:41:46 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:41:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9616 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9616 found at Mon Apr 25 19:41:47 UTC 2016 selfserv_9709 with PID 9616 started at Mon Apr 25 19:41:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10978: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9616 at Mon Apr 25 19:41:48 UTC 2016 kill -USR1 9616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9616 killed at Mon Apr 25 19:41:49 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:41:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9672 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9672 found at Mon Apr 25 19:41:49 UTC 2016 selfserv_9709 with PID 9672 started at Mon Apr 25 19:41:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10979: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9672 at Mon Apr 25 19:41:51 UTC 2016 kill -USR1 9672 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9672 killed at Mon Apr 25 19:41:51 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9740 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9740 found at Mon Apr 25 19:41:52 UTC 2016 selfserv_9709 with PID 9740 started at Mon Apr 25 19:41:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #10980: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9740 at Mon Apr 25 19:41:54 UTC 2016 kill -USR1 9740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9740 killed at Mon Apr 25 19:41:54 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9796 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9796 found at Mon Apr 25 19:41:55 UTC 2016 selfserv_9709 with PID 9796 started at Mon Apr 25 19:41:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10981: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 9796 at Mon Apr 25 19:41:57 UTC 2016 kill -USR1 9796 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9796 killed at Mon Apr 25 19:41:57 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:41:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:41:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9852 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9852 found at Mon Apr 25 19:41:58 UTC 2016 selfserv_9709 with PID 9852 started at Mon Apr 25 19:41:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #10982: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9852 at Mon Apr 25 19:42:00 UTC 2016 kill -USR1 9852 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9852 killed at Mon Apr 25 19:42:00 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9920 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9920 found at Mon Apr 25 19:42:01 UTC 2016 selfserv_9709 with PID 9920 started at Mon Apr 25 19:42:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #10983: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9920 at Mon Apr 25 19:42:02 UTC 2016 kill -USR1 9920 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9920 killed at Mon Apr 25 19:42:03 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9995 found at Mon Apr 25 19:42:03 UTC 2016 selfserv_9709 with PID 9995 started at Mon Apr 25 19:42:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #10984: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 9995 at Mon Apr 25 19:42:05 UTC 2016 kill -USR1 9995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9995 killed at Mon Apr 25 19:42:06 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10051 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10051 found at Mon Apr 25 19:42:06 UTC 2016 selfserv_9709 with PID 10051 started at Mon Apr 25 19:42:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #10985: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10051 at Mon Apr 25 19:42:08 UTC 2016 kill -USR1 10051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10051 killed at Mon Apr 25 19:42:08 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:42:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10119 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10119 found at Mon Apr 25 19:42:09 UTC 2016 selfserv_9709 with PID 10119 started at Mon Apr 25 19:42:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #10986: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10119 at Mon Apr 25 19:42:11 UTC 2016 kill -USR1 10119 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10119 killed at Mon Apr 25 19:42:11 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:42:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10175 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10175 found at Mon Apr 25 19:42:12 UTC 2016 selfserv_9709 with PID 10175 started at Mon Apr 25 19:42:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #10987: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10175 at Mon Apr 25 19:42:13 UTC 2016 kill -USR1 10175 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10175 killed at Mon Apr 25 19:42:14 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:42:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10231 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10231 found at Mon Apr 25 19:42:14 UTC 2016 selfserv_9709 with PID 10231 started at Mon Apr 25 19:42:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #10988: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10231 at Mon Apr 25 19:42:16 UTC 2016 kill -USR1 10231 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10231 killed at Mon Apr 25 19:42:16 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10299 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10299 found at Mon Apr 25 19:42:17 UTC 2016 selfserv_9709 with PID 10299 started at Mon Apr 25 19:42:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #10989: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10299 at Mon Apr 25 19:42:19 UTC 2016 kill -USR1 10299 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10299 killed at Mon Apr 25 19:42:19 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10355 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10355 found at Mon Apr 25 19:42:20 UTC 2016 selfserv_9709 with PID 10355 started at Mon Apr 25 19:42:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10990: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10355 at Mon Apr 25 19:42:22 UTC 2016 kill -USR1 10355 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10355 killed at Mon Apr 25 19:42:22 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10412 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10412 found at Mon Apr 25 19:42:23 UTC 2016 selfserv_9709 with PID 10412 started at Mon Apr 25 19:42:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #10991: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10412 at Mon Apr 25 19:42:25 UTC 2016 kill -USR1 10412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10412 killed at Mon Apr 25 19:42:25 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10480 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10480 found at Mon Apr 25 19:42:25 UTC 2016 selfserv_9709 with PID 10480 started at Mon Apr 25 19:42:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10992: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10480 at Mon Apr 25 19:42:27 UTC 2016 kill -USR1 10480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10480 killed at Mon Apr 25 19:42:28 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10536 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10536 found at Mon Apr 25 19:42:28 UTC 2016 selfserv_9709 with PID 10536 started at Mon Apr 25 19:42:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10993: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10536 at Mon Apr 25 19:42:30 UTC 2016 kill -USR1 10536 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10536 killed at Mon Apr 25 19:42:31 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10592 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10592 found at Mon Apr 25 19:42:31 UTC 2016 selfserv_9709 with PID 10592 started at Mon Apr 25 19:42:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10994: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10592 at Mon Apr 25 19:42:33 UTC 2016 kill -USR1 10592 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10592 killed at Mon Apr 25 19:42:33 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:42:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10660 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10660 found at Mon Apr 25 19:42:34 UTC 2016 selfserv_9709 with PID 10660 started at Mon Apr 25 19:42:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10995: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10660 at Mon Apr 25 19:42:36 UTC 2016 kill -USR1 10660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10660 killed at Mon Apr 25 19:42:36 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:42:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10716 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10716 found at Mon Apr 25 19:42:37 UTC 2016 selfserv_9709 with PID 10716 started at Mon Apr 25 19:42:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10996: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10716 at Mon Apr 25 19:42:38 UTC 2016 kill -USR1 10716 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10716 killed at Mon Apr 25 19:42:39 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:42:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10772 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10772 found at Mon Apr 25 19:42:39 UTC 2016 selfserv_9709 with PID 10772 started at Mon Apr 25 19:42:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10997: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10772 at Mon Apr 25 19:42:41 UTC 2016 kill -USR1 10772 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10772 killed at Mon Apr 25 19:42:42 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10840 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10840 found at Mon Apr 25 19:42:42 UTC 2016 selfserv_9709 with PID 10840 started at Mon Apr 25 19:42:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #10998: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10840 at Mon Apr 25 19:42:44 UTC 2016 kill -USR1 10840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10840 killed at Mon Apr 25 19:42:44 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10900 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10900 found at Mon Apr 25 19:42:45 UTC 2016 selfserv_9709 with PID 10900 started at Mon Apr 25 19:42:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #10999: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 10900 at Mon Apr 25 19:42:47 UTC 2016 kill -USR1 10900 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10900 killed at Mon Apr 25 19:42:47 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10956 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10956 found at Mon Apr 25 19:42:48 UTC 2016 selfserv_9709 with PID 10956 started at Mon Apr 25 19:42:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11000: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 10956 at Mon Apr 25 19:42:50 UTC 2016 kill -USR1 10956 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10956 killed at Mon Apr 25 19:42:50 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11024 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11024 found at Mon Apr 25 19:42:51 UTC 2016 selfserv_9709 with PID 11024 started at Mon Apr 25 19:42:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11001: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11024 at Mon Apr 25 19:42:53 UTC 2016 kill -USR1 11024 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11024 killed at Mon Apr 25 19:42:53 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11080 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11080 found at Mon Apr 25 19:42:53 UTC 2016 selfserv_9709 with PID 11080 started at Mon Apr 25 19:42:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11002: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11080 at Mon Apr 25 19:42:55 UTC 2016 kill -USR1 11080 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11080 killed at Mon Apr 25 19:42:56 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:42:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11136 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11136 found at Mon Apr 25 19:42:56 UTC 2016 selfserv_9709 with PID 11136 started at Mon Apr 25 19:42:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11003: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11136 at Mon Apr 25 19:42:58 UTC 2016 kill -USR1 11136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11136 killed at Mon Apr 25 19:42:58 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:42:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:42:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11204 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11204 found at Mon Apr 25 19:42:59 UTC 2016 selfserv_9709 with PID 11204 started at Mon Apr 25 19:42:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11004: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11204 at Mon Apr 25 19:43:01 UTC 2016 kill -USR1 11204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11204 killed at Mon Apr 25 19:43:01 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:43:01 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11262 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11262 found at Mon Apr 25 19:43:02 UTC 2016 selfserv_9709 with PID 11262 started at Mon Apr 25 19:43:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11005: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11262 at Mon Apr 25 19:43:03 UTC 2016 kill -USR1 11262 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11262 killed at Mon Apr 25 19:43:04 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:43:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11330 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11330 found at Mon Apr 25 19:43:04 UTC 2016 selfserv_9709 with PID 11330 started at Mon Apr 25 19:43:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11006: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11330 at Mon Apr 25 19:43:06 UTC 2016 kill -USR1 11330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11330 killed at Mon Apr 25 19:43:07 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11398 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11398 found at Mon Apr 25 19:43:07 UTC 2016 selfserv_9709 with PID 11398 started at Mon Apr 25 19:43:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11007: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11398 at Mon Apr 25 19:43:09 UTC 2016 kill -USR1 11398 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11398 killed at Mon Apr 25 19:43:09 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11454 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11454 found at Mon Apr 25 19:43:10 UTC 2016 selfserv_9709 with PID 11454 started at Mon Apr 25 19:43:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11008: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11454 at Mon Apr 25 19:43:12 UTC 2016 kill -USR1 11454 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11454 killed at Mon Apr 25 19:43:12 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11510 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11510 found at Mon Apr 25 19:43:13 UTC 2016 selfserv_9709 with PID 11510 started at Mon Apr 25 19:43:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11009: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11510 at Mon Apr 25 19:43:15 UTC 2016 kill -USR1 11510 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11510 killed at Mon Apr 25 19:43:15 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11578 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11578 found at Mon Apr 25 19:43:16 UTC 2016 selfserv_9709 with PID 11578 started at Mon Apr 25 19:43:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11010: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11578 at Mon Apr 25 19:43:17 UTC 2016 kill -USR1 11578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11578 killed at Mon Apr 25 19:43:18 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11634 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11634 found at Mon Apr 25 19:43:18 UTC 2016 selfserv_9709 with PID 11634 started at Mon Apr 25 19:43:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11011: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11634 at Mon Apr 25 19:43:20 UTC 2016 kill -USR1 11634 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11634 killed at Mon Apr 25 19:43:20 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11690 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11690 found at Mon Apr 25 19:43:21 UTC 2016 selfserv_9709 with PID 11690 started at Mon Apr 25 19:43:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11012: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11690 at Mon Apr 25 19:43:22 UTC 2016 kill -USR1 11690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11690 killed at Mon Apr 25 19:43:23 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:43:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11758 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11758 found at Mon Apr 25 19:43:23 UTC 2016 selfserv_9709 with PID 11758 started at Mon Apr 25 19:43:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11013: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11758 at Mon Apr 25 19:43:25 UTC 2016 kill -USR1 11758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11758 killed at Mon Apr 25 19:43:25 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:43:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11815 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11815 found at Mon Apr 25 19:43:26 UTC 2016 selfserv_9709 with PID 11815 started at Mon Apr 25 19:43:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11014: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11815 at Mon Apr 25 19:43:27 UTC 2016 kill -USR1 11815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11815 killed at Mon Apr 25 19:43:28 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:43:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11871 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11871 found at Mon Apr 25 19:43:28 UTC 2016 selfserv_9709 with PID 11871 started at Mon Apr 25 19:43:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11015: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11871 at Mon Apr 25 19:43:30 UTC 2016 kill -USR1 11871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11871 killed at Mon Apr 25 19:43:30 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11939 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11939 found at Mon Apr 25 19:43:31 UTC 2016 selfserv_9709 with PID 11939 started at Mon Apr 25 19:43:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11016: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 11939 at Mon Apr 25 19:43:32 UTC 2016 kill -USR1 11939 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11939 killed at Mon Apr 25 19:43:33 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11995 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11995 found at Mon Apr 25 19:43:33 UTC 2016 selfserv_9709 with PID 11995 started at Mon Apr 25 19:43:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11017: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 11995 at Mon Apr 25 19:43:35 UTC 2016 kill -USR1 11995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11995 killed at Mon Apr 25 19:43:35 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:35 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:35 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12051 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12051 found at Mon Apr 25 19:43:36 UTC 2016 selfserv_9709 with PID 12051 started at Mon Apr 25 19:43:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11018: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12051 at Mon Apr 25 19:43:37 UTC 2016 kill -USR1 12051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12051 killed at Mon Apr 25 19:43:38 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12120 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12120 found at Mon Apr 25 19:43:38 UTC 2016 selfserv_9709 with PID 12120 started at Mon Apr 25 19:43:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11019: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12120 at Mon Apr 25 19:43:40 UTC 2016 kill -USR1 12120 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12120 killed at Mon Apr 25 19:43:40 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12176 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12176 found at Mon Apr 25 19:43:41 UTC 2016 selfserv_9709 with PID 12176 started at Mon Apr 25 19:43:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11020: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12176 at Mon Apr 25 19:43:42 UTC 2016 kill -USR1 12176 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12176 killed at Mon Apr 25 19:43:42 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12232 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12232 found at Mon Apr 25 19:43:43 UTC 2016 selfserv_9709 with PID 12232 started at Mon Apr 25 19:43:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11021: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12232 at Mon Apr 25 19:43:44 UTC 2016 kill -USR1 12232 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12232 killed at Mon Apr 25 19:43:45 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:43:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12304 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12304 found at Mon Apr 25 19:43:45 UTC 2016 selfserv_9709 with PID 12304 started at Mon Apr 25 19:43:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11022: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12304 at Mon Apr 25 19:43:47 UTC 2016 kill -USR1 12304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12304 killed at Mon Apr 25 19:43:47 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:43:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12360 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12360 found at Mon Apr 25 19:43:48 UTC 2016 selfserv_9709 with PID 12360 started at Mon Apr 25 19:43:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11023: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12360 at Mon Apr 25 19:43:49 UTC 2016 kill -USR1 12360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12360 killed at Mon Apr 25 19:43:50 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:43:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12416 found at Mon Apr 25 19:43:50 UTC 2016 selfserv_9709 with PID 12416 started at Mon Apr 25 19:43:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11024: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12416 at Mon Apr 25 19:43:52 UTC 2016 kill -USR1 12416 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12416 killed at Mon Apr 25 19:43:52 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12484 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12484 found at Mon Apr 25 19:43:53 UTC 2016 selfserv_9709 with PID 12484 started at Mon Apr 25 19:43:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11025: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12484 at Mon Apr 25 19:43:55 UTC 2016 kill -USR1 12484 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12484 killed at Mon Apr 25 19:43:55 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12540 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12540 found at Mon Apr 25 19:43:55 UTC 2016 selfserv_9709 with PID 12540 started at Mon Apr 25 19:43:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11026: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12540 at Mon Apr 25 19:43:57 UTC 2016 kill -USR1 12540 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12540 killed at Mon Apr 25 19:43:57 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:43:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:43:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12596 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12596 found at Mon Apr 25 19:43:58 UTC 2016 selfserv_9709 with PID 12596 started at Mon Apr 25 19:43:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11027: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 12596 at Mon Apr 25 19:44:00 UTC 2016 kill -USR1 12596 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12596 killed at Mon Apr 25 19:44:00 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12673 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12673 found at Mon Apr 25 19:44:01 UTC 2016 selfserv_9709 with PID 12673 started at Mon Apr 25 19:44:01 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11028: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12673 at Mon Apr 25 19:44:02 UTC 2016 kill -USR1 12673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12673 killed at Mon Apr 25 19:44:03 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12745 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12745 found at Mon Apr 25 19:44:03 UTC 2016 selfserv_9709 with PID 12745 started at Mon Apr 25 19:44:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11029: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12745 at Mon Apr 25 19:44:05 UTC 2016 kill -USR1 12745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12745 killed at Mon Apr 25 19:44:05 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12802 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12802 found at Mon Apr 25 19:44:06 UTC 2016 selfserv_9709 with PID 12802 started at Mon Apr 25 19:44:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11030: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12802 at Mon Apr 25 19:44:07 UTC 2016 kill -USR1 12802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12802 killed at Mon Apr 25 19:44:08 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12870 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12870 found at Mon Apr 25 19:44:08 UTC 2016 selfserv_9709 with PID 12870 started at Mon Apr 25 19:44:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #11031: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 12870 at Mon Apr 25 19:44:10 UTC 2016 kill -USR1 12870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12870 killed at Mon Apr 25 19:44:10 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:10 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:10 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12926 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12926 found at Mon Apr 25 19:44:11 UTC 2016 selfserv_9709 with PID 12926 started at Mon Apr 25 19:44:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11032: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 12926 at Mon Apr 25 19:44:13 UTC 2016 kill -USR1 12926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12926 killed at Mon Apr 25 19:44:13 UTC 2016 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12982 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12982 found at Mon Apr 25 19:44:14 UTC 2016 selfserv_9709 with PID 12982 started at Mon Apr 25 19:44:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #11033: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 12982 at Mon Apr 25 19:44:15 UTC 2016 kill -USR1 12982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12982 killed at Mon Apr 25 19:44:16 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13050 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13050 found at Mon Apr 25 19:44:16 UTC 2016 selfserv_9709 with PID 13050 started at Mon Apr 25 19:44:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #11034: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13050 at Mon Apr 25 19:44:18 UTC 2016 kill -USR1 13050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13050 killed at Mon Apr 25 19:44:18 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13106 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13106 found at Mon Apr 25 19:44:19 UTC 2016 selfserv_9709 with PID 13106 started at Mon Apr 25 19:44:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #11035: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13106 at Mon Apr 25 19:44:20 UTC 2016 kill -USR1 13106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13106 killed at Mon Apr 25 19:44:21 UTC 2016 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13162 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13162 found at Mon Apr 25 19:44:21 UTC 2016 selfserv_9709 with PID 13162 started at Mon Apr 25 19:44:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #11036: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13162 at Mon Apr 25 19:44:23 UTC 2016 kill -USR1 13162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13162 killed at Mon Apr 25 19:44:23 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13230 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13230 found at Mon Apr 25 19:44:23 UTC 2016 selfserv_9709 with PID 13230 started at Mon Apr 25 19:44:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #11037: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13230 at Mon Apr 25 19:44:25 UTC 2016 kill -USR1 13230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13230 killed at Mon Apr 25 19:44:26 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13287 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13287 found at Mon Apr 25 19:44:26 UTC 2016 selfserv_9709 with PID 13287 started at Mon Apr 25 19:44:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11038: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13287 at Mon Apr 25 19:44:28 UTC 2016 kill -USR1 13287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13287 killed at Mon Apr 25 19:44:28 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13343 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13343 found at Mon Apr 25 19:44:29 UTC 2016 selfserv_9709 with PID 13343 started at Mon Apr 25 19:44:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #11039: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13343 at Mon Apr 25 19:44:31 UTC 2016 kill -USR1 13343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13343 killed at Mon Apr 25 19:44:31 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13411 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13411 found at Mon Apr 25 19:44:32 UTC 2016 selfserv_9709 with PID 13411 started at Mon Apr 25 19:44:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11040: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13411 at Mon Apr 25 19:44:33 UTC 2016 kill -USR1 13411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13411 killed at Mon Apr 25 19:44:33 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13467 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13467 found at Mon Apr 25 19:44:34 UTC 2016 selfserv_9709 with PID 13467 started at Mon Apr 25 19:44:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11041: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13467 at Mon Apr 25 19:44:35 UTC 2016 kill -USR1 13467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13467 killed at Mon Apr 25 19:44:36 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13523 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13523 found at Mon Apr 25 19:44:36 UTC 2016 selfserv_9709 with PID 13523 started at Mon Apr 25 19:44:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11042: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13523 at Mon Apr 25 19:44:37 UTC 2016 kill -USR1 13523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13523 killed at Mon Apr 25 19:44:38 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:38 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13591 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13591 found at Mon Apr 25 19:44:38 UTC 2016 selfserv_9709 with PID 13591 started at Mon Apr 25 19:44:38 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #11043: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13591 at Mon Apr 25 19:44:40 UTC 2016 kill -USR1 13591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13591 killed at Mon Apr 25 19:44:40 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13647 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13647 found at Mon Apr 25 19:44:41 UTC 2016 selfserv_9709 with PID 13647 started at Mon Apr 25 19:44:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11044: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 13647 at Mon Apr 25 19:44:42 UTC 2016 kill -USR1 13647 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13647 killed at Mon Apr 25 19:44:43 UTC 2016 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13703 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13703 found at Mon Apr 25 19:44:43 UTC 2016 selfserv_9709 with PID 13703 started at Mon Apr 25 19:44:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #11045: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13703 at Mon Apr 25 19:44:45 UTC 2016 kill -USR1 13703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13703 killed at Mon Apr 25 19:44:45 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13775 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13775 found at Mon Apr 25 19:44:46 UTC 2016 selfserv_9709 with PID 13775 started at Mon Apr 25 19:44:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #11046: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13775 at Mon Apr 25 19:44:47 UTC 2016 kill -USR1 13775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13775 killed at Mon Apr 25 19:44:47 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13831 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13831 found at Mon Apr 25 19:44:48 UTC 2016 selfserv_9709 with PID 13831 started at Mon Apr 25 19:44:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #11047: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13831 at Mon Apr 25 19:44:49 UTC 2016 kill -USR1 13831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13831 killed at Mon Apr 25 19:44:50 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13887 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13887 found at Mon Apr 25 19:44:50 UTC 2016 selfserv_9709 with PID 13887 started at Mon Apr 25 19:44:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #11048: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13887 at Mon Apr 25 19:44:51 UTC 2016 kill -USR1 13887 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13887 killed at Mon Apr 25 19:44:52 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13955 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13955 found at Mon Apr 25 19:44:52 UTC 2016 selfserv_9709 with PID 13955 started at Mon Apr 25 19:44:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #11049: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 13955 at Mon Apr 25 19:44:54 UTC 2016 kill -USR1 13955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13955 killed at Mon Apr 25 19:44:54 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14011 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14011 found at Mon Apr 25 19:44:55 UTC 2016 selfserv_9709 with PID 14011 started at Mon Apr 25 19:44:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11050: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14011 at Mon Apr 25 19:44:56 UTC 2016 kill -USR1 14011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14011 killed at Mon Apr 25 19:44:57 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:44:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:44:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14067 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14067 found at Mon Apr 25 19:44:57 UTC 2016 selfserv_9709 with PID 14067 started at Mon Apr 25 19:44:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #11051: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 14067 at Mon Apr 25 19:44:59 UTC 2016 kill -USR1 14067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14067 killed at Mon Apr 25 19:44:59 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:44:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14135 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14135 found at Mon Apr 25 19:45:00 UTC 2016 selfserv_9709 with PID 14135 started at Mon Apr 25 19:45:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11052: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14135 at Mon Apr 25 19:45:02 UTC 2016 kill -USR1 14135 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14135 killed at Mon Apr 25 19:45:02 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14204 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14204 found at Mon Apr 25 19:45:03 UTC 2016 selfserv_9709 with PID 14204 started at Mon Apr 25 19:45:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11053: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14204 at Mon Apr 25 19:45:05 UTC 2016 kill -USR1 14204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14204 killed at Mon Apr 25 19:45:05 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14260 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14260 found at Mon Apr 25 19:45:05 UTC 2016 selfserv_9709 with PID 14260 started at Mon Apr 25 19:45:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11054: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14260 at Mon Apr 25 19:45:07 UTC 2016 kill -USR1 14260 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14260 killed at Mon Apr 25 19:45:08 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14329 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14329 found at Mon Apr 25 19:45:08 UTC 2016 selfserv_9709 with PID 14329 started at Mon Apr 25 19:45:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11055: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14329 at Mon Apr 25 19:45:10 UTC 2016 kill -USR1 14329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14329 killed at Mon Apr 25 19:45:11 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14385 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14385 found at Mon Apr 25 19:45:11 UTC 2016 selfserv_9709 with PID 14385 started at Mon Apr 25 19:45:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11056: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14385 at Mon Apr 25 19:45:13 UTC 2016 kill -USR1 14385 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14385 killed at Mon Apr 25 19:45:14 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:14 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14441 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14441 found at Mon Apr 25 19:45:14 UTC 2016 selfserv_9709 with PID 14441 started at Mon Apr 25 19:45:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11057: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14441 at Mon Apr 25 19:45:16 UTC 2016 kill -USR1 14441 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14441 killed at Mon Apr 25 19:45:17 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:17 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14509 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14509 found at Mon Apr 25 19:45:17 UTC 2016 selfserv_9709 with PID 14509 started at Mon Apr 25 19:45:17 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11058: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14509 at Mon Apr 25 19:45:19 UTC 2016 kill -USR1 14509 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14509 killed at Mon Apr 25 19:45:19 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14565 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14565 found at Mon Apr 25 19:45:20 UTC 2016 selfserv_9709 with PID 14565 started at Mon Apr 25 19:45:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11059: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14565 at Mon Apr 25 19:45:22 UTC 2016 kill -USR1 14565 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14565 killed at Mon Apr 25 19:45:22 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14621 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14621 found at Mon Apr 25 19:45:23 UTC 2016 selfserv_9709 with PID 14621 started at Mon Apr 25 19:45:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11060: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14621 at Mon Apr 25 19:45:24 UTC 2016 kill -USR1 14621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14621 killed at Mon Apr 25 19:45:25 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14689 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14689 found at Mon Apr 25 19:45:25 UTC 2016 selfserv_9709 with PID 14689 started at Mon Apr 25 19:45:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11061: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14689 at Mon Apr 25 19:45:27 UTC 2016 kill -USR1 14689 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14689 killed at Mon Apr 25 19:45:28 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14746 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14746 found at Mon Apr 25 19:45:28 UTC 2016 selfserv_9709 with PID 14746 started at Mon Apr 25 19:45:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11062: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14746 at Mon Apr 25 19:45:30 UTC 2016 kill -USR1 14746 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14746 killed at Mon Apr 25 19:45:31 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14802 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14802 found at Mon Apr 25 19:45:31 UTC 2016 selfserv_9709 with PID 14802 started at Mon Apr 25 19:45:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11063: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 14802 at Mon Apr 25 19:45:33 UTC 2016 kill -USR1 14802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14802 killed at Mon Apr 25 19:45:34 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14870 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14870 found at Mon Apr 25 19:45:34 UTC 2016 selfserv_9709 with PID 14870 started at Mon Apr 25 19:45:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14870 at Mon Apr 25 19:45:36 UTC 2016 kill -USR1 14870 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14870 killed at Mon Apr 25 19:45:36 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14926 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14926 found at Mon Apr 25 19:45:37 UTC 2016 selfserv_9709 with PID 14926 started at Mon Apr 25 19:45:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11065: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14926 at Mon Apr 25 19:45:39 UTC 2016 kill -USR1 14926 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14926 killed at Mon Apr 25 19:45:39 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14982 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14982 found at Mon Apr 25 19:45:40 UTC 2016 selfserv_9709 with PID 14982 started at Mon Apr 25 19:45:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11066: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 14982 at Mon Apr 25 19:45:41 UTC 2016 kill -USR1 14982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14982 killed at Mon Apr 25 19:45:42 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15050 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15050 found at Mon Apr 25 19:45:42 UTC 2016 selfserv_9709 with PID 15050 started at Mon Apr 25 19:45:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11067: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15050 at Mon Apr 25 19:45:44 UTC 2016 kill -USR1 15050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15050 killed at Mon Apr 25 19:45:45 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15106 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15106 found at Mon Apr 25 19:45:45 UTC 2016 selfserv_9709 with PID 15106 started at Mon Apr 25 19:45:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11068: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15106 at Mon Apr 25 19:45:48 UTC 2016 kill -USR1 15106 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15106 killed at Mon Apr 25 19:45:48 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15166 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15166 found at Mon Apr 25 19:45:48 UTC 2016 selfserv_9709 with PID 15166 started at Mon Apr 25 19:45:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11069: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15166 at Mon Apr 25 19:45:50 UTC 2016 kill -USR1 15166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15166 killed at Mon Apr 25 19:45:51 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15234 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15234 found at Mon Apr 25 19:45:51 UTC 2016 selfserv_9709 with PID 15234 started at Mon Apr 25 19:45:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11070: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15234 at Mon Apr 25 19:45:53 UTC 2016 kill -USR1 15234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15234 killed at Mon Apr 25 19:45:54 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15290 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15290 found at Mon Apr 25 19:45:54 UTC 2016 selfserv_9709 with PID 15290 started at Mon Apr 25 19:45:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11071: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15290 at Mon Apr 25 19:45:56 UTC 2016 kill -USR1 15290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15290 killed at Mon Apr 25 19:45:56 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:45:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15346 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15346 found at Mon Apr 25 19:45:57 UTC 2016 selfserv_9709 with PID 15346 started at Mon Apr 25 19:45:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11072: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15346 at Mon Apr 25 19:45:59 UTC 2016 kill -USR1 15346 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15346 killed at Mon Apr 25 19:45:59 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:45:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:45:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15414 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15414 found at Mon Apr 25 19:46:00 UTC 2016 selfserv_9709 with PID 15414 started at Mon Apr 25 19:46:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11073: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15414 at Mon Apr 25 19:46:02 UTC 2016 kill -USR1 15414 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15414 killed at Mon Apr 25 19:46:02 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:46:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15485 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15485 found at Mon Apr 25 19:46:03 UTC 2016 selfserv_9709 with PID 15485 started at Mon Apr 25 19:46:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11074: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15485 at Mon Apr 25 19:46:05 UTC 2016 kill -USR1 15485 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15485 killed at Mon Apr 25 19:46:05 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:46:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15541 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15541 found at Mon Apr 25 19:46:06 UTC 2016 selfserv_9709 with PID 15541 started at Mon Apr 25 19:46:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11075: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15541 at Mon Apr 25 19:46:08 UTC 2016 kill -USR1 15541 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15541 killed at Mon Apr 25 19:46:08 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:46:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15610 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15610 found at Mon Apr 25 19:46:09 UTC 2016 selfserv_9709 with PID 15610 started at Mon Apr 25 19:46:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11076: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15610 at Mon Apr 25 19:46:10 UTC 2016 kill -USR1 15610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15610 killed at Mon Apr 25 19:46:11 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:46:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15666 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15666 found at Mon Apr 25 19:46:11 UTC 2016 selfserv_9709 with PID 15666 started at Mon Apr 25 19:46:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11077: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15666 at Mon Apr 25 19:46:13 UTC 2016 kill -USR1 15666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15666 killed at Mon Apr 25 19:46:13 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:46:13 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:13 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15722 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15722 found at Mon Apr 25 19:46:14 UTC 2016 selfserv_9709 with PID 15722 started at Mon Apr 25 19:46:14 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11078: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15722 at Mon Apr 25 19:46:15 UTC 2016 kill -USR1 15722 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15722 killed at Mon Apr 25 19:46:15 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:46:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15790 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15790 found at Mon Apr 25 19:46:16 UTC 2016 selfserv_9709 with PID 15790 started at Mon Apr 25 19:46:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11079: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15790 at Mon Apr 25 19:46:18 UTC 2016 kill -USR1 15790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15790 killed at Mon Apr 25 19:46:18 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:46:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15846 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15846 found at Mon Apr 25 19:46:19 UTC 2016 selfserv_9709 with PID 15846 started at Mon Apr 25 19:46:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11080: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 15846 at Mon Apr 25 19:46:20 UTC 2016 kill -USR1 15846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15846 killed at Mon Apr 25 19:46:21 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:46:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15902 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15902 found at Mon Apr 25 19:46:21 UTC 2016 selfserv_9709 with PID 15902 started at Mon Apr 25 19:46:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11081: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15902 at Mon Apr 25 19:46:23 UTC 2016 kill -USR1 15902 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15902 killed at Mon Apr 25 19:46:23 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:46:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 15970 found at Mon Apr 25 19:46:24 UTC 2016 selfserv_9709 with PID 15970 started at Mon Apr 25 19:46:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11082: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 15970 at Mon Apr 25 19:46:25 UTC 2016 kill -USR1 15970 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 15970 killed at Mon Apr 25 19:46:26 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:46:26 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16026 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16026 found at Mon Apr 25 19:46:26 UTC 2016 selfserv_9709 with PID 16026 started at Mon Apr 25 19:46:26 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11083: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 16026 at Mon Apr 25 19:46:28 UTC 2016 kill -USR1 16026 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16026 killed at Mon Apr 25 19:46:28 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9709 starting at Mon Apr 25 19:46:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16083 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16083 found at Mon Apr 25 19:46:29 UTC 2016 selfserv_9709 with PID 16083 started at Mon Apr 25 19:46:29 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #11084: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 16083 at Mon Apr 25 19:46:30 UTC 2016 kill -USR1 16083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16083 killed at Mon Apr 25 19:46:31 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:46:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16151 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16151 found at Mon Apr 25 19:46:31 UTC 2016 selfserv_9709 with PID 16151 started at Mon Apr 25 19:46:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11085: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 16151 at Mon Apr 25 19:46:33 UTC 2016 kill -USR1 16151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16151 killed at Mon Apr 25 19:46:33 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:46:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16207 found at Mon Apr 25 19:46:34 UTC 2016 selfserv_9709 with PID 16207 started at Mon Apr 25 19:46:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #11086: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 16207 at Mon Apr 25 19:46:36 UTC 2016 kill -USR1 16207 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16207 killed at Mon Apr 25 19:46:36 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:46:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16263 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16263 found at Mon Apr 25 19:46:37 UTC 2016 selfserv_9709 with PID 16263 started at Mon Apr 25 19:46:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #11087: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 16263 at Mon Apr 25 19:46:38 UTC 2016 kill -USR1 16263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16263 killed at Mon Apr 25 19:46:39 UTC 2016 ssl.sh: Cache CRL SSL Client Tests - with ECC =============================== /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9709 starting at Mon Apr 25 19:46:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:46:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:39 UTC 2016 selfserv_9709 with PID 16326 started at Mon Apr 25 19:46:39 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:41 UTC 2016 ssl.sh: #11088: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:42 UTC 2016 ssl.sh: #11089: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:43 UTC 2016 ssl.sh: #11090: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:44 UTC 2016 ssl.sh: #11091: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:45 UTC 2016 ssl.sh: #11092: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:46 UTC 2016 ssl.sh: #11093: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:47 UTC 2016 ssl.sh: #11094: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:48 UTC 2016 ssl.sh: #11095: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:50 UTC 2016 ssl.sh: #11096: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:51 UTC 2016 ssl.sh: #11097: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:52 UTC 2016 ssl.sh: #11098: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:53 UTC 2016 ssl.sh: #11099: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:54 UTC 2016 ssl.sh: #11100: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:55 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11101: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:56 UTC 2016 ssl.sh: #11102: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:57 UTC 2016 ssl.sh: #11103: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:58 UTC 2016 ssl.sh: #11104: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:46:59 UTC 2016 ssl.sh: #11105: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:00 UTC 2016 ssl.sh: #11106: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:01 UTC 2016 ssl.sh: #11107: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:03 UTC 2016 ssl.sh: #11108: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:04 UTC 2016 ssl.sh: #11109: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:05 UTC 2016 ssl.sh: #11110: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:06 UTC 2016 ssl.sh: #11111: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:07 UTC 2016 ssl.sh: #11112: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:08 UTC 2016 ssl.sh: #11113: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:09 UTC 2016 ssl.sh: #11114: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:10 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11115: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:11 UTC 2016 ssl.sh: #11116: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:12 UTC 2016 ssl.sh: #11117: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:13 UTC 2016 ssl.sh: #11118: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:14 UTC 2016 ssl.sh: #11119: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:15 UTC 2016 ssl.sh: #11120: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:16 UTC 2016 ssl.sh: #11121: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:17 UTC 2016 ssl.sh: #11122: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:19 UTC 2016 ssl.sh: #11123: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:20 UTC 2016 ssl.sh: #11124: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:21 UTC 2016 ssl.sh: #11125: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:22 UTC 2016 ssl.sh: #11126: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:23 UTC 2016 ssl.sh: #11127: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 16326 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 16326 found at Mon Apr 25 19:47:24 UTC 2016 ssl.sh: #11128: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 16326 at Mon Apr 25 19:47:24 UTC 2016 kill -USR1 16326 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 16326 killed at Mon Apr 25 19:47:24 UTC 2016 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:47:24 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:47:24 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:25 UTC 2016 selfserv_9709 with PID 17767 started at Mon Apr 25 19:47:25 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:26 UTC 2016 ssl.sh: #11129: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:27 UTC 2016 ssl.sh: #11130: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:28 UTC 2016 ssl.sh: #11131: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:29 UTC 2016 ssl.sh: #11132: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:30 UTC 2016 ssl.sh: #11133: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:31 UTC 2016 ssl.sh: #11134: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:32 UTC 2016 ssl.sh: #11135: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:33 UTC 2016 ssl.sh: #11136: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:34 UTC 2016 ssl.sh: #11137: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:35 UTC 2016 ssl.sh: #11138: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:36 UTC 2016 ssl.sh: #11139: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:37 UTC 2016 ssl.sh: #11140: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:38 UTC 2016 ssl.sh: #11141: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:39 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11142: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:40 UTC 2016 ssl.sh: #11143: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:41 UTC 2016 ssl.sh: #11144: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:42 UTC 2016 ssl.sh: #11145: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:43 UTC 2016 ssl.sh: #11146: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:43 UTC 2016 ssl.sh: #11147: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:44 UTC 2016 ssl.sh: #11148: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:45 UTC 2016 ssl.sh: #11149: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:46 UTC 2016 ssl.sh: #11150: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:47 UTC 2016 ssl.sh: #11151: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:48 UTC 2016 ssl.sh: #11152: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:49 UTC 2016 ssl.sh: #11153: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:50 UTC 2016 ssl.sh: #11154: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:51 UTC 2016 ssl.sh: #11155: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:52 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11156: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:53 UTC 2016 ssl.sh: #11157: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:54 UTC 2016 ssl.sh: #11158: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:55 UTC 2016 ssl.sh: #11159: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:56 UTC 2016 ssl.sh: #11160: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:57 UTC 2016 ssl.sh: #11161: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:58 UTC 2016 ssl.sh: #11162: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:47:59 UTC 2016 ssl.sh: #11163: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:48:00 UTC 2016 ssl.sh: #11164: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:48:01 UTC 2016 ssl.sh: #11165: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:48:01 UTC 2016 ssl.sh: #11166: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:48:02 UTC 2016 ssl.sh: #11167: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:48:03 UTC 2016 ssl.sh: #11168: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17767 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 17767 found at Mon Apr 25 19:48:04 UTC 2016 ssl.sh: #11169: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 17767 at Mon Apr 25 19:48:04 UTC 2016 kill -USR1 17767 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 17767 killed at Mon Apr 25 19:48:05 UTC 2016 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:48:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:48:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:05 UTC 2016 selfserv_9709 with PID 19207 started at Mon Apr 25 19:48:05 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:07 UTC 2016 ssl.sh: #11170: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:08 UTC 2016 ssl.sh: #11171: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:09 UTC 2016 ssl.sh: #11172: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:10 UTC 2016 ssl.sh: #11173: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:12 UTC 2016 ssl.sh: #11174: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:13 UTC 2016 ssl.sh: #11175: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:14 UTC 2016 ssl.sh: #11176: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:15 UTC 2016 ssl.sh: #11177: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:16 UTC 2016 ssl.sh: #11178: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:17 UTC 2016 ssl.sh: #11179: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:19 UTC 2016 ssl.sh: #11180: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:20 UTC 2016 ssl.sh: #11181: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:21 UTC 2016 ssl.sh: #11182: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:22 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11183: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:23 UTC 2016 ssl.sh: #11184: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:24 UTC 2016 ssl.sh: #11185: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:25 UTC 2016 ssl.sh: #11186: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:26 UTC 2016 ssl.sh: #11187: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:27 UTC 2016 ssl.sh: #11188: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:29 UTC 2016 ssl.sh: #11189: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:30 UTC 2016 ssl.sh: #11190: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:31 UTC 2016 ssl.sh: #11191: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:32 UTC 2016 ssl.sh: #11192: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:33 UTC 2016 ssl.sh: #11193: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:34 UTC 2016 ssl.sh: #11194: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:35 UTC 2016 ssl.sh: #11195: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:37 UTC 2016 ssl.sh: #11196: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:38 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11197: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:39 UTC 2016 ssl.sh: #11198: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:40 UTC 2016 ssl.sh: #11199: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:41 UTC 2016 ssl.sh: #11200: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:42 UTC 2016 ssl.sh: #11201: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:43 UTC 2016 ssl.sh: #11202: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:44 UTC 2016 ssl.sh: #11203: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:45 UTC 2016 ssl.sh: #11204: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:46 UTC 2016 ssl.sh: #11205: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:48 UTC 2016 ssl.sh: #11206: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:49 UTC 2016 ssl.sh: #11207: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:50 UTC 2016 ssl.sh: #11208: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:51 UTC 2016 ssl.sh: #11209: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 19207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 19207 found at Mon Apr 25 19:48:52 UTC 2016 ssl.sh: #11210: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 19207 at Mon Apr 25 19:48:52 UTC 2016 kill -USR1 19207 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 19207 killed at Mon Apr 25 19:48:52 UTC 2016 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:48:52 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:48:52 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:48:53 UTC 2016 selfserv_9709 with PID 20637 started at Mon Apr 25 19:48:53 UTC 2016 Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:48:54 UTC 2016 ssl.sh: #11211: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:48:55 UTC 2016 ssl.sh: #11212: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:48:56 UTC 2016 ssl.sh: #11213: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:48:57 UTC 2016 ssl.sh: #11214: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:48:59 UTC 2016 ssl.sh: #11215: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:00 UTC 2016 ssl.sh: #11216: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:01 UTC 2016 ssl.sh: #11217: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:02 UTC 2016 ssl.sh: #11218: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:03 UTC 2016 ssl.sh: #11219: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:04 UTC 2016 ssl.sh: #11220: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:05 UTC 2016 ssl.sh: #11221: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:06 UTC 2016 ssl.sh: #11222: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:07 UTC 2016 ssl.sh: #11223: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:08 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11224: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:09 UTC 2016 ssl.sh: #11225: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:10 UTC 2016 ssl.sh: #11226: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:11 UTC 2016 ssl.sh: #11227: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:12 UTC 2016 ssl.sh: #11228: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:13 UTC 2016 ssl.sh: #11229: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:14 UTC 2016 ssl.sh: #11230: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:15 UTC 2016 ssl.sh: #11231: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:16 UTC 2016 ssl.sh: #11232: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:17 UTC 2016 ssl.sh: #11233: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:18 UTC 2016 ssl.sh: #11234: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:19 UTC 2016 ssl.sh: #11235: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:20 UTC 2016 ssl.sh: #11236: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:22 UTC 2016 ssl.sh: #11237: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:23 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11238: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:24 UTC 2016 ssl.sh: #11239: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:25 UTC 2016 ssl.sh: #11240: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:26 UTC 2016 ssl.sh: #11241: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:27 UTC 2016 ssl.sh: #11242: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:28 UTC 2016 ssl.sh: #11243: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:29 UTC 2016 ssl.sh: #11244: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:30 UTC 2016 ssl.sh: #11245: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:31 UTC 2016 ssl.sh: #11246: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:32 UTC 2016 ssl.sh: #11247: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:33 UTC 2016 ssl.sh: #11248: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:33 UTC 2016 ssl.sh: #11249: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:35 UTC 2016 ssl.sh: #11250: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 20637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 20637 found at Mon Apr 25 19:49:36 UTC 2016 ssl.sh: #11251: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9709 with PID 20637 at Mon Apr 25 19:49:36 UTC 2016 kill -USR1 20637 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 20637 killed at Mon Apr 25 19:49:36 UTC 2016 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:49:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:49:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22077 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22077 found at Mon Apr 25 19:49:37 UTC 2016 selfserv_9709 with PID 22077 started at Mon Apr 25 19:49:37 UTC 2016 trying to kill selfserv_9709 with PID 22077 at Mon Apr 25 19:49:37 UTC 2016 kill -USR1 22077 ./ssl.sh: line 186: 22077 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22077 killed at Mon Apr 25 19:49:37 UTC 2016 selfserv_9709 starting at Mon Apr 25 19:49:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:49:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:37 UTC 2016 selfserv_9709 with PID 22111 started at Mon Apr 25 19:49:37 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:39 UTC 2016 ssl.sh: #11252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:41 UTC 2016 ssl.sh: #11253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:42 UTC 2016 ssl.sh: #11254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:43 UTC 2016 ssl.sh: #11255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:45 UTC 2016 ssl.sh: #11256: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:46 UTC 2016 ssl.sh: #11257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:47 UTC 2016 ssl.sh: #11258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:49 UTC 2016 ssl.sh: #11259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:50 UTC 2016 ssl.sh: #11260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:52 UTC 2016 ssl.sh: #11261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:53 UTC 2016 ssl.sh: #11262: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:54 UTC 2016 ssl.sh: #11263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:56 UTC 2016 ssl.sh: #11264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:57 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11265: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:49:58 UTC 2016 ssl.sh: #11266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:00 UTC 2016 ssl.sh: #11267: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:01 UTC 2016 ssl.sh: #11268: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:02 UTC 2016 ssl.sh: #11269: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:04 UTC 2016 ssl.sh: #11270: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:05 UTC 2016 ssl.sh: #11271: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:06 UTC 2016 ssl.sh: #11272: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:08 UTC 2016 ssl.sh: #11273: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:09 UTC 2016 ssl.sh: #11274: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:10 UTC 2016 ssl.sh: #11275: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:12 UTC 2016 ssl.sh: #11276: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:13 UTC 2016 ssl.sh: #11277: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:15 UTC 2016 ssl.sh: #11278: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:16 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11279: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:17 UTC 2016 ssl.sh: #11280: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:19 UTC 2016 ssl.sh: #11281: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:20 UTC 2016 ssl.sh: #11282: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:21 UTC 2016 ssl.sh: #11283: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:22 UTC 2016 ssl.sh: #11284: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:24 UTC 2016 ssl.sh: #11285: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:25 UTC 2016 ssl.sh: #11286: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:27 UTC 2016 ssl.sh: #11287: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:28 UTC 2016 ssl.sh: #11288: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:29 UTC 2016 ssl.sh: #11289: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:31 UTC 2016 ssl.sh: #11290: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:32 UTC 2016 ssl.sh: #11291: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 22111 found at Mon Apr 25 19:50:33 UTC 2016 ssl.sh: #11292: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 22111 at Mon Apr 25 19:50:33 UTC 2016 kill -USR1 22111 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 22111 killed at Mon Apr 25 19:50:34 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:50:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:50:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:34 UTC 2016 selfserv_9709 with PID 23551 started at Mon Apr 25 19:50:34 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:36 UTC 2016 ssl.sh: #11293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:37 UTC 2016 ssl.sh: #11294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:39 UTC 2016 ssl.sh: #11295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:40 UTC 2016 ssl.sh: #11296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:41 UTC 2016 ssl.sh: #11297: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:43 UTC 2016 ssl.sh: #11298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:44 UTC 2016 ssl.sh: #11299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:46 UTC 2016 ssl.sh: #11300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:47 UTC 2016 ssl.sh: #11301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:48 UTC 2016 ssl.sh: #11302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:50 UTC 2016 ssl.sh: #11303: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:51 UTC 2016 ssl.sh: #11304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:52 UTC 2016 ssl.sh: #11305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:54 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11306: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:55 UTC 2016 ssl.sh: #11307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:56 UTC 2016 ssl.sh: #11308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:58 UTC 2016 ssl.sh: #11309: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:50:59 UTC 2016 ssl.sh: #11310: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:00 UTC 2016 ssl.sh: #11311: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:02 UTC 2016 ssl.sh: #11312: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:03 UTC 2016 ssl.sh: #11313: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:04 UTC 2016 ssl.sh: #11314: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:06 UTC 2016 ssl.sh: #11315: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:07 UTC 2016 ssl.sh: #11316: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:08 UTC 2016 ssl.sh: #11317: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:10 UTC 2016 ssl.sh: #11318: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:11 UTC 2016 ssl.sh: #11319: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:13 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11320: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:14 UTC 2016 ssl.sh: #11321: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:15 UTC 2016 ssl.sh: #11322: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:17 UTC 2016 ssl.sh: #11323: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:18 UTC 2016 ssl.sh: #11324: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:19 UTC 2016 ssl.sh: #11325: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:20 UTC 2016 ssl.sh: #11326: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:22 UTC 2016 ssl.sh: #11327: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:23 UTC 2016 ssl.sh: #11328: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:24 UTC 2016 ssl.sh: #11329: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:26 UTC 2016 ssl.sh: #11330: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:27 UTC 2016 ssl.sh: #11331: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:28 UTC 2016 ssl.sh: #11332: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 23551 found at Mon Apr 25 19:51:30 UTC 2016 ssl.sh: #11333: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 23551 at Mon Apr 25 19:51:30 UTC 2016 kill -USR1 23551 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 23551 killed at Mon Apr 25 19:51:30 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:51:30 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:51:30 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:31 UTC 2016 selfserv_9709 with PID 24992 started at Mon Apr 25 19:51:31 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:32 UTC 2016 ssl.sh: #11334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:34 UTC 2016 ssl.sh: #11335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:35 UTC 2016 ssl.sh: #11336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:36 UTC 2016 ssl.sh: #11337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:37 UTC 2016 ssl.sh: #11338: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:38 UTC 2016 ssl.sh: #11339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:39 UTC 2016 ssl.sh: #11340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:40 UTC 2016 ssl.sh: #11341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:42 UTC 2016 ssl.sh: #11342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:43 UTC 2016 ssl.sh: #11343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:44 UTC 2016 ssl.sh: #11344: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:45 UTC 2016 ssl.sh: #11345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:46 UTC 2016 ssl.sh: #11346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:48 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11347: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:49 UTC 2016 ssl.sh: #11348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:50 UTC 2016 ssl.sh: #11349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:51 UTC 2016 ssl.sh: #11350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:52 UTC 2016 ssl.sh: #11351: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:53 UTC 2016 ssl.sh: #11352: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:54 UTC 2016 ssl.sh: #11353: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:55 UTC 2016 ssl.sh: #11354: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:56 UTC 2016 ssl.sh: #11355: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:58 UTC 2016 ssl.sh: #11356: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:51:59 UTC 2016 ssl.sh: #11357: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:00 UTC 2016 ssl.sh: #11358: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:01 UTC 2016 ssl.sh: #11359: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:02 UTC 2016 ssl.sh: #11360: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:04 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11361: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:05 UTC 2016 ssl.sh: #11362: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:06 UTC 2016 ssl.sh: #11363: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:07 UTC 2016 ssl.sh: #11364: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:08 UTC 2016 ssl.sh: #11365: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:09 UTC 2016 ssl.sh: #11366: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:10 UTC 2016 ssl.sh: #11367: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:11 UTC 2016 ssl.sh: #11368: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:12 UTC 2016 ssl.sh: #11369: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:14 UTC 2016 ssl.sh: #11370: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:15 UTC 2016 ssl.sh: #11371: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:16 UTC 2016 ssl.sh: #11372: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:17 UTC 2016 ssl.sh: #11373: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24992 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 24992 found at Mon Apr 25 19:52:18 UTC 2016 ssl.sh: #11374: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 24992 at Mon Apr 25 19:52:18 UTC 2016 kill -USR1 24992 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 24992 killed at Mon Apr 25 19:52:19 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:52:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:52:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:19 UTC 2016 selfserv_9709 with PID 26435 started at Mon Apr 25 19:52:19 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:21 UTC 2016 ssl.sh: #11375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:22 UTC 2016 ssl.sh: #11376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:24 UTC 2016 ssl.sh: #11377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:25 UTC 2016 ssl.sh: #11378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:27 UTC 2016 ssl.sh: #11379: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:28 UTC 2016 ssl.sh: #11380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:30 UTC 2016 ssl.sh: #11381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:31 UTC 2016 ssl.sh: #11382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:32 UTC 2016 ssl.sh: #11383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:34 UTC 2016 ssl.sh: #11384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:35 UTC 2016 ssl.sh: #11385: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:37 UTC 2016 ssl.sh: #11386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:38 UTC 2016 ssl.sh: #11387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:40 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11388: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:41 UTC 2016 ssl.sh: #11389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:43 UTC 2016 ssl.sh: #11390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:44 UTC 2016 ssl.sh: #11391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:45 UTC 2016 ssl.sh: #11392: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:47 UTC 2016 ssl.sh: #11393: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:48 UTC 2016 ssl.sh: #11394: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:49 UTC 2016 ssl.sh: #11395: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:51 UTC 2016 ssl.sh: #11396: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:52 UTC 2016 ssl.sh: #11397: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:53 UTC 2016 ssl.sh: #11398: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:55 UTC 2016 ssl.sh: #11399: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:56 UTC 2016 ssl.sh: #11400: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:58 UTC 2016 ssl.sh: #11401: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:52:59 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11402: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:01 UTC 2016 ssl.sh: #11403: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:02 UTC 2016 ssl.sh: #11404: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:03 UTC 2016 ssl.sh: #11405: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:05 UTC 2016 ssl.sh: #11406: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:06 UTC 2016 ssl.sh: #11407: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:07 UTC 2016 ssl.sh: #11408: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:09 UTC 2016 ssl.sh: #11409: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:10 UTC 2016 ssl.sh: #11410: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:12 UTC 2016 ssl.sh: #11411: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:13 UTC 2016 ssl.sh: #11412: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:14 UTC 2016 ssl.sh: #11413: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:16 UTC 2016 ssl.sh: #11414: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 26435 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 26435 found at Mon Apr 25 19:53:17 UTC 2016 ssl.sh: #11415: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 26435 at Mon Apr 25 19:53:17 UTC 2016 kill -USR1 26435 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 26435 killed at Mon Apr 25 19:53:18 UTC 2016 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:53:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:53:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:18 UTC 2016 selfserv_9709 with PID 27876 started at Mon Apr 25 19:53:18 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:20 UTC 2016 ssl.sh: #11416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:21 UTC 2016 ssl.sh: #11417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:23 UTC 2016 ssl.sh: #11418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:24 UTC 2016 ssl.sh: #11419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:26 UTC 2016 ssl.sh: #11420: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:27 UTC 2016 ssl.sh: #11421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:28 UTC 2016 ssl.sh: #11422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:30 UTC 2016 ssl.sh: #11423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:31 UTC 2016 ssl.sh: #11424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:33 UTC 2016 ssl.sh: #11425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:34 UTC 2016 ssl.sh: #11426: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:36 UTC 2016 ssl.sh: #11427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:37 UTC 2016 ssl.sh: #11428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:39 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11429: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:40 UTC 2016 ssl.sh: #11430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:41 UTC 2016 ssl.sh: #11431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:43 UTC 2016 ssl.sh: #11432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:44 UTC 2016 ssl.sh: #11433: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:45 UTC 2016 ssl.sh: #11434: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:47 UTC 2016 ssl.sh: #11435: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:48 UTC 2016 ssl.sh: #11436: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:50 UTC 2016 ssl.sh: #11437: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:51 UTC 2016 ssl.sh: #11438: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:52 UTC 2016 ssl.sh: #11439: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:54 UTC 2016 ssl.sh: #11440: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:55 UTC 2016 ssl.sh: #11441: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:57 UTC 2016 ssl.sh: #11442: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:58 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11443: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:53:59 UTC 2016 ssl.sh: #11444: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:01 UTC 2016 ssl.sh: #11445: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:02 UTC 2016 ssl.sh: #11446: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:04 UTC 2016 ssl.sh: #11447: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:05 UTC 2016 ssl.sh: #11448: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:06 UTC 2016 ssl.sh: #11449: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:08 UTC 2016 ssl.sh: #11450: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:09 UTC 2016 ssl.sh: #11451: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:10 UTC 2016 ssl.sh: #11452: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:12 UTC 2016 ssl.sh: #11453: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:13 UTC 2016 ssl.sh: #11454: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:15 UTC 2016 ssl.sh: #11455: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 27876 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 27876 found at Mon Apr 25 19:54:16 UTC 2016 ssl.sh: #11456: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 27876 at Mon Apr 25 19:54:16 UTC 2016 kill -USR1 27876 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 27876 killed at Mon Apr 25 19:54:16 UTC 2016 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:54:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:54:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:17 UTC 2016 selfserv_9709 with PID 29323 started at Mon Apr 25 19:54:17 UTC 2016 Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:19 UTC 2016 ssl.sh: #11457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:20 UTC 2016 ssl.sh: #11458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:21 UTC 2016 ssl.sh: #11459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:22 UTC 2016 ssl.sh: #11460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:23 UTC 2016 ssl.sh: #11461: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:25 UTC 2016 ssl.sh: #11462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:26 UTC 2016 ssl.sh: #11463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:27 UTC 2016 ssl.sh: #11464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:28 UTC 2016 ssl.sh: #11465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:30 UTC 2016 ssl.sh: #11466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:31 UTC 2016 ssl.sh: #11467: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:32 UTC 2016 ssl.sh: #11468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:33 UTC 2016 ssl.sh: #11469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:35 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11470: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:36 UTC 2016 ssl.sh: #11471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:37 UTC 2016 ssl.sh: #11472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:38 UTC 2016 ssl.sh: #11473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:40 UTC 2016 ssl.sh: #11474: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:41 UTC 2016 ssl.sh: #11475: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:42 UTC 2016 ssl.sh: #11476: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:43 UTC 2016 ssl.sh: #11477: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:44 UTC 2016 ssl.sh: #11478: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:45 UTC 2016 ssl.sh: #11479: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:47 UTC 2016 ssl.sh: #11480: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:48 UTC 2016 ssl.sh: #11481: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:49 UTC 2016 ssl.sh: #11482: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:51 UTC 2016 ssl.sh: #11483: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:52 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11484: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:53 UTC 2016 ssl.sh: #11485: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:54 UTC 2016 ssl.sh: #11486: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:56 UTC 2016 ssl.sh: #11487: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:57 UTC 2016 ssl.sh: #11488: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:58 UTC 2016 ssl.sh: #11489: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:54:59 UTC 2016 ssl.sh: #11490: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:55:00 UTC 2016 ssl.sh: #11491: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:55:01 UTC 2016 ssl.sh: #11492: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:55:03 UTC 2016 ssl.sh: #11493: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:55:04 UTC 2016 ssl.sh: #11494: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:55:05 UTC 2016 ssl.sh: #11495: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:55:06 UTC 2016 ssl.sh: #11496: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 29323 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 29323 found at Mon Apr 25 19:55:07 UTC 2016 ssl.sh: #11497: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 29323 at Mon Apr 25 19:55:07 UTC 2016 kill -USR1 29323 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 29323 killed at Mon Apr 25 19:55:08 UTC 2016 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:55:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:55:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30766 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30766 found at Mon Apr 25 19:55:08 UTC 2016 selfserv_9709 with PID 30766 started at Mon Apr 25 19:55:08 UTC 2016 trying to kill selfserv_9709 with PID 30766 at Mon Apr 25 19:55:08 UTC 2016 kill -USR1 30766 ./ssl.sh: line 186: 30766 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30766 killed at Mon Apr 25 19:55:09 UTC 2016 selfserv_9709 starting at Mon Apr 25 19:55:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:55:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:09 UTC 2016 selfserv_9709 with PID 30800 started at Mon Apr 25 19:55:09 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:11 UTC 2016 ssl.sh: #11498: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:12 UTC 2016 ssl.sh: #11499: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:14 UTC 2016 ssl.sh: #11500: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:15 UTC 2016 ssl.sh: #11501: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:16 UTC 2016 ssl.sh: #11502: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:18 UTC 2016 ssl.sh: #11503: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:19 UTC 2016 ssl.sh: #11504: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:21 UTC 2016 ssl.sh: #11505: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:22 UTC 2016 ssl.sh: #11506: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:23 UTC 2016 ssl.sh: #11507: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:25 UTC 2016 ssl.sh: #11508: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:26 UTC 2016 ssl.sh: #11509: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:28 UTC 2016 ssl.sh: #11510: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:29 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11511: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:30 UTC 2016 ssl.sh: #11512: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:32 UTC 2016 ssl.sh: #11513: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:33 UTC 2016 ssl.sh: #11514: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:34 UTC 2016 ssl.sh: #11515: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:35 UTC 2016 ssl.sh: #11516: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:37 UTC 2016 ssl.sh: #11517: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:38 UTC 2016 ssl.sh: #11518: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:40 UTC 2016 ssl.sh: #11519: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:41 UTC 2016 ssl.sh: #11520: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:42 UTC 2016 ssl.sh: #11521: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:44 UTC 2016 ssl.sh: #11522: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:45 UTC 2016 ssl.sh: #11523: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:46 UTC 2016 ssl.sh: #11524: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:48 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11525: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:49 UTC 2016 ssl.sh: #11526: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:50 UTC 2016 ssl.sh: #11527: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:52 UTC 2016 ssl.sh: #11528: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:53 UTC 2016 ssl.sh: #11529: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:54 UTC 2016 ssl.sh: #11530: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:56 UTC 2016 ssl.sh: #11531: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:57 UTC 2016 ssl.sh: #11532: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:55:58 UTC 2016 ssl.sh: #11533: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:56:00 UTC 2016 ssl.sh: #11534: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:56:01 UTC 2016 ssl.sh: #11535: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:56:02 UTC 2016 ssl.sh: #11536: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:56:04 UTC 2016 ssl.sh: #11537: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 30800 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 30800 found at Mon Apr 25 19:56:05 UTC 2016 ssl.sh: #11538: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 30800 at Mon Apr 25 19:56:05 UTC 2016 kill -USR1 30800 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 30800 killed at Mon Apr 25 19:56:06 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:56:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:56:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:06 UTC 2016 selfserv_9709 with PID 32241 started at Mon Apr 25 19:56:06 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:08 UTC 2016 ssl.sh: #11539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:09 UTC 2016 ssl.sh: #11540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:11 UTC 2016 ssl.sh: #11541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:12 UTC 2016 ssl.sh: #11542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:13 UTC 2016 ssl.sh: #11543: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:15 UTC 2016 ssl.sh: #11544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:16 UTC 2016 ssl.sh: #11545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:18 UTC 2016 ssl.sh: #11546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:19 UTC 2016 ssl.sh: #11547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:20 UTC 2016 ssl.sh: #11548: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:22 UTC 2016 ssl.sh: #11549: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:23 UTC 2016 ssl.sh: #11550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:24 UTC 2016 ssl.sh: #11551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:26 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11552: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:27 UTC 2016 ssl.sh: #11553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:28 UTC 2016 ssl.sh: #11554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:30 UTC 2016 ssl.sh: #11555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:31 UTC 2016 ssl.sh: #11556: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:32 UTC 2016 ssl.sh: #11557: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:34 UTC 2016 ssl.sh: #11558: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:35 UTC 2016 ssl.sh: #11559: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:36 UTC 2016 ssl.sh: #11560: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:38 UTC 2016 ssl.sh: #11561: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:39 UTC 2016 ssl.sh: #11562: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:40 UTC 2016 ssl.sh: #11563: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:42 UTC 2016 ssl.sh: #11564: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:43 UTC 2016 ssl.sh: #11565: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:45 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11566: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:46 UTC 2016 ssl.sh: #11567: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:47 UTC 2016 ssl.sh: #11568: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:49 UTC 2016 ssl.sh: #11569: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:50 UTC 2016 ssl.sh: #11570: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:51 UTC 2016 ssl.sh: #11571: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:53 UTC 2016 ssl.sh: #11572: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:54 UTC 2016 ssl.sh: #11573: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:55 UTC 2016 ssl.sh: #11574: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:57 UTC 2016 ssl.sh: #11575: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:58 UTC 2016 ssl.sh: #11576: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:56:59 UTC 2016 ssl.sh: #11577: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:57:01 UTC 2016 ssl.sh: #11578: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 32241 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 32241 found at Mon Apr 25 19:57:02 UTC 2016 ssl.sh: #11579: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 32241 at Mon Apr 25 19:57:02 UTC 2016 kill -USR1 32241 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 32241 killed at Mon Apr 25 19:57:02 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:57:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:57:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:03 UTC 2016 selfserv_9709 with PID 1235 started at Mon Apr 25 19:57:03 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:04 UTC 2016 ssl.sh: #11580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:06 UTC 2016 ssl.sh: #11581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:07 UTC 2016 ssl.sh: #11582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:08 UTC 2016 ssl.sh: #11583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:09 UTC 2016 ssl.sh: #11584: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:10 UTC 2016 ssl.sh: #11585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:11 UTC 2016 ssl.sh: #11586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:12 UTC 2016 ssl.sh: #11587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:14 UTC 2016 ssl.sh: #11588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:15 UTC 2016 ssl.sh: #11589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:16 UTC 2016 ssl.sh: #11590: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:17 UTC 2016 ssl.sh: #11591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:18 UTC 2016 ssl.sh: #11592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:20 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11593: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:21 UTC 2016 ssl.sh: #11594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:22 UTC 2016 ssl.sh: #11595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:23 UTC 2016 ssl.sh: #11596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:24 UTC 2016 ssl.sh: #11597: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:25 UTC 2016 ssl.sh: #11598: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:26 UTC 2016 ssl.sh: #11599: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:27 UTC 2016 ssl.sh: #11600: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:29 UTC 2016 ssl.sh: #11601: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:30 UTC 2016 ssl.sh: #11602: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:31 UTC 2016 ssl.sh: #11603: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:32 UTC 2016 ssl.sh: #11604: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:33 UTC 2016 ssl.sh: #11605: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:34 UTC 2016 ssl.sh: #11606: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:36 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11607: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:37 UTC 2016 ssl.sh: #11608: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:38 UTC 2016 ssl.sh: #11609: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:39 UTC 2016 ssl.sh: #11610: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:40 UTC 2016 ssl.sh: #11611: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:41 UTC 2016 ssl.sh: #11612: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:42 UTC 2016 ssl.sh: #11613: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:43 UTC 2016 ssl.sh: #11614: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:45 UTC 2016 ssl.sh: #11615: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:46 UTC 2016 ssl.sh: #11616: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:47 UTC 2016 ssl.sh: #11617: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:48 UTC 2016 ssl.sh: #11618: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:49 UTC 2016 ssl.sh: #11619: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 1235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 1235 found at Mon Apr 25 19:57:50 UTC 2016 ssl.sh: #11620: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 1235 at Mon Apr 25 19:57:50 UTC 2016 kill -USR1 1235 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 1235 killed at Mon Apr 25 19:57:51 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:57:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:57:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:57:51 UTC 2016 selfserv_9709 with PID 2674 started at Mon Apr 25 19:57:51 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:57:53 UTC 2016 ssl.sh: #11621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:57:55 UTC 2016 ssl.sh: #11622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:57:56 UTC 2016 ssl.sh: #11623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:57:57 UTC 2016 ssl.sh: #11624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:57:59 UTC 2016 ssl.sh: #11625: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:00 UTC 2016 ssl.sh: #11626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:02 UTC 2016 ssl.sh: #11627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:03 UTC 2016 ssl.sh: #11628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:05 UTC 2016 ssl.sh: #11629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:06 UTC 2016 ssl.sh: #11630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:08 UTC 2016 ssl.sh: #11631: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:09 UTC 2016 ssl.sh: #11632: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:11 UTC 2016 ssl.sh: #11633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:12 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11634: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:13 UTC 2016 ssl.sh: #11635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:15 UTC 2016 ssl.sh: #11636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:16 UTC 2016 ssl.sh: #11637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:17 UTC 2016 ssl.sh: #11638: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:19 UTC 2016 ssl.sh: #11639: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:20 UTC 2016 ssl.sh: #11640: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:21 UTC 2016 ssl.sh: #11641: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:23 UTC 2016 ssl.sh: #11642: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:24 UTC 2016 ssl.sh: #11643: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:26 UTC 2016 ssl.sh: #11644: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:27 UTC 2016 ssl.sh: #11645: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:29 UTC 2016 ssl.sh: #11646: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:30 UTC 2016 ssl.sh: #11647: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:31 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11648: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:33 UTC 2016 ssl.sh: #11649: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:34 UTC 2016 ssl.sh: #11650: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:36 UTC 2016 ssl.sh: #11651: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:37 UTC 2016 ssl.sh: #11652: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:38 UTC 2016 ssl.sh: #11653: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:40 UTC 2016 ssl.sh: #11654: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:41 UTC 2016 ssl.sh: #11655: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:42 UTC 2016 ssl.sh: #11656: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:44 UTC 2016 ssl.sh: #11657: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:45 UTC 2016 ssl.sh: #11658: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:46 UTC 2016 ssl.sh: #11659: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:48 UTC 2016 ssl.sh: #11660: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 2674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 2674 found at Mon Apr 25 19:58:49 UTC 2016 ssl.sh: #11661: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 2674 at Mon Apr 25 19:58:49 UTC 2016 kill -USR1 2674 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 2674 killed at Mon Apr 25 19:58:50 UTC 2016 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:58:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:58:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:58:50 UTC 2016 selfserv_9709 with PID 4165 started at Mon Apr 25 19:58:50 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:58:52 UTC 2016 ssl.sh: #11662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:58:54 UTC 2016 ssl.sh: #11663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:58:55 UTC 2016 ssl.sh: #11664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:58:56 UTC 2016 ssl.sh: #11665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:58:58 UTC 2016 ssl.sh: #11666: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:58:59 UTC 2016 ssl.sh: #11667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:01 UTC 2016 ssl.sh: #11668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:02 UTC 2016 ssl.sh: #11669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:04 UTC 2016 ssl.sh: #11670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:05 UTC 2016 ssl.sh: #11671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:07 UTC 2016 ssl.sh: #11672: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:08 UTC 2016 ssl.sh: #11673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:09 UTC 2016 ssl.sh: #11674: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:11 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11675: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:12 UTC 2016 ssl.sh: #11676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:14 UTC 2016 ssl.sh: #11677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:15 UTC 2016 ssl.sh: #11678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:16 UTC 2016 ssl.sh: #11679: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:18 UTC 2016 ssl.sh: #11680: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:19 UTC 2016 ssl.sh: #11681: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:20 UTC 2016 ssl.sh: #11682: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:22 UTC 2016 ssl.sh: #11683: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:23 UTC 2016 ssl.sh: #11684: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:25 UTC 2016 ssl.sh: #11685: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:26 UTC 2016 ssl.sh: #11686: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:28 UTC 2016 ssl.sh: #11687: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:29 UTC 2016 ssl.sh: #11688: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:30 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11689: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:32 UTC 2016 ssl.sh: #11690: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:33 UTC 2016 ssl.sh: #11691: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:35 UTC 2016 ssl.sh: #11692: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:36 UTC 2016 ssl.sh: #11693: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:37 UTC 2016 ssl.sh: #11694: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:39 UTC 2016 ssl.sh: #11695: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:40 UTC 2016 ssl.sh: #11696: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:41 UTC 2016 ssl.sh: #11697: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:43 UTC 2016 ssl.sh: #11698: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:44 UTC 2016 ssl.sh: #11699: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:45 UTC 2016 ssl.sh: #11700: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:47 UTC 2016 ssl.sh: #11701: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 4165 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 4165 found at Mon Apr 25 19:59:48 UTC 2016 ssl.sh: #11702: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 4165 at Mon Apr 25 19:59:48 UTC 2016 kill -USR1 4165 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 4165 killed at Mon Apr 25 19:59:49 UTC 2016 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 19:59:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 19:59:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 19:59:49 UTC 2016 selfserv_9709 with PID 5607 started at Mon Apr 25 19:59:49 UTC 2016 Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 19:59:51 UTC 2016 ssl.sh: #11703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 19:59:52 UTC 2016 ssl.sh: #11704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 19:59:53 UTC 2016 ssl.sh: #11705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 19:59:55 UTC 2016 ssl.sh: #11706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 19:59:56 UTC 2016 ssl.sh: #11707: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 19:59:57 UTC 2016 ssl.sh: #11708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 19:59:58 UTC 2016 ssl.sh: #11709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:00 UTC 2016 ssl.sh: #11710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:01 UTC 2016 ssl.sh: #11711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:02 UTC 2016 ssl.sh: #11712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:03 UTC 2016 ssl.sh: #11713: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:05 UTC 2016 ssl.sh: #11714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:06 UTC 2016 ssl.sh: #11715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:07 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11716: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:09 UTC 2016 ssl.sh: #11717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:10 UTC 2016 ssl.sh: #11718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:11 UTC 2016 ssl.sh: #11719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:12 UTC 2016 ssl.sh: #11720: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:13 UTC 2016 ssl.sh: #11721: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:14 UTC 2016 ssl.sh: #11722: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:16 UTC 2016 ssl.sh: #11723: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:17 UTC 2016 ssl.sh: #11724: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:18 UTC 2016 ssl.sh: #11725: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:19 UTC 2016 ssl.sh: #11726: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:20 UTC 2016 ssl.sh: #11727: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:22 UTC 2016 ssl.sh: #11728: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:23 UTC 2016 ssl.sh: #11729: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3: -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 112 bytes tstclnt: Writing 112 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:24 UTC 2016 ================= CRL Reloaded ============= ssl.sh: #11730: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:26 UTC 2016 ssl.sh: #11731: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:27 UTC 2016 ssl.sh: #11732: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:28 UTC 2016 ssl.sh: #11733: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:29 UTC 2016 ssl.sh: #11734: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:30 UTC 2016 ssl.sh: #11735: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:31 UTC 2016 ssl.sh: #11736: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:33 UTC 2016 ssl.sh: #11737: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:34 UTC 2016 ssl.sh: #11738: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:35 UTC 2016 ssl.sh: #11739: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:36 UTC 2016 ssl.sh: #11740: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:37 UTC 2016 ssl.sh: #11741: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:39 UTC 2016 ssl.sh: #11742: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: using asynchronous certificate validation tstclnt: Read from server -1 bytes tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 5607 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 5607 found at Mon Apr 25 20:00:40 UTC 2016 ssl.sh: #11743: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9709 with PID 5607 at Mon Apr 25 20:00:40 UTC 2016 kill -USR1 5607 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 5607 killed at Mon Apr 25 20:00:40 UTC 2016 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9709 starting at Mon Apr 25 20:00:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:00:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7044 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7044 found at Mon Apr 25 20:00:41 UTC 2016 selfserv_9709 with PID 7044 started at Mon Apr 25 20:00:41 UTC 2016 trying to kill selfserv_9709 with PID 7044 at Mon Apr 25 20:00:41 UTC 2016 kill -USR1 7044 ./ssl.sh: line 186: 7044 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9709 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} $verbose -H 1 -V ssl3: selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7044 killed at Mon Apr 25 20:00:41 UTC 2016 ssl.sh: SSL Cert Status (OCSP Stapling) - server bypass/client bypass - with ECC =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9709 starting at Mon Apr 25 20:00:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T good \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:00:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7084 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7084 found at Mon Apr 25 20:00:42 UTC 2016 selfserv_9709 with PID 7084 started at Mon Apr 25 20:00:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 0 ssl.sh: #11744: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9709 with PID 7084 at Mon Apr 25 20:00:43 UTC 2016 kill -USR1 7084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7084 killed at Mon Apr 25 20:00:44 UTC 2016 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9709 starting at Mon Apr 25 20:00:44 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T revoked \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:00:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7133 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7133 found at Mon Apr 25 20:00:44 UTC 2016 selfserv_9709 with PID 7133 started at Mon Apr 25 20:00:44 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 3 ssl.sh: #11745: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9709 with PID 7133 at Mon Apr 25 20:00:46 UTC 2016 kill -USR1 7133 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7133 killed at Mon Apr 25 20:00:46 UTC 2016 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9709 starting at Mon Apr 25 20:00:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T unknown \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:00:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7183 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7183 found at Mon Apr 25 20:00:47 UTC 2016 selfserv_9709 with PID 7183 started at Mon Apr 25 20:00:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #11746: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 7183 at Mon Apr 25 20:00:48 UTC 2016 kill -USR1 7183 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7183 killed at Mon Apr 25 20:00:49 UTC 2016 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9709 starting at Mon Apr 25 20:00:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T failure \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:00:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7235 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7235 found at Mon Apr 25 20:00:49 UTC 2016 selfserv_9709 with PID 7235 started at Mon Apr 25 20:00:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #11747: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 7235 at Mon Apr 25 20:00:50 UTC 2016 kill -USR1 7235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7235 killed at Mon Apr 25 20:00:51 UTC 2016 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9709 starting at Mon Apr 25 20:00:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T badsig \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:00:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7285 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7285 found at Mon Apr 25 20:00:51 UTC 2016 selfserv_9709 with PID 7285 started at Mon Apr 25 20:00:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #11748: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 7285 at Mon Apr 25 20:00:53 UTC 2016 kill -USR1 7285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7285 killed at Mon Apr 25 20:00:53 UTC 2016 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9709 starting at Mon Apr 25 20:00:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T corrupted \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:00:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7334 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7334 found at Mon Apr 25 20:00:54 UTC 2016 selfserv_9709 with PID 7334 started at Mon Apr 25 20:00:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #11749: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 7334 at Mon Apr 25 20:00:55 UTC 2016 kill -USR1 7334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7334 killed at Mon Apr 25 20:00:55 UTC 2016 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9709 starting at Mon Apr 25 20:00:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:00:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7383 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7383 found at Mon Apr 25 20:00:56 UTC 2016 selfserv_9709 with PID 7383 started at Mon Apr 25 20:00:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -f -d ../client -v -B -s \ -c v -T -O -F -M 1 -V ssl3: < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: exiting with return code 2 ssl.sh: #11750: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9709 with PID 7383 at Mon Apr 25 20:00:57 UTC 2016 kill -USR1 7383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7383 killed at Mon Apr 25 20:00:57 UTC 2016 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9709 starting at Mon Apr 25 20:00:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server/../stapling/ -n localhost.localdomain -B -s -A TestCA -T random \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:00:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7432 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7432 found at Mon Apr 25 20:00:58 UTC 2016 selfserv_9709 with PID 7432 started at Mon Apr 25 20:00:58 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss \ -c 1000 -V ssl3: -N -T localhost.localdomain strsclnt started at Mon Apr 25 20:00:58 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 20:02:53 UTC 2016 ssl.sh: #11751: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7432 at Mon Apr 25 20:02:53 UTC 2016 kill -USR1 7432 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7432 killed at Mon Apr 25 20:02:53 UTC 2016 ssl.sh: SSL Stress Test - server bypass/client bypass - with ECC =============================== ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 20:02:53 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:02:53 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7637 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7637 found at Mon Apr 25 20:02:54 UTC 2016 selfserv_9709 with PID 7637 started at Mon Apr 25 20:02:54 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 20:02:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:02:56 UTC 2016 ssl.sh: #11752: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7637 at Mon Apr 25 20:02:56 UTC 2016 kill -USR1 7637 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7637 killed at Mon Apr 25 20:02:56 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 20:02:56 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:02:56 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7714 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7714 found at Mon Apr 25 20:02:57 UTC 2016 selfserv_9709 with PID 7714 started at Mon Apr 25 20:02:57 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 20:02:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:02:59 UTC 2016 ssl.sh: #11753: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7714 at Mon Apr 25 20:02:59 UTC 2016 kill -USR1 7714 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7714 killed at Mon Apr 25 20:02:59 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 20:02:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:02:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7790 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7790 found at Mon Apr 25 20:03:00 UTC 2016 selfserv_9709 with PID 7790 started at Mon Apr 25 20:03:00 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:00 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:03:02 UTC 2016 ssl.sh: #11754: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7790 at Mon Apr 25 20:03:02 UTC 2016 kill -USR1 7790 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7790 killed at Mon Apr 25 20:03:02 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 20:03:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7880 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7880 found at Mon Apr 25 20:03:03 UTC 2016 selfserv_9709 with PID 7880 started at Mon Apr 25 20:03:03 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:03:05 UTC 2016 ssl.sh: #11755: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7880 at Mon Apr 25 20:03:05 UTC 2016 kill -USR1 7880 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7880 killed at Mon Apr 25 20:03:05 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 20:03:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 7956 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 7956 found at Mon Apr 25 20:03:06 UTC 2016 selfserv_9709 with PID 7956 started at Mon Apr 25 20:03:06 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:03:08 UTC 2016 ssl.sh: #11756: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 7956 at Mon Apr 25 20:03:08 UTC 2016 kill -USR1 7956 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 7956 killed at Mon Apr 25 20:03:09 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 20:03:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8032 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8032 found at Mon Apr 25 20:03:09 UTC 2016 selfserv_9709 with PID 8032 started at Mon Apr 25 20:03:09 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:03:12 UTC 2016 ssl.sh: #11757: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8032 at Mon Apr 25 20:03:12 UTC 2016 kill -USR1 8032 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8032 killed at Mon Apr 25 20:03:12 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 20:03:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8108 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8108 found at Mon Apr 25 20:03:13 UTC 2016 selfserv_9709 with PID 8108 started at Mon Apr 25 20:03:13 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:13 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:03:15 UTC 2016 ssl.sh: #11758: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8108 at Mon Apr 25 20:03:15 UTC 2016 kill -USR1 8108 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8108 killed at Mon Apr 25 20:03:16 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9709 starting at Mon Apr 25 20:03:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8191 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8191 found at Mon Apr 25 20:03:16 UTC 2016 selfserv_9709 with PID 8191 started at Mon Apr 25 20:03:16 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:03:18 UTC 2016 ssl.sh: #11759: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8191 at Mon Apr 25 20:03:18 UTC 2016 kill -USR1 8191 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8191 killed at Mon Apr 25 20:03:19 UTC 2016 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:03:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8295 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8295 found at Mon Apr 25 20:03:19 UTC 2016 selfserv_9709 with PID 8295 started at Mon Apr 25 20:03:19 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:03:24 UTC 2016 ssl.sh: #11760: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8295 at Mon Apr 25 20:03:25 UTC 2016 kill -USR1 8295 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8295 killed at Mon Apr 25 20:03:25 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:03:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8370 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8370 found at Mon Apr 25 20:03:25 UTC 2016 selfserv_9709 with PID 8370 started at Mon Apr 25 20:03:25 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -c 100 -C c -V ssl3: -N -n TestUser \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:03:31 UTC 2016 ssl.sh: #11761: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8370 at Mon Apr 25 20:03:31 UTC 2016 kill -USR1 8370 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8370 killed at Mon Apr 25 20:03:31 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:03:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8445 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8445 found at Mon Apr 25 20:03:32 UTC 2016 selfserv_9709 with PID 8445 started at Mon Apr 25 20:03:32 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:03:33 UTC 2016 ssl.sh: #11762: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8445 at Mon Apr 25 20:03:33 UTC 2016 kill -USR1 8445 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8445 killed at Mon Apr 25 20:03:34 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:03:34 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:34 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8521 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8521 found at Mon Apr 25 20:03:34 UTC 2016 selfserv_9709 with PID 8521 started at Mon Apr 25 20:03:34 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:34 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:03:36 UTC 2016 ssl.sh: #11763: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8521 at Mon Apr 25 20:03:36 UTC 2016 kill -USR1 8521 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8521 killed at Mon Apr 25 20:03:36 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 20:03:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8598 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8598 found at Mon Apr 25 20:03:37 UTC 2016 selfserv_9709 with PID 8598 started at Mon Apr 25 20:03:37 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:03:38 UTC 2016 ssl.sh: #11764: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8598 at Mon Apr 25 20:03:38 UTC 2016 kill -USR1 8598 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8598 killed at Mon Apr 25 20:03:39 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:03:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8674 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8674 found at Mon Apr 25 20:03:39 UTC 2016 selfserv_9709 with PID 8674 started at Mon Apr 25 20:03:39 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:39 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:03:40 UTC 2016 ssl.sh: #11765: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8674 at Mon Apr 25 20:03:41 UTC 2016 kill -USR1 8674 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8674 killed at Mon Apr 25 20:03:41 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 20:03:41 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:41 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8750 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8750 found at Mon Apr 25 20:03:41 UTC 2016 selfserv_9709 with PID 8750 started at Mon Apr 25 20:03:41 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:41 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:03:43 UTC 2016 ssl.sh: #11766: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8750 at Mon Apr 25 20:03:43 UTC 2016 kill -USR1 8750 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8750 killed at Mon Apr 25 20:03:43 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9709 starting at Mon Apr 25 20:03:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8832 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8832 found at Mon Apr 25 20:03:44 UTC 2016 selfserv_9709 with PID 8832 started at Mon Apr 25 20:03:44 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:44 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:03:47 UTC 2016 ssl.sh: #11767: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8832 at Mon Apr 25 20:03:47 UTC 2016 kill -USR1 8832 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8832 killed at Mon Apr 25 20:03:47 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9709 starting at Mon Apr 25 20:03:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 8914 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 8914 found at Mon Apr 25 20:03:48 UTC 2016 selfserv_9709 with PID 8914 started at Mon Apr 25 20:03:48 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:48 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:03:51 UTC 2016 ssl.sh: #11768: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 8914 at Mon Apr 25 20:03:51 UTC 2016 kill -USR1 8914 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 8914 killed at Mon Apr 25 20:03:51 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:03:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:03:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9014 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9014 found at Mon Apr 25 20:03:52 UTC 2016 selfserv_9709 with PID 9014 started at Mon Apr 25 20:03:52 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:03:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:04:00 UTC 2016 ssl.sh: #11769: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9014 at Mon Apr 25 20:04:00 UTC 2016 kill -USR1 9014 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9014 killed at Mon Apr 25 20:04:00 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:04:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9090 found at Mon Apr 25 20:04:01 UTC 2016 selfserv_9709 with PID 9090 started at Mon Apr 25 20:04:01 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:04:08 UTC 2016 ssl.sh: #11770: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9090 at Mon Apr 25 20:04:08 UTC 2016 kill -USR1 9090 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9090 killed at Mon Apr 25 20:04:09 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:04:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9180 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9180 found at Mon Apr 25 20:04:09 UTC 2016 selfserv_9709 with PID 9180 started at Mon Apr 25 20:04:09 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:04:17 UTC 2016 ssl.sh: #11771: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9180 at Mon Apr 25 20:04:17 UTC 2016 kill -USR1 9180 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9180 killed at Mon Apr 25 20:04:18 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:04:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9256 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9256 found at Mon Apr 25 20:04:18 UTC 2016 selfserv_9709 with PID 9256 started at Mon Apr 25 20:04:18 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:18 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:04:27 UTC 2016 ssl.sh: #11772: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9256 at Mon Apr 25 20:04:28 UTC 2016 kill -USR1 9256 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9256 killed at Mon Apr 25 20:04:28 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:04:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9331 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9331 found at Mon Apr 25 20:04:28 UTC 2016 selfserv_9709 with PID 9331 started at Mon Apr 25 20:04:29 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:04:35 UTC 2016 ssl.sh: #11773: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9331 at Mon Apr 25 20:04:35 UTC 2016 kill -USR1 9331 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9331 killed at Mon Apr 25 20:04:36 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 20:04:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9406 found at Mon Apr 25 20:04:36 UTC 2016 selfserv_9709 with PID 9406 started at Mon Apr 25 20:04:36 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:04:39 UTC 2016 ssl.sh: #11774: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9406 at Mon Apr 25 20:04:39 UTC 2016 kill -USR1 9406 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9406 killed at Mon Apr 25 20:04:39 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 20:04:39 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:39 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9483 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9483 found at Mon Apr 25 20:04:40 UTC 2016 selfserv_9709 with PID 9483 started at Mon Apr 25 20:04:40 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:40 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:04:42 UTC 2016 ssl.sh: #11775: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9483 at Mon Apr 25 20:04:42 UTC 2016 kill -USR1 9483 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9483 killed at Mon Apr 25 20:04:42 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 20:04:42 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:42 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9559 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9559 found at Mon Apr 25 20:04:43 UTC 2016 selfserv_9709 with PID 9559 started at Mon Apr 25 20:04:43 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:43 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:04:45 UTC 2016 ssl.sh: #11776: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9559 at Mon Apr 25 20:04:45 UTC 2016 kill -USR1 9559 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9559 killed at Mon Apr 25 20:04:45 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 20:04:45 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:45 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9635 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9635 found at Mon Apr 25 20:04:46 UTC 2016 selfserv_9709 with PID 9635 started at Mon Apr 25 20:04:46 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:46 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:04:48 UTC 2016 ssl.sh: #11777: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9635 at Mon Apr 25 20:04:48 UTC 2016 kill -USR1 9635 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9635 killed at Mon Apr 25 20:04:49 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 20:04:49 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:49 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9711 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9711 found at Mon Apr 25 20:04:49 UTC 2016 selfserv_9709 with PID 9711 started at Mon Apr 25 20:04:49 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:04:51 UTC 2016 ssl.sh: #11778: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9711 at Mon Apr 25 20:04:51 UTC 2016 kill -USR1 9711 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9711 killed at Mon Apr 25 20:04:51 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:04:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9811 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9811 found at Mon Apr 25 20:04:52 UTC 2016 selfserv_9709 with PID 9811 started at Mon Apr 25 20:04:52 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 20:04:55 UTC 2016 ssl.sh: #11779: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9811 at Mon Apr 25 20:04:55 UTC 2016 kill -USR1 9811 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9811 killed at Mon Apr 25 20:04:55 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 20:04:55 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:55 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9886 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9886 found at Mon Apr 25 20:04:56 UTC 2016 selfserv_9709 with PID 9886 started at Mon Apr 25 20:04:56 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:56 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:04:57 UTC 2016 ssl.sh: #11780: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9886 at Mon Apr 25 20:04:57 UTC 2016 kill -USR1 9886 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9886 killed at Mon Apr 25 20:04:58 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:04:58 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:04:58 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 9968 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 9968 found at Mon Apr 25 20:04:58 UTC 2016 selfserv_9709 with PID 9968 started at Mon Apr 25 20:04:58 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 20:04:58 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 20:05:01 UTC 2016 ssl.sh: #11781: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 9968 at Mon Apr 25 20:05:02 UTC 2016 kill -USR1 9968 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 9968 killed at Mon Apr 25 20:05:02 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:05:02 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:05:02 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10056 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10056 found at Mon Apr 25 20:05:02 UTC 2016 selfserv_9709 with PID 10056 started at Mon Apr 25 20:05:03 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n TestUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 20:05:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 20:05:05 UTC 2016 ssl.sh: #11782: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10056 at Mon Apr 25 20:05:05 UTC 2016 kill -USR1 10056 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10056 killed at Mon Apr 25 20:05:05 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 20:05:05 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:05:05 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10131 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10131 found at Mon Apr 25 20:05:06 UTC 2016 selfserv_9709 with PID 10131 started at Mon Apr 25 20:05:06 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 20:05:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:05:07 UTC 2016 ssl.sh: #11783: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10131 at Mon Apr 25 20:05:08 UTC 2016 kill -USR1 10131 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10131 killed at Mon Apr 25 20:05:08 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:05:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:05:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10207 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10207 found at Mon Apr 25 20:05:08 UTC 2016 selfserv_9709 with PID 10207 started at Mon Apr 25 20:05:09 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:05:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:05:10 UTC 2016 ssl.sh: #11784: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10207 at Mon Apr 25 20:05:10 UTC 2016 kill -USR1 10207 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10207 killed at Mon Apr 25 20:05:11 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:05:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:05:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10304 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10304 found at Mon Apr 25 20:05:11 UTC 2016 selfserv_9709 with PID 10304 started at Mon Apr 25 20:05:11 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:05:11 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:05:17 UTC 2016 ssl.sh: #11785: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10304 at Mon Apr 25 20:05:17 UTC 2016 kill -USR1 10304 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10304 killed at Mon Apr 25 20:05:18 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 20:05:18 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:05:18 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10380 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10380 found at Mon Apr 25 20:05:18 UTC 2016 selfserv_9709 with PID 10380 started at Mon Apr 25 20:05:18 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 20:05:18 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:05:21 UTC 2016 ssl.sh: #11786: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10380 at Mon Apr 25 20:05:21 UTC 2016 kill -USR1 10380 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10380 killed at Mon Apr 25 20:05:21 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:05:21 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:05:21 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10456 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10456 found at Mon Apr 25 20:05:22 UTC 2016 selfserv_9709 with PID 10456 started at Mon Apr 25 20:05:22 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:05:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:05:28 UTC 2016 ssl.sh: #11787: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10456 at Mon Apr 25 20:05:28 UTC 2016 kill -USR1 10456 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10456 killed at Mon Apr 25 20:05:28 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:05:28 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:05:28 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10531 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10531 found at Mon Apr 25 20:05:29 UTC 2016 selfserv_9709 with PID 10531 started at Mon Apr 25 20:05:29 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:05:29 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:05:36 UTC 2016 ssl.sh: #11788: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10531 at Mon Apr 25 20:05:36 UTC 2016 kill -USR1 10531 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10531 killed at Mon Apr 25 20:05:37 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:05:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:05:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10620 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10620 found at Mon Apr 25 20:05:37 UTC 2016 selfserv_9709 with PID 10620 started at Mon Apr 25 20:05:37 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:05:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 20:06:43 UTC 2016 ssl.sh: #11789: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10620 at Mon Apr 25 20:06:43 UTC 2016 kill -USR1 10620 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10620 killed at Mon Apr 25 20:06:43 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 20:06:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:06:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10729 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10729 found at Mon Apr 25 20:06:44 UTC 2016 selfserv_9709 with PID 10729 started at Mon Apr 25 20:06:44 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:06:44 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 20:07:49 UTC 2016 ssl.sh: #11790: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10729 at Mon Apr 25 20:07:49 UTC 2016 kill -USR1 10729 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10729 killed at Mon Apr 25 20:07:50 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:07:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:07:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10827 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10827 found at Mon Apr 25 20:07:50 UTC 2016 selfserv_9709 with PID 10827 started at Mon Apr 25 20:07:50 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:07:50 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:07:56 UTC 2016 ssl.sh: #11791: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10827 at Mon Apr 25 20:07:56 UTC 2016 kill -USR1 10827 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10827 killed at Mon Apr 25 20:07:57 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:07:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:07:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 10902 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 10902 found at Mon Apr 25 20:07:57 UTC 2016 selfserv_9709 with PID 10902 started at Mon Apr 25 20:07:57 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:07:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:08:03 UTC 2016 ssl.sh: #11792: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 10902 at Mon Apr 25 20:08:03 UTC 2016 kill -USR1 10902 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 10902 killed at Mon Apr 25 20:08:04 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:08:04 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:08:04 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11012 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11012 found at Mon Apr 25 20:08:04 UTC 2016 selfserv_9709 with PID 11012 started at Mon Apr 25 20:08:04 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 20:08:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:08:16 UTC 2016 ssl.sh: #11793: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11012 at Mon Apr 25 20:08:16 UTC 2016 kill -USR1 11012 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11012 killed at Mon Apr 25 20:08:16 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 20:08:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:08:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11087 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11087 found at Mon Apr 25 20:08:17 UTC 2016 selfserv_9709 with PID 11087 started at Mon Apr 25 20:08:17 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n TestUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 20:08:17 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:08:19 UTC 2016 ssl.sh: #11794: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11087 at Mon Apr 25 20:08:19 UTC 2016 kill -USR1 11087 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11087 killed at Mon Apr 25 20:08:20 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:08:20 UTC 2016 selfserv_9709 -D -p 9709 -d ../server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:08:20 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11177 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11177 found at Mon Apr 25 20:08:20 UTC 2016 selfserv_9709 with PID 11177 started at Mon Apr 25 20:08:20 UTC 2016 strsclnt -q -p 9709 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n TestUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 20:08:20 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 20:09:59 UTC 2016 ssl.sh: #11795: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11177 at Mon Apr 25 20:09:59 UTC 2016 kill -USR1 11177 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11177 killed at Mon Apr 25 20:09:59 UTC 2016 ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass - with ECC =============================== ssl.sh: skipping -c_1000_-C_A Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 20:09:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:09:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11352 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11352 found at Mon Apr 25 20:10:00 UTC 2016 selfserv_9709 with PID 11352 started at Mon Apr 25 20:10:00 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:00 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:10:02 UTC 2016 ssl.sh: #11796: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11352 at Mon Apr 25 20:10:02 UTC 2016 kill -USR1 11352 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11352 killed at Mon Apr 25 20:10:02 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9709 starting at Mon Apr 25 20:10:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11441 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11441 found at Mon Apr 25 20:10:03 UTC 2016 selfserv_9709 with PID 11441 started at Mon Apr 25 20:10:03 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3: \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:03 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:10:05 UTC 2016 ssl.sh: #11797: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11441 at Mon Apr 25 20:10:05 UTC 2016 kill -USR1 11441 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11441 killed at Mon Apr 25 20:10:06 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9709 starting at Mon Apr 25 20:10:06 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:06 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11518 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11518 found at Mon Apr 25 20:10:06 UTC 2016 selfserv_9709 with PID 11518 started at Mon Apr 25 20:10:06 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -g \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:06 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:10:08 UTC 2016 ssl.sh: #11798: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11518 at Mon Apr 25 20:10:08 UTC 2016 kill -USR1 11518 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11518 killed at Mon Apr 25 20:10:09 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9709 starting at Mon Apr 25 20:10:09 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:09 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11594 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11594 found at Mon Apr 25 20:10:09 UTC 2016 selfserv_9709 with PID 11594 started at Mon Apr 25 20:10:09 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:09 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:10:12 UTC 2016 ssl.sh: #11799: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11594 at Mon Apr 25 20:10:12 UTC 2016 kill -USR1 11594 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11594 killed at Mon Apr 25 20:10:12 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9709 starting at Mon Apr 25 20:10:12 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:12 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11670 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11670 found at Mon Apr 25 20:10:13 UTC 2016 selfserv_9709 with PID 11670 started at Mon Apr 25 20:10:13 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:13 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:10:15 UTC 2016 ssl.sh: #11800: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11670 at Mon Apr 25 20:10:15 UTC 2016 kill -USR1 11670 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11670 killed at Mon Apr 25 20:10:16 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9709 starting at Mon Apr 25 20:10:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11746 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11746 found at Mon Apr 25 20:10:16 UTC 2016 selfserv_9709 with PID 11746 started at Mon Apr 25 20:10:16 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:10:19 UTC 2016 ssl.sh: #11801: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11746 at Mon Apr 25 20:10:19 UTC 2016 kill -USR1 11746 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11746 killed at Mon Apr 25 20:10:19 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9709 starting at Mon Apr 25 20:10:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11822 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11822 found at Mon Apr 25 20:10:20 UTC 2016 selfserv_9709 with PID 11822 started at Mon Apr 25 20:10:20 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:20 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:10:22 UTC 2016 ssl.sh: #11802: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11822 at Mon Apr 25 20:10:22 UTC 2016 kill -USR1 11822 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11822 killed at Mon Apr 25 20:10:23 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping -c_100_-C_A_-N_-n_TestUser Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:10:23 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:23 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 11927 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 11927 found at Mon Apr 25 20:10:23 UTC 2016 selfserv_9709 with PID 11927 started at Mon Apr 25 20:10:23 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:23 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:10:31 UTC 2016 ssl.sh: #11803: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 11927 at Mon Apr 25 20:10:31 UTC 2016 kill -USR1 11927 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 11927 killed at Mon Apr 25 20:10:31 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:10:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12003 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12003 found at Mon Apr 25 20:10:32 UTC 2016 selfserv_9709 with PID 12003 started at Mon Apr 25 20:10:32 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3: -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:10:40 UTC 2016 ssl.sh: #11804: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12003 at Mon Apr 25 20:10:40 UTC 2016 kill -USR1 12003 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12003 killed at Mon Apr 25 20:10:40 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:10:40 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:40 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12078 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12078 found at Mon Apr 25 20:10:41 UTC 2016 selfserv_9709 with PID 12078 started at Mon Apr 25 20:10:41 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:41 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:10:42 UTC 2016 ssl.sh: #11805: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12078 at Mon Apr 25 20:10:42 UTC 2016 kill -USR1 12078 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12078 killed at Mon Apr 25 20:10:43 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:10:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12154 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12154 found at Mon Apr 25 20:10:43 UTC 2016 selfserv_9709 with PID 12154 started at Mon Apr 25 20:10:43 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:43 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:10:45 UTC 2016 ssl.sh: #11806: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12154 at Mon Apr 25 20:10:45 UTC 2016 kill -USR1 12154 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12154 killed at Mon Apr 25 20:10:46 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 20:10:46 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:46 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12231 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12231 found at Mon Apr 25 20:10:46 UTC 2016 selfserv_9709 with PID 12231 started at Mon Apr 25 20:10:46 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:46 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:10:48 UTC 2016 ssl.sh: #11807: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12231 at Mon Apr 25 20:10:48 UTC 2016 kill -USR1 12231 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12231 killed at Mon Apr 25 20:10:48 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:10:48 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:48 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12307 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12307 found at Mon Apr 25 20:10:49 UTC 2016 selfserv_9709 with PID 12307 started at Mon Apr 25 20:10:49 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:49 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:10:51 UTC 2016 ssl.sh: #11808: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12307 at Mon Apr 25 20:10:51 UTC 2016 kill -USR1 12307 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12307 killed at Mon Apr 25 20:10:51 UTC 2016 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9709 starting at Mon Apr 25 20:10:51 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -u -z -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:51 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12386 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12386 found at Mon Apr 25 20:10:52 UTC 2016 selfserv_9709 with PID 12386 started at Mon Apr 25 20:10:52 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:52 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:10:53 UTC 2016 ssl.sh: #11809: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12386 at Mon Apr 25 20:10:53 UTC 2016 kill -USR1 12386 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12386 killed at Mon Apr 25 20:10:54 UTC 2016 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:10:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:10:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12491 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12491 found at Mon Apr 25 20:10:54 UTC 2016 selfserv_9709 with PID 12491 started at Mon Apr 25 20:10:54 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:10:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:11:06 UTC 2016 ssl.sh: #11810: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12491 at Mon Apr 25 20:11:06 UTC 2016 kill -USR1 12491 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12491 killed at Mon Apr 25 20:11:06 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:11:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C023 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:11:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12581 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12581 found at Mon Apr 25 20:11:07 UTC 2016 selfserv_9709 with PID 12581 started at Mon Apr 25 20:11:07 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C023 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:11:07 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:11:18 UTC 2016 ssl.sh: #11811: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12581 at Mon Apr 25 20:11:18 UTC 2016 kill -USR1 12581 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12581 killed at Mon Apr 25 20:11:19 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:11:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:11:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12656 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12656 found at Mon Apr 25 20:11:19 UTC 2016 selfserv_9709 with PID 12656 started at Mon Apr 25 20:11:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C02B -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:11:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:11:31 UTC 2016 ssl.sh: #11812: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12656 at Mon Apr 25 20:11:31 UTC 2016 kill -USR1 12656 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12656 killed at Mon Apr 25 20:11:31 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:11:31 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:11:31 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12733 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12733 found at Mon Apr 25 20:11:32 UTC 2016 selfserv_9709 with PID 12733 started at Mon Apr 25 20:11:32 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:11:32 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:11:42 UTC 2016 ssl.sh: #11813: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12733 at Mon Apr 25 20:11:43 UTC 2016 kill -USR1 12733 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12733 killed at Mon Apr 25 20:11:43 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:11:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:11:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12808 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12808 found at Mon Apr 25 20:11:43 UTC 2016 selfserv_9709 with PID 12808 started at Mon Apr 25 20:11:43 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:11:43 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:11:46 UTC 2016 ssl.sh: #11814: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12808 at Mon Apr 25 20:11:46 UTC 2016 kill -USR1 12808 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12808 killed at Mon Apr 25 20:11:47 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ---- selfserv_9709 starting at Mon Apr 25 20:11:47 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:11:47 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12884 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12884 found at Mon Apr 25 20:11:47 UTC 2016 selfserv_9709 with PID 12884 started at Mon Apr 25 20:11:47 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \ localhost.localdomain strsclnt started at Mon Apr 25 20:11:47 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:11:50 UTC 2016 ssl.sh: #11815: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12884 at Mon Apr 25 20:11:50 UTC 2016 kill -USR1 12884 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12884 killed at Mon Apr 25 20:11:50 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ---- selfserv_9709 starting at Mon Apr 25 20:11:50 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C027 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:11:50 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 12963 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 12963 found at Mon Apr 25 20:11:51 UTC 2016 selfserv_9709 with PID 12963 started at Mon Apr 25 20:11:51 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C027 \ localhost.localdomain strsclnt started at Mon Apr 25 20:11:51 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:11:53 UTC 2016 ssl.sh: #11816: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 12963 at Mon Apr 25 20:11:53 UTC 2016 kill -USR1 12963 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 12963 killed at Mon Apr 25 20:11:53 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ---- selfserv_9709 starting at Mon Apr 25 20:11:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C02F -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:11:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13039 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13039 found at Mon Apr 25 20:11:54 UTC 2016 selfserv_9709 with PID 13039 started at Mon Apr 25 20:11:54 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C02F \ localhost.localdomain strsclnt started at Mon Apr 25 20:11:54 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:11:56 UTC 2016 ssl.sh: #11817: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13039 at Mon Apr 25 20:11:56 UTC 2016 kill -USR1 13039 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13039 killed at Mon Apr 25 20:11:57 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 20:11:57 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C004 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:11:57 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13115 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13115 found at Mon Apr 25 20:11:57 UTC 2016 selfserv_9709 with PID 13115 started at Mon Apr 25 20:11:57 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:11:57 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Mon Apr 25 20:12:00 UTC 2016 ssl.sh: #11818: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13115 at Mon Apr 25 20:12:00 UTC 2016 kill -USR1 13115 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13115 killed at Mon Apr 25 20:12:00 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ---- selfserv_9709 starting at Mon Apr 25 20:12:00 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C009 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:00 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13191 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13191 found at Mon Apr 25 20:12:01 UTC 2016 selfserv_9709 with PID 13191 started at Mon Apr 25 20:12:01 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C009 -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:01 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:12:02 UTC 2016 ssl.sh: #11819: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13191 at Mon Apr 25 20:12:03 UTC 2016 kill -USR1 13191 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13191 killed at Mon Apr 25 20:12:03 UTC 2016 ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:12:03 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C009 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:03 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13302 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13302 found at Mon Apr 25 20:12:04 UTC 2016 selfserv_9709 with PID 13302 started at Mon Apr 25 20:12:04 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C009 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:04 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 20:12:07 UTC 2016 ssl.sh: #11820: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13302 at Mon Apr 25 20:12:07 UTC 2016 kill -USR1 13302 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13302 killed at Mon Apr 25 20:12:08 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ---- selfserv_9709 starting at Mon Apr 25 20:12:08 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:08 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13378 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13378 found at Mon Apr 25 20:12:08 UTC 2016 selfserv_9709 with PID 13378 started at Mon Apr 25 20:12:08 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:12:10 UTC 2016 ssl.sh: #11821: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13378 at Mon Apr 25 20:12:10 UTC 2016 kill -USR1 13378 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13378 killed at Mon Apr 25 20:12:11 UTC 2016 ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:12:11 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C004 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:11 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13454 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13454 found at Mon Apr 25 20:12:11 UTC 2016 selfserv_9709 with PID 13454 started at Mon Apr 25 20:12:11 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C004 -N -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:11 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 20:12:15 UTC 2016 ssl.sh: #11822: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13454 at Mon Apr 25 20:12:15 UTC 2016 kill -USR1 13454 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13454 killed at Mon Apr 25 20:12:16 UTC 2016 ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:12:16 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ecmixed -S localhost.localdomain-dsa -w nss -r -r -c :C00E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:16 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13529 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13529 found at Mon Apr 25 20:12:16 UTC 2016 selfserv_9709 with PID 13529 started at Mon Apr 25 20:12:16 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:16 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 10 server certificates tested. strsclnt completed at Mon Apr 25 20:12:18 UTC 2016 ssl.sh: #11823: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13529 at Mon Apr 25 20:12:18 UTC 2016 kill -USR1 13529 selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13529 killed at Mon Apr 25 20:12:19 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ---- selfserv_9709 starting at Mon Apr 25 20:12:19 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:19 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13604 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13604 found at Mon Apr 25 20:12:19 UTC 2016 selfserv_9709 with PID 13604 started at Mon Apr 25 20:12:19 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:19 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:12:21 UTC 2016 ssl.sh: #11824: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13604 at Mon Apr 25 20:12:21 UTC 2016 kill -USR1 13604 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13604 killed at Mon Apr 25 20:12:22 UTC 2016 ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:12:22 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:22 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13680 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13680 found at Mon Apr 25 20:12:22 UTC 2016 selfserv_9709 with PID 13680 started at Mon Apr 25 20:12:22 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:22 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Mon Apr 25 20:12:24 UTC 2016 ssl.sh: #11825: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13680 at Mon Apr 25 20:12:24 UTC 2016 kill -USR1 13680 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13680 killed at Mon Apr 25 20:12:24 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:12:25 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0016 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:25 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13777 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13777 found at Mon Apr 25 20:12:25 UTC 2016 selfserv_9709 with PID 13777 started at Mon Apr 25 20:12:25 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0016 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:25 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:12:32 UTC 2016 ssl.sh: #11826: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13777 at Mon Apr 25 20:12:32 UTC 2016 kill -USR1 13777 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13777 killed at Mon Apr 25 20:12:32 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ---- selfserv_9709 starting at Mon Apr 25 20:12:32 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0033 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:32 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13853 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13853 found at Mon Apr 25 20:12:33 UTC 2016 selfserv_9709 with PID 13853 started at Mon Apr 25 20:12:33 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0033 \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:33 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:12:35 UTC 2016 ssl.sh: #11827: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13853 at Mon Apr 25 20:12:35 UTC 2016 kill -USR1 13853 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13853 killed at Mon Apr 25 20:12:35 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:12:36 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0039 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:36 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 13929 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 13929 found at Mon Apr 25 20:12:36 UTC 2016 selfserv_9709 with PID 13929 started at Mon Apr 25 20:12:36 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0039 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:36 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:12:42 UTC 2016 ssl.sh: #11828: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 13929 at Mon Apr 25 20:12:42 UTC 2016 kill -USR1 13929 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 13929 killed at Mon Apr 25 20:12:43 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:12:43 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0040 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:43 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14004 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14004 found at Mon Apr 25 20:12:43 UTC 2016 selfserv_9709 with PID 14004 started at Mon Apr 25 20:12:43 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0040 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:43 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:12:54 UTC 2016 ssl.sh: #11829: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14004 at Mon Apr 25 20:12:54 UTC 2016 kill -USR1 14004 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14004 killed at Mon Apr 25 20:12:54 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:12:54 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :0038 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:12:54 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14097 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14097 found at Mon Apr 25 20:12:55 UTC 2016 selfserv_9709 with PID 14097 started at Mon Apr 25 20:12:55 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0038 -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:12:55 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 20:14:26 UTC 2016 ssl.sh: #11830: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14097 at Mon Apr 25 20:14:26 UTC 2016 kill -USR1 14097 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14097 killed at Mon Apr 25 20:14:27 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ---- selfserv_9709 starting at Mon Apr 25 20:14:27 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006A -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:14:27 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14219 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14219 found at Mon Apr 25 20:14:27 UTC 2016 selfserv_9709 with PID 14219 started at Mon Apr 25 20:14:27 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :006A -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:14:27 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 20:15:59 UTC 2016 ssl.sh: #11831: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14219 at Mon Apr 25 20:15:59 UTC 2016 kill -USR1 14219 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14219 killed at Mon Apr 25 20:15:59 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:15:59 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :006B -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:15:59 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14318 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14318 found at Mon Apr 25 20:16:00 UTC 2016 selfserv_9709 with PID 14318 started at Mon Apr 25 20:16:00 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :006B -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:16:00 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:16:07 UTC 2016 ssl.sh: #11832: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14318 at Mon Apr 25 20:16:07 UTC 2016 kill -USR1 14318 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14318 killed at Mon Apr 25 20:16:07 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ---- selfserv_9709 starting at Mon Apr 25 20:16:07 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :009E -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:16:07 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14406 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14406 found at Mon Apr 25 20:16:08 UTC 2016 selfserv_9709 with PID 14406 started at Mon Apr 25 20:16:08 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :009E -N \ localhost.localdomain strsclnt started at Mon Apr 25 20:16:08 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:16:14 UTC 2016 ssl.sh: #11833: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14406 at Mon Apr 25 20:16:14 UTC 2016 kill -USR1 14406 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14406 killed at Mon Apr 25 20:16:14 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:16:15 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0032 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:16:15 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14503 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14503 found at Mon Apr 25 20:16:15 UTC 2016 selfserv_9709 with PID 14503 started at Mon Apr 25 20:16:15 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 20:16:15 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Mon Apr 25 20:16:33 UTC 2016 ssl.sh: #11834: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14503 at Mon Apr 25 20:16:33 UTC 2016 kill -USR1 14503 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14503 killed at Mon Apr 25 20:16:33 UTC 2016 ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ---- selfserv_9709 starting at Mon Apr 25 20:16:33 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :0067 -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:16:33 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14578 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14578 found at Mon Apr 25 20:16:34 UTC 2016 selfserv_9709 with PID 14578 started at Mon Apr 25 20:16:34 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \ localhost.localdomain strsclnt started at Mon Apr 25 20:16:34 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Mon Apr 25 20:16:36 UTC 2016 ssl.sh: #11835: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14578 at Mon Apr 25 20:16:36 UTC 2016 kill -USR1 14578 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14578 killed at Mon Apr 25 20:16:37 UTC 2016 ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ---- selfserv_9709 starting at Mon Apr 25 20:16:37 UTC 2016 selfserv_9709 -D -p 9709 -d ../ext_server -n localhost.localdomain -B -s \ -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.28098\ -H 1 -V ssl3: & trying to connect to selfserv_9709 at Mon Apr 25 20:16:37 UTC 2016 tstclnt -p 9709 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.21.0/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9709 (address=::1) kill -0 14669 >/dev/null 2>/dev/null No server to kill selfserv_9709 with PID 14669 found at Mon Apr 25 20:16:37 UTC 2016 selfserv_9709 with PID 14669 started at Mon Apr 25 20:16:37 UTC 2016 strsclnt -q -p 9709 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \ localhost.localdomain strsclnt started at Mon Apr 25 20:16:37 UTC 2016 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Mon Apr 25 20:19:20 UTC 2016 ssl.sh: #11836: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9709 with PID 14669 at Mon Apr 25 20:19:20 UTC 2016 kill -USR1 14669 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9709 -b -p 9709 2>/dev/null; selfserv_9709 with PID 14669 killed at Mon Apr 25 20:19:20 UTC 2016 TIMESTAMP ssl END: Mon Apr 25 20:19:20 UTC 2016 Checking if ocsp should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Checking if merge should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Running tests for merge TIMESTAMP merge BEGIN: Mon Apr 25 20:19:20 UTC 2016 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.v1.28098 -t "Test1" sdr.sh: #11837: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.v2.28098 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #11838: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.v3.28098 -t "1234567" sdr.sh: #11839: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.v1.28098 -t "Test1" sdr.sh: #11840: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.v2.28098 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #11841: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.v3.28098 -t "1234567" sdr.sh: #11842: Decrypt - Value 3 - PASSED merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.v3.28098 -t Test2 -f ../tests.pw merge.sh: #11843: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #11844: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #11845: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #11846: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #11847: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #11848: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:32:19 2016 Not After : Sun Apr 25 19:32:19 2021 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:64:c9:a9:58:b2:6c:9d:27:4e:a8:e1:1e:02:b6:2c: ec:d9:de:8f:98:a0:61:63:a5:d5:d4:1c:f3:a3:78:4f: a4:af:48:0a:41:c8:77:34:6c:33:0c:2e:54:27:4c:dc: b7:e7:f9:4e:0d:98:33:e3:8a:8e:36:69:32:8c:ac:31: 6e:ec:46:3f:ed:c3:48:1b:a5:57:d7:3a:c7:57:08:7f: 27:00:e6:2e:ac:08:8a:d3:fa:db:d8:0c:f2:29:ea:a8: 18:22:a9:e9:07:d3:d6:20:13:00:86:ef:4c:4a:f0:45: f4:1b:c8:5f:e3:03:9c:71:3d:51:b5:62:66:ed:74:05: df:38:b1:7a:68:6e:3e:34:94:5c:23:90:10:44:ec:59: 4f:db:58:bf:74:1e:16:55:ee:f9:3f:40:7f:59:f1:da: bf:f1:d1:6f:b1:31:18:e6:99:5d:66:ea:c9:f5:ed:5e: c4:75:56:6b:09:11:74:cc:c2:f1:5d:f5:e8:17:32:0d: 86:3a:f2:25:04:0a:0f:f4:51:c5:1a:45:ae:dc:79:0a: 66:ad:20:24:1a:e9:f6:31:97:d4:8f:04:99:46:40:69: 88:ed:6c:65:e4:23:db:ad:fc:5c:26:b9:50:c6:79:c5: 34:88:5d:07:23:b9:9c:17:24:83:1b:01:df:a3:d7:ab Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:87:61:7e:9f:4a:27:98:97:f7:d0:53:6a:6b:ae:ba: b5:2e:2b:2c:32:ab:b1:37:32:8e:37:a1:d3:fe:84:f4: cc:97:c1:02:6d:33:ac:4e:3b:a4:d0:92:e3:a5:07:0e: 03:51:09:a6:fe:19:0b:60:99:53:89:87:31:0e:ef:91: 59:2f:a4:e6:66:ad:e9:17:45:21:a0:e0:a6:d3:bb:23: a0:6f:29:cd:ff:6d:2c:51:b8:c6:19:37:24:0b:cb:64: 9d:38:5c:cb:aa:df:4e:d3:6c:d2:47:5d:2c:f7:c5:63: 3e:01:55:ac:91:70:82:d6:8d:cc:db:ee:58:10:13:dc: fd:5c:8e:50:f7:87:0a:51:7c:e2:3d:6d:40:c2:b9:85: 17:fb:6e:63:1a:f4:4f:a6:a5:b1:d9:76:0e:12:24:bf: 78:49:51:2a:60:62:ff:90:80:f7:12:ab:7c:04:e1:38: 71:59:9a:63:38:34:c2:b9:57:4e:96:6d:49:50:f7:f9: 01:f2:0f:c8:7a:0c:7a:b5:73:37:ce:e4:06:ef:08:dc: 51:fa:75:8e:d1:16:eb:f8:da:31:6f:2a:a7:12:61:fb: 94:fb:ab:47:3f:45:58:35:b7:d0:57:d8:21:ed:e8:fe: b6:4a:9c:70:b7:47:a0:3c:21:59:a0:4d:62:9a:41:c7 Fingerprint (SHA-256): 1B:D2:03:33:79:2C:AD:83:C0:E0:5D:72:77:E8:B5:06:59:4C:EF:83:63:09:B0:2A:D1:F3:C2:0B:67:28:DA:5C Fingerprint (SHA1): BB:0D:DF:F7:49:ED:2F:A3:60:82:C7:03:D5:DC:DC:61:1A:70:00:05 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #11849: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Apr 25 19:32:43 2016 Not After : Sun Apr 25 19:32:43 2021 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:0c:38:60:fd:ca:43:fc:33:4f:8a:fd:43:ff:56:9a: 6a:21:6c:83:6f:10:29:25:d8:06:88:c9:e0:a0:21:f0: e2:6d:6d:25:4e:bb:d3:90:aa:dd:49:40:46:f8:2b:89: c6:3a:75:ea:e9:dd:86:11:da:05:28:2e:1e:b0:ea:1e: 67:bd:ac:11:b2:f9:ae:a2:1e:03:42:e4:0a:d2:cd:87: 46:23:05:7f:c4:c6:ca:bd:5b:e8:f8:48:79:cd:ab:68: a3:f3:03:be:1f:9c:cb:40:78:d4:e7:44:38:dd:cb:52: 3a:c3:4b:04:65:da:14:43:30:5e:65:c1:d6:29:2c:a7: ed:80:31:d9:d2:9b:89:a1:28:8e:88:27:7e:05:d9:58: f9:80:81:df:94:d3:4c:37:fe:d0:72:34:bf:d3:d2:4a: 19:82:18:e0:cb:ac:97:4c:bd:7c:f0:69:6e:5e:03:78: e0:53:d2:24:74:21:b0:9c:de:a1:6d:bf:7d:7c:7f:28: f1:de:8f:9e:cd:38:46:12:e3:2b:9c:83:4b:72:e3:6b: 36:84:b4:c4:65:10:53:d6:ec:35:8b:3a:bf:a2:e4:68: ec:c5:40:7d:e9:72:3f:90:4b:ff:0e:79:a5:81:1c:2f: 5f:fe:c5:b6:ae:c4:38:ee:30:20:e8:2d:de:46:9b:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:ab:f2:46:34:e3:0b:11:93:6d:7b:1e:6b:ea:f8:cf: 06:3c:d0:9f:12:44:3b:ec:b5:36:28:cd:d8:76:f1:89: 8f:c2:cb:2e:37:11:86:9f:d9:59:25:c6:9b:da:12:62: f9:ea:d4:1f:93:d4:85:b7:87:9b:c1:d1:6c:1c:8b:2a: 75:3a:14:a8:ee:f1:8d:de:3a:70:b8:e2:d7:45:f5:24: ab:bc:1d:2b:41:18:94:77:b9:5f:7a:2a:fd:74:62:6d: de:1c:3a:1a:f1:4f:ae:65:87:03:92:48:3b:2a:bb:d2: cd:6d:f8:f9:f7:b8:e8:5d:cf:c4:02:2a:b5:73:30:07: db:d8:1a:4c:a8:38:a3:dc:55:db:43:69:c0:62:f1:d8: 60:e9:af:48:81:c9:87:ac:c4:43:90:de:85:c6:39:a2: a3:15:b9:7e:6a:b8:7e:c0:57:bf:fb:69:f1:85:8d:5d: cd:5f:69:47:b5:52:7d:e1:f2:77:e6:48:7d:8d:81:09: e7:1d:4a:e6:30:b1:10:a0:11:78:84:d4:9a:01:c5:80: 1d:50:c7:2d:56:53:1e:6a:fc:60:1d:fc:2a:38:53:29: 10:2d:6d:26:8a:e7:29:a4:20:62:67:3f:40:de:b2:21: 8f:a6:a8:17:c9:d4:b7:89:cb:25:a5:a5:ad:ef:2c:b8 Fingerprint (SHA-256): 1A:C9:EC:9B:0F:3D:EC:8D:FF:C3:02:DC:F6:78:B8:BE:DB:D0:BE:A6:D5:D4:0E:CF:33:B6:29:F7:A0:FF:A1:CA Fingerprint (SHA1): 20:64:9E:47:D5:99:4B:35:CE:D7:A5:D3:4D:EA:8E:3B:6A:82:2F:C0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #11850: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #11851: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, bob-ec@bogus.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u chain-1-clientCA ,, clientCA-dsa T,C,C clientCA-ec T,C,C chain-2-clientCA-ec ,, chain-2-clientCA-dsa ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, chain-1-clientCA-ec ,, clientCA T,C,C Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.v3.28098 -t Test2 -f ../tests.pw merge.sh: #11852: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests.v1.28098 -t Test1 -f ../tests.pw merge.sh: #11853: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #11854: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #11855: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #11856: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Mon Apr 25 19:35:25 2016 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Mon Apr 25 19:18:52 2016 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Mon Apr 25 19:35:17 2016 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #11857: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Mon Apr 25 20:19:56 UTC 2016 Checking if pkits should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Checking if chains should be skipped based on skip list [cipher libpkix dbupgrade sdr ocsp pkits ssl_gtests] Running tests for chains TIMESTAMP chains BEGIN: Mon Apr 25 20:19:56 UTC 2016 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #11858: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201957 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11859: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #11860: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #11861: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #11862: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11863: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11864: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11865: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #11866: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #11867: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11868: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11869: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11870: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #11871: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #11872: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11873: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11874: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11875: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #11876: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #11877: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11878: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11879: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11880: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #11881: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11882: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11883: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11884: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #11885: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11886: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11887: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11888: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #11889: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11890: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11891: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11892: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #11893: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11894: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11895: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11896: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #11897: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11898: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11899: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11900: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #11901: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11902: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11903: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11904: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #11905: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11906: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11907: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11908: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #11909: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11910: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11911: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11912: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #11913: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11914: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9719/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11915: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11916: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #11917: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11918: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9720 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #11919: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11920: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160425202334Z nextupdate=20170425202334Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Apr 25 20:23:34 2016 Next Update: Tue Apr 25 20:23:34 2017 CRL Extensions: chains.sh: #11921: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20160425202335Z addcert 2 20160425202335Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Mon Apr 25 20:23:35 2016 Next Update: Tue Apr 25 20:23:34 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 20:23:35 2016 CRL Extensions: chains.sh: #11922: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160425202336Z nextupdate=20170425202336Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Apr 25 20:23:36 2016 Next Update: Tue Apr 25 20:23:36 2017 CRL Extensions: chains.sh: #11923: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160425202337Z addcert 2 20160425202337Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Apr 25 20:23:37 2016 Next Update: Tue Apr 25 20:23:36 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 20:23:37 2016 CRL Extensions: chains.sh: #11924: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20160425202338Z addcert 4 20160425202338Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Mon Apr 25 20:23:38 2016 Next Update: Tue Apr 25 20:23:36 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 20:23:37 2016 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Mon Apr 25 20:23:38 2016 CRL Extensions: chains.sh: #11925: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160425202338Z nextupdate=20170425202338Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Apr 25 20:23:38 2016 Next Update: Tue Apr 25 20:23:38 2017 CRL Extensions: chains.sh: #11926: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160425202339Z addcert 2 20160425202339Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Apr 25 20:23:39 2016 Next Update: Tue Apr 25 20:23:38 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 20:23:39 2016 CRL Extensions: chains.sh: #11927: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20160425202340Z addcert 3 20160425202340Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Mon Apr 25 20:23:40 2016 Next Update: Tue Apr 25 20:23:38 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 20:23:39 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Apr 25 20:23:40 2016 CRL Extensions: chains.sh: #11928: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160425202341Z nextupdate=20170425202341Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Apr 25 20:23:41 2016 Next Update: Tue Apr 25 20:23:41 2017 CRL Extensions: chains.sh: #11929: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160425202342Z addcert 2 20160425202342Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Apr 25 20:23:42 2016 Next Update: Tue Apr 25 20:23:41 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 20:23:42 2016 CRL Extensions: chains.sh: #11930: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20160425202343Z addcert 3 20160425202343Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Mon Apr 25 20:23:43 2016 Next Update: Tue Apr 25 20:23:41 2017 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Mon Apr 25 20:23:42 2016 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Mon Apr 25 20:23:43 2016 CRL Extensions: chains.sh: #11931: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #11932: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #11933: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #11934: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #11935: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #11936: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #11937: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.21.0/dist/Linux4.4_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #11938: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #11939: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #11940: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #11941: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #11942: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #11943: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #11944: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #11945: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #11946: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #11947: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #11948: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #11949: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #11950: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #11951: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #11952: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #11953: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #11954: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #11955: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED httpserv starting at Mon Apr 25 20:24:02 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 20:24:02 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 16492 >/dev/null 2>/dev/null httpserv with PID 16492 found at Mon Apr 25 20:24:02 UTC 2016 httpserv with PID 16492 started at Mon Apr 25 20:24:02 UTC 2016 tstclnt -h localhost.localdomain -p 9719 -q -t 20 chains.sh: #11956: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201957 (0x19581125) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Apr 25 20:20:43 2016 Not After : Sun Apr 25 20:20:43 2066 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:53:92:fc:be:23:03:06:a6:44:cc:cf:ce:97:1f:2d: 75:8c:0c:72:91:60:0d:0d:cc:87:41:d9:01:be:57:62: 8c:42:4d:c3:27:73:57:82:f7:44:33:25:9e:eb:0a:f0: 70:47:c5:fa:ab:db:50:bf:da:a9:7b:ad:ea:7d:81:7c: cc:5f:b0:73:7f:82:46:12:3a:be:95:f4:7d:78:ab:93: 1f:f7:de:f9:2a:c5:75:11:19:00:e8:26:b9:ec:e0:fa: 8d:30:39:05:2e:95:61:2a:89:74:0c:34:bd:12:00:bd: 2f:2b:52:15:72:45:a1:2e:f4:f3:fe:77:e7:a7:08:05: d3:9f:44:0b:3a:c2:66:ac:64:f9:63:30:6c:46:1d:13: 39:78:3e:21:c0:06:64:2e:67:9f:83:79:be:1d:02:34: d4:10:28:88:2a:c9:fc:cb:dd:93:dc:7f:e3:e7:fa:ff: fd:da:a2:83:1e:19:cc:dc:e7:26:76:5f:76:28:78:a4: b5:ce:94:28:94:14:8e:f7:f4:32:cf:47:d3:54:cb:b5: 26:81:6e:c8:f7:96:75:78:f0:e6:d2:1f:62:3a:64:c0: de:04:f1:81:73:04:f1:1a:7a:00:39:28:e7:06:72:6e: 80:c6:7b:5b:02:9a:5d:37:17:3d:32:ad:3f:e5:78:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:5c:83:53:ae:0f:f9:71:7b:a0:4f:77:04:7a:8f:72: 8f:e0:65:cf:5e:0d:94:ea:ad:ff:a3:e1:91:d3:f8:0c: 37:98:cd:3a:86:85:aa:26:cb:98:f8:83:40:8c:ec:28: 74:7f:21:d6:88:da:eb:6b:06:3f:60:0d:b0:95:13:82: ca:e7:ae:af:27:92:b8:54:fd:e6:44:ac:e5:f2:b4:a6: 37:ac:6e:9c:0c:74:85:a2:7d:fc:e9:1b:2a:59:c3:b3: 78:ce:e1:01:11:2b:b6:9b:0c:16:4d:f5:c2:6d:a6:0a: 96:ca:3b:f0:79:8e:27:11:02:1c:72:17:2b:3f:ef:b3: e1:36:4f:b1:5e:bb:45:1a:38:b4:30:06:72:11:5d:27: 43:8f:55:4e:39:4b:6b:ea:6f:eb:1e:27:e2:b7:cb:db: f2:7c:87:55:b2:3e:2b:93:04:85:5f:65:17:dd:23:52: 27:85:d8:df:88:5a:2a:c2:46:e0:82:10:0f:61:a6:2c: 79:eb:4a:d9:ae:b0:03:44:3e:40:d6:4f:c3:b7:b9:95: 08:d9:85:f1:a1:0f:b5:3c:9b:d2:8d:ec:4e:39:83:9a: f9:a0:ff:38:10:53:3f:2a:7d:93:b0:2e:1d:f3:7c:ee: b5:2d:01:28:e7:90:02:9f:11:a7:8d:fd:b3:57:61:8f Fingerprint (SHA-256): C8:5B:3C:19:E5:3F:B3:62:38:85:0F:B6:7B:D6:98:CE:F2:24:40:26:CF:EF:5C:DD:F3:63:8C:A7:E7:AF:A0:29 Fingerprint (SHA1): 1D:AC:36:AA:74:A3:10:16:71:C9:8F:A1:9F:9F:8E:62:84:2A:1C:F6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #11957: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #11958: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #11959: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 16492 at Mon Apr 25 20:24:06 UTC 2016 kill -USR1 16492 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 16492 killed at Mon Apr 25 20:24:06 UTC 2016 httpserv starting at Mon Apr 25 20:24:06 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 20:24:06 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 16662 >/dev/null 2>/dev/null httpserv with PID 16662 found at Mon Apr 25 20:24:07 UTC 2016 httpserv with PID 16662 started at Mon Apr 25 20:24:07 UTC 2016 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #11960: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #11961: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #11962: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -h localhost.localdomain -p 9719 -q -t 20 chains.sh: #11963: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201957 (0x19581125) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Mon Apr 25 20:20:43 2016 Not After : Sun Apr 25 20:20:43 2066 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:53:92:fc:be:23:03:06:a6:44:cc:cf:ce:97:1f:2d: 75:8c:0c:72:91:60:0d:0d:cc:87:41:d9:01:be:57:62: 8c:42:4d:c3:27:73:57:82:f7:44:33:25:9e:eb:0a:f0: 70:47:c5:fa:ab:db:50:bf:da:a9:7b:ad:ea:7d:81:7c: cc:5f:b0:73:7f:82:46:12:3a:be:95:f4:7d:78:ab:93: 1f:f7:de:f9:2a:c5:75:11:19:00:e8:26:b9:ec:e0:fa: 8d:30:39:05:2e:95:61:2a:89:74:0c:34:bd:12:00:bd: 2f:2b:52:15:72:45:a1:2e:f4:f3:fe:77:e7:a7:08:05: d3:9f:44:0b:3a:c2:66:ac:64:f9:63:30:6c:46:1d:13: 39:78:3e:21:c0:06:64:2e:67:9f:83:79:be:1d:02:34: d4:10:28:88:2a:c9:fc:cb:dd:93:dc:7f:e3:e7:fa:ff: fd:da:a2:83:1e:19:cc:dc:e7:26:76:5f:76:28:78:a4: b5:ce:94:28:94:14:8e:f7:f4:32:cf:47:d3:54:cb:b5: 26:81:6e:c8:f7:96:75:78:f0:e6:d2:1f:62:3a:64:c0: de:04:f1:81:73:04:f1:1a:7a:00:39:28:e7:06:72:6e: 80:c6:7b:5b:02:9a:5d:37:17:3d:32:ad:3f:e5:78:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:5c:83:53:ae:0f:f9:71:7b:a0:4f:77:04:7a:8f:72: 8f:e0:65:cf:5e:0d:94:ea:ad:ff:a3:e1:91:d3:f8:0c: 37:98:cd:3a:86:85:aa:26:cb:98:f8:83:40:8c:ec:28: 74:7f:21:d6:88:da:eb:6b:06:3f:60:0d:b0:95:13:82: ca:e7:ae:af:27:92:b8:54:fd:e6:44:ac:e5:f2:b4:a6: 37:ac:6e:9c:0c:74:85:a2:7d:fc:e9:1b:2a:59:c3:b3: 78:ce:e1:01:11:2b:b6:9b:0c:16:4d:f5:c2:6d:a6:0a: 96:ca:3b:f0:79:8e:27:11:02:1c:72:17:2b:3f:ef:b3: e1:36:4f:b1:5e:bb:45:1a:38:b4:30:06:72:11:5d:27: 43:8f:55:4e:39:4b:6b:ea:6f:eb:1e:27:e2:b7:cb:db: f2:7c:87:55:b2:3e:2b:93:04:85:5f:65:17:dd:23:52: 27:85:d8:df:88:5a:2a:c2:46:e0:82:10:0f:61:a6:2c: 79:eb:4a:d9:ae:b0:03:44:3e:40:d6:4f:c3:b7:b9:95: 08:d9:85:f1:a1:0f:b5:3c:9b:d2:8d:ec:4e:39:83:9a: f9:a0:ff:38:10:53:3f:2a:7d:93:b0:2e:1d:f3:7c:ee: b5:2d:01:28:e7:90:02:9f:11:a7:8d:fd:b3:57:61:8f Fingerprint (SHA-256): C8:5B:3C:19:E5:3F:B3:62:38:85:0F:B6:7B:D6:98:CE:F2:24:40:26:CF:EF:5C:DD:F3:63:8C:A7:E7:AF:A0:29 Fingerprint (SHA1): 1D:AC:36:AA:74:A3:10:16:71:C9:8F:A1:9F:9F:8E:62:84:2A:1C:F6 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #11964: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #11965: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #11966: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 16662 at Mon Apr 25 20:24:13 UTC 2016 kill -USR1 16662 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 16662 killed at Mon Apr 25 20:24:13 UTC 2016 httpserv starting at Mon Apr 25 20:24:13 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 20:24:14 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 16909 >/dev/null 2>/dev/null httpserv with PID 16909 found at Mon Apr 25 20:24:14 UTC 2016 httpserv with PID 16909 started at Mon Apr 25 20:24:14 UTC 2016 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #11967: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #11968: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201958 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11969: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #11970: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #11971: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201959 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #11972: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #11973: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #11974: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11975: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425201960 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11976: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11977: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425201961 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11978: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11979: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #11980: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #11981: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #11982: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 425201962 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #11983: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #11984: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #11985: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #11986: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #11987: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201959 (0x19581127) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:24:28 2016 Not After : Sun Apr 25 20:24:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c4:5b:96:f2:11:be:1e:6c:e6:2f:36:e0:c8:6a:6a: be:79:25:86:09:c8:a5:eb:1b:99:09:03:73:c2:52:c5: 11:de:c0:50:59:af:bc:d7:94:8f:5e:09:a7:ac:f1:c8: 6d:89:35:a4:c5:4c:45:a2:0f:2b:00:21:8c:55:93:4a: 56:72:6a:b6:a5:c3:4e:cf:a9:c2:84:93:26:fb:67:38: 30:ff:10:06:7e:53:48:66:3e:a6:77:18:50:9e:fe:67: e7:e4:4d:82:f1:bf:28:5b:5e:55:44:50:77:36:2b:46: d1:a1:3f:83:95:19:a5:f5:1d:38:15:95:35:1a:c3:ec: 1e:c5:25:e9:24:cf:a9:a7:81:04:31:39:86:0d:0a:79: b4:7a:77:1a:13:e3:aa:0b:ea:49:71:29:96:e9:3e:dc: 56:9f:41:43:1a:e8:00:e1:15:51:51:8c:b7:9a:28:0b: f0:f9:6c:83:de:c6:93:cf:46:81:56:79:3c:73:4c:a0: 37:4c:2c:d3:8e:44:bc:d8:59:8c:67:54:92:dc:16:95: d3:7d:d0:bd:ee:89:35:95:84:4b:06:2c:a4:8a:01:ce: d1:24:0e:c2:a2:3f:ec:bb:e2:b0:b4:12:a3:c4:08:94: a9:64:7b:65:fc:f0:f1:03:f6:09:f3:cb:2d:6e:b5:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:ba:ba:39:36:b3:65:c7:3b:b8:37:64:94:83:62:cf: 3b:64:18:55:bb:a0:29:7e:dd:a9:dd:3d:d4:86:9d:d7: 6a:25:86:84:4b:c4:5a:9d:fb:b3:7e:7e:70:b5:7d:1f: a3:3c:a0:d3:bc:63:ed:2b:f7:7c:c7:8e:68:7d:4d:a9: c7:5b:8e:00:e4:d9:18:33:cb:7e:16:06:41:60:90:13: 94:c7:e3:8b:f1:44:6e:d8:22:8e:3e:0f:97:aa:e6:31: 22:85:07:53:6a:13:55:65:0f:a2:7f:7b:bc:86:d4:60: d1:d6:78:80:53:76:ea:a1:48:32:0d:e4:a5:6f:e5:b7: ad:90:71:33:e1:94:9c:16:85:e8:87:31:a3:b1:cc:39: 4a:be:63:ea:f6:08:d9:fb:48:f9:2e:4f:f5:61:8e:4d: ae:57:5e:b7:5c:eb:3c:b1:a5:22:ec:10:95:37:c5:9e: e1:94:9d:99:3c:d7:09:dd:f2:88:6f:85:af:32:c4:0c: 8a:0f:77:1c:e2:1f:1f:db:e0:c9:b0:b7:6d:cc:c1:9c: ca:4d:56:b0:e0:75:1f:96:49:dc:ba:fe:3f:b7:ec:48: 2e:21:d2:e0:f1:02:06:d0:e0:8c:3e:c0:88:e8:fa:b0: 98:80:d3:02:18:c5:39:0f:cd:eb:88:b2:99:1a:c5:20 Fingerprint (SHA-256): B0:C6:29:58:71:82:E2:A0:61:A4:2B:50:64:AA:30:37:94:84:8A:7F:A5:34:E5:90:E4:02:6D:FC:27:AE:25:1B Fingerprint (SHA1): 25:DA:47:10:75:51:A7:79:7B:78:80:40:C2:E8:D2:B0:5F:CF:6C:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11988: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201958 (0x19581126) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:24:20 2016 Not After : Sun Apr 25 20:24:20 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:b5:2d:3f:05:10:bf:04:d3:1c:50:4b:fc:8a:6b:1c: 9d:b9:78:99:20:bd:8a:26:5d:36:6e:66:5c:9f:f4:d1: fe:11:ef:cd:f8:92:32:fa:2f:39:cd:d6:c7:96:5f:d9: b9:91:eb:5a:b3:f1:82:d5:97:16:cc:16:d1:52:02:15: af:fc:59:72:91:92:75:e8:f8:44:8c:32:80:6d:fd:e9: 72:3c:17:55:da:54:5d:3e:00:56:cf:cf:5b:0e:b4:41: 77:eb:77:ea:aa:5c:cb:a3:ae:07:42:70:f7:cc:a9:54: 00:5e:04:93:42:df:92:e3:ee:44:66:e3:dd:8d:e4:41: 7c:92:0b:6c:79:dd:52:d9:2b:bd:33:1e:a9:d2:3a:81: 46:f5:51:16:1d:4d:a1:16:57:0f:34:ff:ea:97:17:f1: df:15:2e:e9:06:81:02:91:1c:7c:dd:2a:80:b0:a2:63: 00:52:3c:98:91:98:d6:23:c9:0e:53:93:82:e5:81:33: 20:06:aa:7a:f7:a2:78:f5:10:7c:6f:08:8e:b8:ca:6b: cd:c7:7c:80:d1:fa:55:f4:2b:88:34:c8:b6:f4:a2:33: 32:2d:3a:c2:80:0d:fa:74:00:6f:97:7d:c3:ea:e1:0f: 73:c4:79:bb:93:9a:b0:ca:42:1e:c3:3b:17:31:0d:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:a5:ab:cd:b8:d8:f2:fe:47:c4:9e:b9:0a:b0:ec:69: e8:85:c2:0d:00:e9:ad:71:fa:8c:cf:9d:3d:1a:70:20: 86:8d:45:17:0a:89:d8:8e:56:ca:f3:0e:a6:66:8c:b2: fc:3f:96:7d:67:5a:5c:db:ba:45:16:b7:ea:9b:f8:59: 21:cc:55:bc:c1:ce:34:53:ff:ba:c8:8b:19:14:43:80: fc:bd:95:15:4f:73:48:d1:17:11:e0:7c:fc:b1:d7:ea: 6c:8a:f1:43:de:8e:43:be:d4:3b:a9:2f:dc:27:a8:2a: 20:dc:a0:fa:c8:06:7a:6c:a2:95:17:ac:a4:e6:1b:0b: cd:ee:42:bc:52:b0:43:2c:7b:9c:ae:dd:cf:4f:52:58: 12:82:35:54:9a:de:58:f0:87:06:43:35:37:90:7f:c0: 81:b9:09:67:be:3a:64:bf:33:ab:a6:8e:6d:58:cc:1d: 6d:4f:56:d3:d1:4e:f5:67:4f:2a:49:85:a2:04:bf:4f: 02:c2:9e:19:b1:19:60:91:5a:2b:65:aa:50:9d:b9:e6: d2:02:df:55:f1:86:7f:6f:50:4e:4b:1f:cb:08:a0:0b: 5f:c7:ba:78:2e:4f:77:2d:11:cf:7a:93:e6:ad:5d:24: a1:2a:cc:07:df:79:4f:22:c5:3e:e6:e7:3b:2f:c9:e4 Fingerprint (SHA-256): C3:A8:E0:21:63:6B:6C:84:71:87:01:A5:D4:16:43:58:01:27:9E:DF:7C:1A:B5:78:EC:47:12:B7:BE:D8:CA:5A Fingerprint (SHA1): E6:F2:D0:A8:7F:60:03:D4:2F:64:92:57:26:02:15:33:EA:AC:7B:6B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11989: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #11990: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #11991: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #11992: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201958 (0x19581126) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:24:20 2016 Not After : Sun Apr 25 20:24:20 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:b5:2d:3f:05:10:bf:04:d3:1c:50:4b:fc:8a:6b:1c: 9d:b9:78:99:20:bd:8a:26:5d:36:6e:66:5c:9f:f4:d1: fe:11:ef:cd:f8:92:32:fa:2f:39:cd:d6:c7:96:5f:d9: b9:91:eb:5a:b3:f1:82:d5:97:16:cc:16:d1:52:02:15: af:fc:59:72:91:92:75:e8:f8:44:8c:32:80:6d:fd:e9: 72:3c:17:55:da:54:5d:3e:00:56:cf:cf:5b:0e:b4:41: 77:eb:77:ea:aa:5c:cb:a3:ae:07:42:70:f7:cc:a9:54: 00:5e:04:93:42:df:92:e3:ee:44:66:e3:dd:8d:e4:41: 7c:92:0b:6c:79:dd:52:d9:2b:bd:33:1e:a9:d2:3a:81: 46:f5:51:16:1d:4d:a1:16:57:0f:34:ff:ea:97:17:f1: df:15:2e:e9:06:81:02:91:1c:7c:dd:2a:80:b0:a2:63: 00:52:3c:98:91:98:d6:23:c9:0e:53:93:82:e5:81:33: 20:06:aa:7a:f7:a2:78:f5:10:7c:6f:08:8e:b8:ca:6b: cd:c7:7c:80:d1:fa:55:f4:2b:88:34:c8:b6:f4:a2:33: 32:2d:3a:c2:80:0d:fa:74:00:6f:97:7d:c3:ea:e1:0f: 73:c4:79:bb:93:9a:b0:ca:42:1e:c3:3b:17:31:0d:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:a5:ab:cd:b8:d8:f2:fe:47:c4:9e:b9:0a:b0:ec:69: e8:85:c2:0d:00:e9:ad:71:fa:8c:cf:9d:3d:1a:70:20: 86:8d:45:17:0a:89:d8:8e:56:ca:f3:0e:a6:66:8c:b2: fc:3f:96:7d:67:5a:5c:db:ba:45:16:b7:ea:9b:f8:59: 21:cc:55:bc:c1:ce:34:53:ff:ba:c8:8b:19:14:43:80: fc:bd:95:15:4f:73:48:d1:17:11:e0:7c:fc:b1:d7:ea: 6c:8a:f1:43:de:8e:43:be:d4:3b:a9:2f:dc:27:a8:2a: 20:dc:a0:fa:c8:06:7a:6c:a2:95:17:ac:a4:e6:1b:0b: cd:ee:42:bc:52:b0:43:2c:7b:9c:ae:dd:cf:4f:52:58: 12:82:35:54:9a:de:58:f0:87:06:43:35:37:90:7f:c0: 81:b9:09:67:be:3a:64:bf:33:ab:a6:8e:6d:58:cc:1d: 6d:4f:56:d3:d1:4e:f5:67:4f:2a:49:85:a2:04:bf:4f: 02:c2:9e:19:b1:19:60:91:5a:2b:65:aa:50:9d:b9:e6: d2:02:df:55:f1:86:7f:6f:50:4e:4b:1f:cb:08:a0:0b: 5f:c7:ba:78:2e:4f:77:2d:11:cf:7a:93:e6:ad:5d:24: a1:2a:cc:07:df:79:4f:22:c5:3e:e6:e7:3b:2f:c9:e4 Fingerprint (SHA-256): C3:A8:E0:21:63:6B:6C:84:71:87:01:A5:D4:16:43:58:01:27:9E:DF:7C:1A:B5:78:EC:47:12:B7:BE:D8:CA:5A Fingerprint (SHA1): E6:F2:D0:A8:7F:60:03:D4:2F:64:92:57:26:02:15:33:EA:AC:7B:6B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11993: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201959 (0x19581127) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:24:28 2016 Not After : Sun Apr 25 20:24:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c4:5b:96:f2:11:be:1e:6c:e6:2f:36:e0:c8:6a:6a: be:79:25:86:09:c8:a5:eb:1b:99:09:03:73:c2:52:c5: 11:de:c0:50:59:af:bc:d7:94:8f:5e:09:a7:ac:f1:c8: 6d:89:35:a4:c5:4c:45:a2:0f:2b:00:21:8c:55:93:4a: 56:72:6a:b6:a5:c3:4e:cf:a9:c2:84:93:26:fb:67:38: 30:ff:10:06:7e:53:48:66:3e:a6:77:18:50:9e:fe:67: e7:e4:4d:82:f1:bf:28:5b:5e:55:44:50:77:36:2b:46: d1:a1:3f:83:95:19:a5:f5:1d:38:15:95:35:1a:c3:ec: 1e:c5:25:e9:24:cf:a9:a7:81:04:31:39:86:0d:0a:79: b4:7a:77:1a:13:e3:aa:0b:ea:49:71:29:96:e9:3e:dc: 56:9f:41:43:1a:e8:00:e1:15:51:51:8c:b7:9a:28:0b: f0:f9:6c:83:de:c6:93:cf:46:81:56:79:3c:73:4c:a0: 37:4c:2c:d3:8e:44:bc:d8:59:8c:67:54:92:dc:16:95: d3:7d:d0:bd:ee:89:35:95:84:4b:06:2c:a4:8a:01:ce: d1:24:0e:c2:a2:3f:ec:bb:e2:b0:b4:12:a3:c4:08:94: a9:64:7b:65:fc:f0:f1:03:f6:09:f3:cb:2d:6e:b5:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:ba:ba:39:36:b3:65:c7:3b:b8:37:64:94:83:62:cf: 3b:64:18:55:bb:a0:29:7e:dd:a9:dd:3d:d4:86:9d:d7: 6a:25:86:84:4b:c4:5a:9d:fb:b3:7e:7e:70:b5:7d:1f: a3:3c:a0:d3:bc:63:ed:2b:f7:7c:c7:8e:68:7d:4d:a9: c7:5b:8e:00:e4:d9:18:33:cb:7e:16:06:41:60:90:13: 94:c7:e3:8b:f1:44:6e:d8:22:8e:3e:0f:97:aa:e6:31: 22:85:07:53:6a:13:55:65:0f:a2:7f:7b:bc:86:d4:60: d1:d6:78:80:53:76:ea:a1:48:32:0d:e4:a5:6f:e5:b7: ad:90:71:33:e1:94:9c:16:85:e8:87:31:a3:b1:cc:39: 4a:be:63:ea:f6:08:d9:fb:48:f9:2e:4f:f5:61:8e:4d: ae:57:5e:b7:5c:eb:3c:b1:a5:22:ec:10:95:37:c5:9e: e1:94:9d:99:3c:d7:09:dd:f2:88:6f:85:af:32:c4:0c: 8a:0f:77:1c:e2:1f:1f:db:e0:c9:b0:b7:6d:cc:c1:9c: ca:4d:56:b0:e0:75:1f:96:49:dc:ba:fe:3f:b7:ec:48: 2e:21:d2:e0:f1:02:06:d0:e0:8c:3e:c0:88:e8:fa:b0: 98:80:d3:02:18:c5:39:0f:cd:eb:88:b2:99:1a:c5:20 Fingerprint (SHA-256): B0:C6:29:58:71:82:E2:A0:61:A4:2B:50:64:AA:30:37:94:84:8A:7F:A5:34:E5:90:E4:02:6D:FC:27:AE:25:1B Fingerprint (SHA1): 25:DA:47:10:75:51:A7:79:7B:78:80:40:C2:E8:D2:B0:5F:CF:6C:21 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #11994: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #11995: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #11996: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #11997: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #11998: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #11999: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201959 (0x19581127) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:24:28 2016 Not After : Sun Apr 25 20:24:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c4:5b:96:f2:11:be:1e:6c:e6:2f:36:e0:c8:6a:6a: be:79:25:86:09:c8:a5:eb:1b:99:09:03:73:c2:52:c5: 11:de:c0:50:59:af:bc:d7:94:8f:5e:09:a7:ac:f1:c8: 6d:89:35:a4:c5:4c:45:a2:0f:2b:00:21:8c:55:93:4a: 56:72:6a:b6:a5:c3:4e:cf:a9:c2:84:93:26:fb:67:38: 30:ff:10:06:7e:53:48:66:3e:a6:77:18:50:9e:fe:67: e7:e4:4d:82:f1:bf:28:5b:5e:55:44:50:77:36:2b:46: d1:a1:3f:83:95:19:a5:f5:1d:38:15:95:35:1a:c3:ec: 1e:c5:25:e9:24:cf:a9:a7:81:04:31:39:86:0d:0a:79: b4:7a:77:1a:13:e3:aa:0b:ea:49:71:29:96:e9:3e:dc: 56:9f:41:43:1a:e8:00:e1:15:51:51:8c:b7:9a:28:0b: f0:f9:6c:83:de:c6:93:cf:46:81:56:79:3c:73:4c:a0: 37:4c:2c:d3:8e:44:bc:d8:59:8c:67:54:92:dc:16:95: d3:7d:d0:bd:ee:89:35:95:84:4b:06:2c:a4:8a:01:ce: d1:24:0e:c2:a2:3f:ec:bb:e2:b0:b4:12:a3:c4:08:94: a9:64:7b:65:fc:f0:f1:03:f6:09:f3:cb:2d:6e:b5:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:ba:ba:39:36:b3:65:c7:3b:b8:37:64:94:83:62:cf: 3b:64:18:55:bb:a0:29:7e:dd:a9:dd:3d:d4:86:9d:d7: 6a:25:86:84:4b:c4:5a:9d:fb:b3:7e:7e:70:b5:7d:1f: a3:3c:a0:d3:bc:63:ed:2b:f7:7c:c7:8e:68:7d:4d:a9: c7:5b:8e:00:e4:d9:18:33:cb:7e:16:06:41:60:90:13: 94:c7:e3:8b:f1:44:6e:d8:22:8e:3e:0f:97:aa:e6:31: 22:85:07:53:6a:13:55:65:0f:a2:7f:7b:bc:86:d4:60: d1:d6:78:80:53:76:ea:a1:48:32:0d:e4:a5:6f:e5:b7: ad:90:71:33:e1:94:9c:16:85:e8:87:31:a3:b1:cc:39: 4a:be:63:ea:f6:08:d9:fb:48:f9:2e:4f:f5:61:8e:4d: ae:57:5e:b7:5c:eb:3c:b1:a5:22:ec:10:95:37:c5:9e: e1:94:9d:99:3c:d7:09:dd:f2:88:6f:85:af:32:c4:0c: 8a:0f:77:1c:e2:1f:1f:db:e0:c9:b0:b7:6d:cc:c1:9c: ca:4d:56:b0:e0:75:1f:96:49:dc:ba:fe:3f:b7:ec:48: 2e:21:d2:e0:f1:02:06:d0:e0:8c:3e:c0:88:e8:fa:b0: 98:80:d3:02:18:c5:39:0f:cd:eb:88:b2:99:1a:c5:20 Fingerprint (SHA-256): B0:C6:29:58:71:82:E2:A0:61:A4:2B:50:64:AA:30:37:94:84:8A:7F:A5:34:E5:90:E4:02:6D:FC:27:AE:25:1B Fingerprint (SHA1): 25:DA:47:10:75:51:A7:79:7B:78:80:40:C2:E8:D2:B0:5F:CF:6C:21 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12000: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201959 (0x19581127) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:24:28 2016 Not After : Sun Apr 25 20:24:28 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c4:5b:96:f2:11:be:1e:6c:e6:2f:36:e0:c8:6a:6a: be:79:25:86:09:c8:a5:eb:1b:99:09:03:73:c2:52:c5: 11:de:c0:50:59:af:bc:d7:94:8f:5e:09:a7:ac:f1:c8: 6d:89:35:a4:c5:4c:45:a2:0f:2b:00:21:8c:55:93:4a: 56:72:6a:b6:a5:c3:4e:cf:a9:c2:84:93:26:fb:67:38: 30:ff:10:06:7e:53:48:66:3e:a6:77:18:50:9e:fe:67: e7:e4:4d:82:f1:bf:28:5b:5e:55:44:50:77:36:2b:46: d1:a1:3f:83:95:19:a5:f5:1d:38:15:95:35:1a:c3:ec: 1e:c5:25:e9:24:cf:a9:a7:81:04:31:39:86:0d:0a:79: b4:7a:77:1a:13:e3:aa:0b:ea:49:71:29:96:e9:3e:dc: 56:9f:41:43:1a:e8:00:e1:15:51:51:8c:b7:9a:28:0b: f0:f9:6c:83:de:c6:93:cf:46:81:56:79:3c:73:4c:a0: 37:4c:2c:d3:8e:44:bc:d8:59:8c:67:54:92:dc:16:95: d3:7d:d0:bd:ee:89:35:95:84:4b:06:2c:a4:8a:01:ce: d1:24:0e:c2:a2:3f:ec:bb:e2:b0:b4:12:a3:c4:08:94: a9:64:7b:65:fc:f0:f1:03:f6:09:f3:cb:2d:6e:b5:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:ba:ba:39:36:b3:65:c7:3b:b8:37:64:94:83:62:cf: 3b:64:18:55:bb:a0:29:7e:dd:a9:dd:3d:d4:86:9d:d7: 6a:25:86:84:4b:c4:5a:9d:fb:b3:7e:7e:70:b5:7d:1f: a3:3c:a0:d3:bc:63:ed:2b:f7:7c:c7:8e:68:7d:4d:a9: c7:5b:8e:00:e4:d9:18:33:cb:7e:16:06:41:60:90:13: 94:c7:e3:8b:f1:44:6e:d8:22:8e:3e:0f:97:aa:e6:31: 22:85:07:53:6a:13:55:65:0f:a2:7f:7b:bc:86:d4:60: d1:d6:78:80:53:76:ea:a1:48:32:0d:e4:a5:6f:e5:b7: ad:90:71:33:e1:94:9c:16:85:e8:87:31:a3:b1:cc:39: 4a:be:63:ea:f6:08:d9:fb:48:f9:2e:4f:f5:61:8e:4d: ae:57:5e:b7:5c:eb:3c:b1:a5:22:ec:10:95:37:c5:9e: e1:94:9d:99:3c:d7:09:dd:f2:88:6f:85:af:32:c4:0c: 8a:0f:77:1c:e2:1f:1f:db:e0:c9:b0:b7:6d:cc:c1:9c: ca:4d:56:b0:e0:75:1f:96:49:dc:ba:fe:3f:b7:ec:48: 2e:21:d2:e0:f1:02:06:d0:e0:8c:3e:c0:88:e8:fa:b0: 98:80:d3:02:18:c5:39:0f:cd:eb:88:b2:99:1a:c5:20 Fingerprint (SHA-256): B0:C6:29:58:71:82:E2:A0:61:A4:2B:50:64:AA:30:37:94:84:8A:7F:A5:34:E5:90:E4:02:6D:FC:27:AE:25:1B Fingerprint (SHA1): 25:DA:47:10:75:51:A7:79:7B:78:80:40:C2:E8:D2:B0:5F:CF:6C:21 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12001: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #12002: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #12003: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #12004: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #12005: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #12006: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201958 (0x19581126) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:24:20 2016 Not After : Sun Apr 25 20:24:20 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:b5:2d:3f:05:10:bf:04:d3:1c:50:4b:fc:8a:6b:1c: 9d:b9:78:99:20:bd:8a:26:5d:36:6e:66:5c:9f:f4:d1: fe:11:ef:cd:f8:92:32:fa:2f:39:cd:d6:c7:96:5f:d9: b9:91:eb:5a:b3:f1:82:d5:97:16:cc:16:d1:52:02:15: af:fc:59:72:91:92:75:e8:f8:44:8c:32:80:6d:fd:e9: 72:3c:17:55:da:54:5d:3e:00:56:cf:cf:5b:0e:b4:41: 77:eb:77:ea:aa:5c:cb:a3:ae:07:42:70:f7:cc:a9:54: 00:5e:04:93:42:df:92:e3:ee:44:66:e3:dd:8d:e4:41: 7c:92:0b:6c:79:dd:52:d9:2b:bd:33:1e:a9:d2:3a:81: 46:f5:51:16:1d:4d:a1:16:57:0f:34:ff:ea:97:17:f1: df:15:2e:e9:06:81:02:91:1c:7c:dd:2a:80:b0:a2:63: 00:52:3c:98:91:98:d6:23:c9:0e:53:93:82:e5:81:33: 20:06:aa:7a:f7:a2:78:f5:10:7c:6f:08:8e:b8:ca:6b: cd:c7:7c:80:d1:fa:55:f4:2b:88:34:c8:b6:f4:a2:33: 32:2d:3a:c2:80:0d:fa:74:00:6f:97:7d:c3:ea:e1:0f: 73:c4:79:bb:93:9a:b0:ca:42:1e:c3:3b:17:31:0d:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:a5:ab:cd:b8:d8:f2:fe:47:c4:9e:b9:0a:b0:ec:69: e8:85:c2:0d:00:e9:ad:71:fa:8c:cf:9d:3d:1a:70:20: 86:8d:45:17:0a:89:d8:8e:56:ca:f3:0e:a6:66:8c:b2: fc:3f:96:7d:67:5a:5c:db:ba:45:16:b7:ea:9b:f8:59: 21:cc:55:bc:c1:ce:34:53:ff:ba:c8:8b:19:14:43:80: fc:bd:95:15:4f:73:48:d1:17:11:e0:7c:fc:b1:d7:ea: 6c:8a:f1:43:de:8e:43:be:d4:3b:a9:2f:dc:27:a8:2a: 20:dc:a0:fa:c8:06:7a:6c:a2:95:17:ac:a4:e6:1b:0b: cd:ee:42:bc:52:b0:43:2c:7b:9c:ae:dd:cf:4f:52:58: 12:82:35:54:9a:de:58:f0:87:06:43:35:37:90:7f:c0: 81:b9:09:67:be:3a:64:bf:33:ab:a6:8e:6d:58:cc:1d: 6d:4f:56:d3:d1:4e:f5:67:4f:2a:49:85:a2:04:bf:4f: 02:c2:9e:19:b1:19:60:91:5a:2b:65:aa:50:9d:b9:e6: d2:02:df:55:f1:86:7f:6f:50:4e:4b:1f:cb:08:a0:0b: 5f:c7:ba:78:2e:4f:77:2d:11:cf:7a:93:e6:ad:5d:24: a1:2a:cc:07:df:79:4f:22:c5:3e:e6:e7:3b:2f:c9:e4 Fingerprint (SHA-256): C3:A8:E0:21:63:6B:6C:84:71:87:01:A5:D4:16:43:58:01:27:9E:DF:7C:1A:B5:78:EC:47:12:B7:BE:D8:CA:5A Fingerprint (SHA1): E6:F2:D0:A8:7F:60:03:D4:2F:64:92:57:26:02:15:33:EA:AC:7B:6B Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12007: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201958 (0x19581126) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:24:20 2016 Not After : Sun Apr 25 20:24:20 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:b5:2d:3f:05:10:bf:04:d3:1c:50:4b:fc:8a:6b:1c: 9d:b9:78:99:20:bd:8a:26:5d:36:6e:66:5c:9f:f4:d1: fe:11:ef:cd:f8:92:32:fa:2f:39:cd:d6:c7:96:5f:d9: b9:91:eb:5a:b3:f1:82:d5:97:16:cc:16:d1:52:02:15: af:fc:59:72:91:92:75:e8:f8:44:8c:32:80:6d:fd:e9: 72:3c:17:55:da:54:5d:3e:00:56:cf:cf:5b:0e:b4:41: 77:eb:77:ea:aa:5c:cb:a3:ae:07:42:70:f7:cc:a9:54: 00:5e:04:93:42:df:92:e3:ee:44:66:e3:dd:8d:e4:41: 7c:92:0b:6c:79:dd:52:d9:2b:bd:33:1e:a9:d2:3a:81: 46:f5:51:16:1d:4d:a1:16:57:0f:34:ff:ea:97:17:f1: df:15:2e:e9:06:81:02:91:1c:7c:dd:2a:80:b0:a2:63: 00:52:3c:98:91:98:d6:23:c9:0e:53:93:82:e5:81:33: 20:06:aa:7a:f7:a2:78:f5:10:7c:6f:08:8e:b8:ca:6b: cd:c7:7c:80:d1:fa:55:f4:2b:88:34:c8:b6:f4:a2:33: 32:2d:3a:c2:80:0d:fa:74:00:6f:97:7d:c3:ea:e1:0f: 73:c4:79:bb:93:9a:b0:ca:42:1e:c3:3b:17:31:0d:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:a5:ab:cd:b8:d8:f2:fe:47:c4:9e:b9:0a:b0:ec:69: e8:85:c2:0d:00:e9:ad:71:fa:8c:cf:9d:3d:1a:70:20: 86:8d:45:17:0a:89:d8:8e:56:ca:f3:0e:a6:66:8c:b2: fc:3f:96:7d:67:5a:5c:db:ba:45:16:b7:ea:9b:f8:59: 21:cc:55:bc:c1:ce:34:53:ff:ba:c8:8b:19:14:43:80: fc:bd:95:15:4f:73:48:d1:17:11:e0:7c:fc:b1:d7:ea: 6c:8a:f1:43:de:8e:43:be:d4:3b:a9:2f:dc:27:a8:2a: 20:dc:a0:fa:c8:06:7a:6c:a2:95:17:ac:a4:e6:1b:0b: cd:ee:42:bc:52:b0:43:2c:7b:9c:ae:dd:cf:4f:52:58: 12:82:35:54:9a:de:58:f0:87:06:43:35:37:90:7f:c0: 81:b9:09:67:be:3a:64:bf:33:ab:a6:8e:6d:58:cc:1d: 6d:4f:56:d3:d1:4e:f5:67:4f:2a:49:85:a2:04:bf:4f: 02:c2:9e:19:b1:19:60:91:5a:2b:65:aa:50:9d:b9:e6: d2:02:df:55:f1:86:7f:6f:50:4e:4b:1f:cb:08:a0:0b: 5f:c7:ba:78:2e:4f:77:2d:11:cf:7a:93:e6:ad:5d:24: a1:2a:cc:07:df:79:4f:22:c5:3e:e6:e7:3b:2f:c9:e4 Fingerprint (SHA-256): C3:A8:E0:21:63:6B:6C:84:71:87:01:A5:D4:16:43:58:01:27:9E:DF:7C:1A:B5:78:EC:47:12:B7:BE:D8:CA:5A Fingerprint (SHA1): E6:F2:D0:A8:7F:60:03:D4:2F:64:92:57:26:02:15:33:EA:AC:7B:6B Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12008: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #12009: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201963 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12010: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #12011: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #12012: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201964 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12013: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #12014: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #12015: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201965 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12016: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #12017: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #12018: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201966 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12019: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #12020: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #12021: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201967 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12022: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #12023: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #12024: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201968 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12025: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #12026: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #12027: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201969 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12028: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #12029: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #12030: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201970 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12031: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #12032: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #12033: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201971 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12034: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #12035: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #12036: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12037: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 425201972 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12038: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12039: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 425201973 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12040: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12041: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 425201974 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12042: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12043: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #12044: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #12045: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12046: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 425201975 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12047: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12048: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 425201976 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12049: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12050: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 425201977 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12051: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12052: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #12053: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #12054: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12055: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 425201978 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12056: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12057: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 425201979 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12058: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12059: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 425201980 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12060: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12061: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #12062: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #12063: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12064: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 425201981 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12065: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12066: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 425201982 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12067: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12068: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 425201983 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12069: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12070: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #12071: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12072: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12073: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 425201984 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12074: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12075: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12076: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12077: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425201985 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12078: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12079: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201963 (0x1958112b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Apr 25 20:25:32 2016 Not After : Sun Apr 25 20:25:32 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:04:00:0b:18:bf:b0:c9:78:65:49:54:62:41:0b:fc: ec:ab:f9:56:aa:15:41:8a:45:05:b6:06:ec:11:ec:be: 97:f1:5d:e0:25:70:ed:eb:00:c1:ea:19:fd:38:06:ed: 17:83:7e:74:f9:49:e9:4f:16:2e:25:9a:b8:2a:05:a5: 50:0c:e5:c6:2e:88:6c:63:47:bb:dc:a6:7f:d7:67:8d: 55:ff:38:ec:e0:b9:5b:d4:7a:af:28:8d:82:37:fa:22: 9f:f0:d4:e1:ab:39:e6:7f:b4:d3:fd:b6:2a:8c:30:bd: 66:1b:49:85:ac:54:e6:8f:8b:6a:60:b4:61:64:34:9c: b2:ea:ce:66:03:54:38:4b:5a:b2:78:75:05:c8:de:f7: ac:72:23:4e:07:ba:ca:01:ab:04:db:f9:f9:c3:fa:30: 3f:b9:1e:04:07:47:57:27:88:89:29:ce:14:ae:41:71: cc:08:e8:8f:d9:f7:4f:16:e4:5a:56:27:f0:42:6f:9d: 35:ad:e7:b6:19:15:06:35:d0:6c:2a:5d:41:2b:d1:0d: 2e:de:11:d0:7a:da:79:72:d9:97:76:df:2b:05:33:a9: 71:59:e4:16:0d:35:da:fc:69:0e:c8:49:ff:ad:30:42: 41:40:d6:12:5c:04:7c:31:ad:df:46:da:e4:26:dc:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:73:45:69:c6:08:23:0a:94:9e:f4:b6:84:d7:2c:f6: 09:6b:3a:08:8b:35:77:52:24:bb:f3:40:77:25:23:97: 13:c4:99:e5:9c:26:2b:8f:29:5a:df:ea:6d:51:da:51: e3:f6:33:8e:06:17:80:7e:29:59:da:03:ff:8d:e6:d3: c4:ec:5c:64:78:0c:5a:5a:e6:b1:89:4e:af:b5:4d:fa: d5:f8:46:fe:66:ef:36:07:73:01:ba:fa:e8:aa:d7:73: 33:d1:9b:cb:e3:51:d0:db:c8:70:52:9a:ab:ca:47:f6: 21:3e:8c:8c:f2:ab:9d:e2:b6:c9:f6:0b:1a:af:0b:1f: 83:91:35:2e:28:a8:d8:d1:38:f5:9b:ea:0e:be:40:55: 97:58:cf:5b:4f:e9:b0:f1:aa:4d:37:cb:67:c2:44:b9: e1:7a:d9:ab:f8:25:06:13:d3:fe:07:e5:c1:2c:b4:33: bb:70:e9:2e:97:b1:67:e9:b0:bf:60:fd:0b:76:e2:6b: 31:18:43:76:e3:fa:21:29:f3:b3:42:0f:5b:d6:3c:b1: 21:4d:4d:0e:70:94:f5:62:0e:38:9e:52:8f:53:49:9f: 9e:6b:10:c6:14:af:aa:fd:31:79:6c:ef:7a:45:b4:55: bd:05:cc:0a:03:e6:52:7c:55:8f:3b:a0:05:0f:66:cd Fingerprint (SHA-256): A7:93:5C:DE:24:BC:A4:E0:72:17:EE:09:D9:4A:EB:4D:28:58:F4:2E:94:20:87:6D:53:C3:BE:1F:65:A8:38:2D Fingerprint (SHA1): 45:01:B3:F9:A0:E9:10:51:CC:2A:6B:51:C5:A5:E0:A0:41:E5:95:D7 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #12080: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201964 (0x1958112c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Apr 25 20:25:50 2016 Not After : Sun Apr 25 20:25:50 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:00:df:a6:43:c9:d2:40:a4:0d:4a:6e:c2:a4:db:f0: ce:ed:db:3d:17:6e:32:42:23:e0:98:41:e4:54:76:30: f6:49:b3:bd:f6:75:ba:b1:a2:9a:77:73:f6:ab:d6:07: 27:3e:2f:c5:96:15:10:8d:34:4f:11:b4:19:f9:4c:4b: 87:a9:84:13:d8:78:6f:6a:b2:d4:47:24:d3:00:ac:a5: 25:ae:e9:bb:9e:ba:80:33:59:44:db:46:5b:0c:c4:d3: 52:10:55:34:60:6d:32:1f:8d:93:10:97:b8:37:bb:f1: 51:83:1b:9a:d6:5c:ab:b0:f4:c7:de:a1:3c:6b:b4:3c: d0:c5:1c:b6:45:8d:50:ca:3c:7d:be:97:43:13:61:93: e9:01:b1:5b:20:d3:f9:f6:20:e0:53:b1:61:10:ef:84: c0:2c:e4:37:21:ec:86:b1:24:13:c0:69:c9:98:f9:38: 85:af:6c:fd:27:87:9b:27:75:0e:3b:4c:44:a1:c8:b8: c5:45:9a:cc:54:aa:49:48:2f:87:da:f9:f0:9b:05:a3: 68:08:af:fd:e6:16:2a:0a:98:57:96:ee:f6:9f:04:9e: 1a:da:a7:17:8c:d8:e8:2e:2d:0f:26:c9:ad:69:c6:37: 4f:eb:e1:c4:79:62:ec:15:45:49:68:b1:4c:8a:5d:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:28:68:8a:71:59:f2:bd:73:2c:4a:90:e9:5d:fb:4f: 61:4d:e4:80:bd:03:70:28:b3:2c:e3:2b:e7:c2:46:4b: f5:ae:92:38:1a:1d:62:ed:3d:a0:1a:08:cf:1c:58:3e: 89:92:ed:e4:21:5d:10:84:7d:6e:2a:91:51:c7:9c:ce: 8a:7b:7c:6f:4d:97:47:96:79:dc:90:af:7c:13:a9:d6: d2:fb:e6:f3:13:cf:c5:d4:f0:d0:2b:4e:7e:36:e3:7f: dc:83:0f:a4:4a:ed:4d:0a:a5:cb:f0:c1:e9:ee:3f:94: ba:54:24:95:d2:87:2f:ab:33:07:c5:0b:ad:62:f9:bc: 32:e4:83:00:ee:e7:6d:51:e3:27:ca:a6:3f:f1:e9:dd: 02:87:b9:7f:b9:81:b7:2d:28:21:8c:b9:dd:0a:9d:c0: a6:38:9d:1b:f4:f6:33:ff:32:8c:46:02:ab:d2:ec:62: 5e:42:fa:6b:d6:1b:65:1d:c1:7c:cb:54:41:14:a4:8f: ef:9f:d6:3d:b9:bb:9d:c7:b2:4a:d0:92:9a:65:a0:41: ef:9d:a7:b9:47:10:e4:c0:58:0a:a2:fb:ee:80:20:f1: 0e:3d:5d:fc:a9:88:6b:f4:14:b9:fe:a6:55:3a:aa:33: bf:b8:54:6f:10:c8:ae:8c:3d:9a:e0:40:76:c4:20:dc Fingerprint (SHA-256): FB:E0:EE:03:E9:C0:8B:BC:E6:2B:B9:A3:64:AA:52:F7:C1:9C:C4:A7:B8:72:AA:05:60:BB:8C:03:3E:6A:61:9D Fingerprint (SHA1): 88:2C:CC:37:1E:33:3D:24:A0:90:A6:6E:DD:B6:56:0E:63:B1:E8:C0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #12081: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201965 (0x1958112d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Apr 25 20:25:57 2016 Not After : Sun Apr 25 20:25:57 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:04:87:5c:2c:63:f3:ad:1a:ca:70:b7:84:b7:34:bf: d9:fc:e0:80:ea:ae:ca:f4:cb:66:4f:17:b6:94:22:eb: 6a:9e:48:fb:e9:2d:aa:1a:17:31:21:30:5f:c5:fd:3c: 69:c0:b1:7b:20:14:fd:64:20:22:cd:1a:15:78:51:ba: df:f9:02:16:61:2c:20:81:6f:4f:93:a0:7c:84:3c:84: 8a:e6:30:80:57:85:9c:41:44:1f:1d:1d:c8:25:56:d5: 6e:ca:e3:6f:bb:42:18:08:e3:14:2e:f1:cc:30:38:f0: 0d:61:7a:ff:17:d9:0a:14:97:f6:77:16:77:6f:4c:07: 36:8f:10:d3:6a:85:16:54:dd:1b:ab:7e:70:10:6d:1c: 90:c7:61:29:18:bc:9a:37:74:cd:05:ef:ba:f0:44:3f: e1:a7:e9:9a:fd:74:3c:9f:16:ce:11:64:40:4d:18:e8: c7:5f:d4:9e:7d:6b:4b:e1:29:58:f4:80:74:f8:4a:1a: 67:31:aa:2f:f7:01:bc:82:76:7c:90:ff:38:49:29:77: e4:ec:84:da:53:ff:f4:a9:02:1b:39:6e:e4:36:15:28: 6f:1f:d9:fc:bf:f6:da:a0:5c:89:d0:55:95:36:6b:b9: 98:13:1f:65:be:f7:fb:ad:ba:53:fe:cb:51:38:aa:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:e7:3e:8e:7b:a9:2c:88:af:d8:7f:72:a6:80:97:05: 4f:0b:8f:3c:08:d4:0b:42:dc:d7:4f:23:5c:cf:b4:d6: a2:94:95:86:f3:88:f7:b9:2a:a7:68:37:cb:e2:07:3e: 9f:e8:d7:4f:ab:da:3e:9b:0e:da:fd:15:4e:9b:62:5c: 78:43:3a:d2:7e:5a:21:9c:de:cd:f8:11:3a:0c:7e:13: 63:e5:fd:33:7e:15:c9:53:cc:2a:00:74:e7:73:8e:4c: e8:84:a3:40:43:c8:a5:b9:c0:32:b8:f4:d1:c0:bd:bc: 39:d8:87:39:31:91:4f:a7:c2:b9:3a:0b:29:b1:50:64: 05:a8:93:36:2c:1d:f6:f7:fb:f2:5f:dc:b1:b0:50:53: 4d:ca:f3:23:03:32:6b:15:37:34:16:d4:56:5e:0e:21: 99:48:3f:fc:d8:25:e6:66:23:c3:55:1b:3e:38:df:0c: a6:3f:ec:25:f2:6b:be:b5:1a:4c:3c:c4:e0:3e:25:f4: 63:f8:af:13:ad:0f:65:30:b5:98:5a:63:17:8f:83:19: 0e:76:2e:3e:1f:d9:d8:68:23:0a:73:f8:bc:8a:d7:d6: 5c:c4:9f:56:f0:13:c3:15:17:ae:33:65:aa:51:24:b5: a8:20:f4:5c:58:31:c0:cc:9a:70:77:6c:3c:db:84:22 Fingerprint (SHA-256): 75:CB:0F:1F:52:E6:03:CE:88:E4:44:C5:B9:6E:71:BC:93:EE:E9:AC:AF:0E:63:29:91:A3:EA:33:79:AB:C7:C5 Fingerprint (SHA1): 1D:6C:F2:B9:6A:92:DC:2C:4F:09:8D:3C:BC:AA:65:A9:AC:94:35:B2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #12082: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201966 (0x1958112e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Apr 25 20:26:22 2016 Not After : Sun Apr 25 20:26:22 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:04:3d:7e:7a:6b:d1:08:04:b3:61:ff:b7:88:f2:c2: 0a:fd:22:09:02:0f:f4:ab:69:63:05:ca:fa:29:28:44: 81:39:a5:a9:ed:5f:9b:3b:51:aa:ee:94:40:fa:2e:a7: a7:aa:68:8b:cd:d8:6b:90:27:13:b8:68:4f:f3:5c:1f: 70:95:bc:12:56:6e:91:e3:22:34:77:90:27:85:1b:ab: ff:30:fd:ab:77:08:ee:41:95:af:ae:fd:75:c5:9d:46: 6a:1a:1e:14:82:8c:b7:c1:d1:37:2f:a2:16:3b:32:0f: e6:7c:88:f8:ff:76:44:52:fa:40:d5:0d:ef:c7:e3:8e: 46:78:bd:e3:e0:1c:b2:3c:5d:1c:73:20:35:c8:03:31: 16:64:c3:05:24:0d:60:f7:9c:1c:d8:1c:33:fb:a0:16: c6:d7:9d:26:8b:68:50:c4:55:38:b3:48:40:dd:9d:00: fa:59:3e:a4:43:cf:89:d2:62:61:c2:17:be:bc:f9:aa: 78:04:3a:71:fe:e1:3c:22:b6:4a:1a:95:8a:06:06:0a: 26:f8:5c:9b:b2:a2:d5:d9:9e:84:6b:cd:8e:83:dd:dc: 23:28:97:d3:d5:6a:83:b7:b5:63:08:d1:bd:2c:3d:72: 70:ad:8a:0b:a3:10:d8:e0:ba:4e:69:b2:27:f1:dc:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:a5:eb:0d:7e:da:0e:08:82:92:67:9d:92:5a:51:ea: 77:f8:58:23:75:fe:f5:40:d4:6d:fb:53:33:bf:f5:bb: 28:fa:ee:3e:0c:e2:48:5b:37:94:54:d2:73:da:7c:d2: 53:5a:62:c8:0f:ed:9b:45:9a:11:70:17:b5:8f:f0:03: df:92:dc:3e:f0:b5:a8:58:c7:27:1a:89:e2:7b:31:89: 4c:9c:82:25:b3:d8:dc:4d:29:c9:86:3e:5a:8f:39:4b: cc:b7:b6:8c:8d:9a:ea:d8:e2:cc:34:f2:55:67:63:c1: af:68:d0:04:8b:85:55:97:23:cc:42:df:48:10:3c:75: 76:be:db:36:2b:aa:b5:4d:c8:60:30:96:26:4f:9c:6b: a0:25:ec:c8:a2:f5:26:94:23:de:34:60:3a:ca:0c:d2: 18:1d:8f:f3:a9:d1:00:00:a0:07:c2:6f:41:ea:94:e7: b0:59:42:ca:48:0d:a5:8e:72:ca:ca:a1:36:89:cb:a1: 26:06:0d:45:02:a5:08:17:46:d4:9a:ed:b9:69:c0:01: 67:de:1b:71:74:a5:fd:32:30:bf:08:e3:a4:91:59:51: 0d:25:c6:cd:1c:51:87:16:24:d8:8a:02:be:1e:76:cb: 0b:fe:c1:41:31:aa:cc:54:72:42:a5:1b:29:db:f1:a0 Fingerprint (SHA-256): 9B:2F:BA:B1:83:7F:07:1A:C0:97:4F:22:61:37:A2:7B:0F:79:FE:6A:CC:34:A4:17:0A:DB:4F:A9:10:6C:FE:02 Fingerprint (SHA1): D4:F2:0F:68:50:E8:53:BF:17:6F:B4:DD:3B:C9:2B:5B:FE:12:9E:8C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #12083: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201967 (0x1958112f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Apr 25 20:26:28 2016 Not After : Sun Apr 25 20:26:28 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:bb:67:aa:55:9d:2b:6e:3c:19:d3:38:7d:36:42:05: b2:4d:d2:96:50:78:ce:4c:13:69:fa:01:c9:84:d7:5f: 6f:9d:ba:82:05:26:99:f7:13:b8:ac:68:fa:02:3b:c5: 79:19:9b:d3:06:3f:c2:62:73:ec:4c:1b:21:4c:54:7b: 69:4b:2a:67:9d:be:de:b8:aa:46:c3:ee:90:d0:3e:f6: 37:21:06:30:c3:79:12:8b:8f:12:24:84:07:7f:25:9f: 54:3f:9a:40:a0:87:e4:0f:ba:af:90:f6:c8:08:6e:1d: 77:fe:ef:60:36:eb:91:d6:e8:39:35:74:e8:93:dc:2d: b3:aa:fb:4e:00:86:43:4b:bb:46:8c:70:3b:82:60:d0: fa:35:6d:07:fe:58:ba:15:3d:51:7b:ce:8c:08:44:35: 08:da:6d:f5:fc:96:24:a5:97:48:c0:f2:4c:04:70:df: 44:98:1e:9e:65:90:8f:b7:de:54:46:7f:2a:10:0a:99: 12:27:6e:2f:9e:4b:e4:ca:75:82:18:25:0a:39:27:02: 92:23:69:89:08:40:72:7d:93:7c:27:d7:52:0f:8a:d9: 47:3a:3c:23:df:94:cc:52:6b:bb:8e:25:ba:f0:2c:87: 18:8b:a7:73:84:6b:45:3a:57:5e:7c:af:01:1e:80:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:2c:e5:de:30:26:1c:19:95:8e:14:27:00:23:16:ba: 7c:0d:52:66:00:3f:04:6e:4a:b1:9e:2d:e5:e5:92:b2: d7:02:c1:64:bb:73:48:ba:31:ef:ce:dc:b1:80:9b:5c: e9:5d:2e:5f:75:1c:cf:fb:33:20:35:78:25:ed:a6:16: 16:46:e3:42:2c:92:03:c7:c3:89:26:1a:8c:78:85:af: 57:cd:40:35:9d:56:6a:3b:99:6f:ed:66:d2:1f:6a:d4: 22:54:b8:bb:b7:c8:9d:81:ab:9a:c6:4a:06:38:b1:eb: 0b:37:ee:74:c5:a3:5b:1a:ea:1f:6d:c3:e6:22:ee:11: 40:97:15:1a:55:68:29:18:e4:30:01:83:5d:a9:96:43: e4:bd:07:7e:4a:f5:91:b1:55:dd:a8:72:54:e7:25:ea: 5c:cf:1d:1d:e4:cf:7d:a8:71:69:34:c0:36:4e:20:71: 81:ba:2e:f9:84:1c:c3:4d:c3:fa:82:49:45:a6:3f:56: 22:b0:0f:c3:e4:01:ed:ef:b8:d9:d3:f4:3d:1e:02:ac: 47:81:ad:a9:fe:c9:96:24:77:ec:4f:42:48:1d:b0:33: f4:3a:04:48:06:55:39:b0:7c:03:c1:53:1a:1d:74:85: 43:d0:c3:0e:58:ee:cc:56:02:61:6a:f6:04:1d:bd:d7 Fingerprint (SHA-256): 7D:94:2D:AC:4E:91:06:71:79:9D:CA:6E:76:13:FB:FE:CC:DD:72:D7:EC:99:D1:31:13:44:99:0F:77:E7:05:9B Fingerprint (SHA1): 83:72:6A:F6:F2:E6:22:9F:4F:6C:8F:EA:9D:60:AC:6A:B5:4F:A9:3A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #12084: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201968 (0x19581130) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Apr 25 20:26:32 2016 Not After : Sun Apr 25 20:26:32 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:cf:a5:2f:45:86:18:fa:7d:c5:0b:99:a6:16:18:bd: db:6f:9e:08:46:67:36:37:29:ad:6e:bb:d6:1a:fc:39: 70:8f:0e:41:cf:fa:42:77:9b:0d:a5:55:93:ec:d6:79: 34:9f:20:f0:cb:86:c3:8d:a1:d6:83:75:11:6d:6c:c1: 70:0c:a6:31:a3:cd:a0:ba:88:46:17:10:92:d2:26:ce: 2e:ad:ec:18:54:aa:88:0a:3f:40:90:d3:99:80:db:3b: 1b:52:e6:bd:78:6a:b8:de:e3:aa:c7:c3:ad:68:d6:dc: 68:12:eb:ef:8e:fa:6f:51:bf:0d:55:e0:ed:2e:e4:ff: 94:c6:a2:5e:da:a8:3d:d3:4e:1d:20:8d:b2:6d:95:5b: 19:f5:a3:fd:41:49:85:ba:6b:43:75:07:44:33:c6:26: 97:38:9b:d5:b0:e8:65:05:5f:16:9e:9b:7c:3a:cc:3d: 4a:67:0f:16:5b:96:2b:fd:2c:c0:72:33:05:28:ed:d2: b2:df:dc:d7:1e:73:50:71:08:f3:30:1f:5b:cf:57:13: 8b:99:89:f5:6a:5e:fe:05:bf:ec:d1:fa:6f:30:f8:d5: 59:73:17:3d:40:f3:d4:f2:76:3f:08:14:75:17:1d:8d: 8d:b3:26:67:88:ed:73:6f:8e:7a:ed:28:5a:ba:b1:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:40:8b:7b:6d:64:26:f8:13:8d:2f:4e:25:96:a1:ab: 19:c1:4c:7d:bb:5d:9d:9f:c2:c5:7c:24:23:07:ad:66: 4d:5a:09:2e:6f:bd:64:88:29:82:dc:5b:41:50:72:88: 26:09:4f:a4:e8:8a:9e:d8:01:5e:8b:0c:4a:88:d2:7c: 9d:4e:90:b5:f3:5f:67:78:83:93:1c:61:77:f9:70:23: a9:be:71:67:d1:33:e5:ee:fe:44:1d:23:69:b3:6b:a0: 2c:1d:12:7f:05:5d:0e:15:b2:db:71:cc:e4:97:50:30: e0:86:78:0b:41:b7:51:52:10:d0:18:32:10:25:d1:3b: 26:1f:19:49:4b:1e:63:57:e3:63:35:68:b3:29:ec:49: 84:7b:f7:44:5f:45:a9:96:44:cb:eb:8d:41:81:2d:95: 83:7b:84:61:ac:24:4f:51:8a:5d:d1:e3:29:0a:a4:fc: 1c:c9:47:16:a9:f8:bb:b3:63:38:90:7c:d6:69:55:05: 0a:49:87:01:c2:39:9f:fa:03:8f:c3:c2:8e:fc:79:d1: 9e:39:7a:4e:74:c7:96:25:c8:9c:48:83:a9:a8:5f:48: 00:f0:31:d6:ba:67:83:92:4c:ce:8b:d6:65:5c:ef:d4: 9c:50:03:7d:b2:8b:b4:57:eb:2a:06:d0:f7:2b:35:c2 Fingerprint (SHA-256): 08:91:52:C7:22:0A:91:61:9D:C8:0D:5B:AE:70:A9:95:20:2C:0E:E3:9C:99:70:5B:48:D0:E8:47:41:A3:98:5C Fingerprint (SHA1): FD:1C:A5:60:20:67:1E:C2:50:85:82:66:1F:DB:33:D8:36:20:B6:F0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #12085: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201969 (0x19581131) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Apr 25 20:26:53 2016 Not After : Sun Apr 25 20:26:53 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:fe:c1:a1:a9:aa:91:b3:f8:dd:db:a0:a8:22:da:fe: a5:73:99:78:c1:ff:08:ce:f6:88:f9:ff:2f:c9:47:dd: c3:fe:46:c2:b7:73:d0:30:81:8d:7c:13:bf:eb:3a:d6: 8a:e0:66:96:32:89:89:9b:01:ad:d2:00:98:dc:9e:ab: 6a:0c:5c:d8:b5:67:f6:08:95:e4:77:a1:7d:44:1d:de: aa:e8:de:58:e7:00:07:6e:b5:ce:09:25:7f:db:78:bc: 2b:49:55:73:77:10:28:95:af:ae:ec:da:3f:3e:ff:5e: e5:3f:ae:e9:b3:00:b7:8b:79:7a:8b:81:3d:f4:68:11: 26:ec:b7:73:49:c9:8c:f1:fc:0f:ac:2b:11:5f:2c:1d: 25:75:94:96:95:4e:f7:36:3b:12:3d:2d:8c:e8:87:d5: 74:1c:be:d2:06:2e:6d:b6:89:78:a4:44:3e:d1:58:9d: 03:6a:df:73:e7:5a:81:45:94:9e:d3:0e:3f:d0:fc:71: 5d:e7:06:10:2f:49:1c:a8:94:a4:a5:e1:28:ab:bd:b1: 06:9a:04:b2:6e:9c:4e:8e:c3:ae:36:8c:f6:05:d2:d1: b9:0e:90:ee:ab:a8:b5:c3:3d:33:af:d7:0f:bd:62:6c: 67:4d:93:fc:47:10:d2:d6:4e:fd:c3:42:de:ff:a9:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:8b:3c:09:4b:6a:69:e0:2d:c1:dc:1d:07:e8:91:9d: dc:27:d9:de:42:8d:4f:e1:87:79:af:ba:12:bd:9d:02: a9:a7:f2:fe:36:6c:95:db:98:29:cc:42:73:1e:9e:cc: 71:dc:7d:33:13:25:bf:82:dc:54:6b:0b:c5:e2:10:40: 28:85:8f:f5:ad:dc:50:7b:5c:a4:6d:6b:5c:b5:85:74: 74:a8:21:ba:0f:34:01:a0:c9:d6:1d:6c:e2:e6:9f:11: e5:ae:38:63:7a:9a:6f:c4:ff:8a:9d:88:1e:a8:33:6e: 31:ce:cc:f8:a7:bb:7a:b8:8d:f5:20:69:4c:d1:01:ab: 2a:e9:ec:c5:3f:50:00:ee:92:73:5f:2d:dc:47:de:70: 1e:cd:f5:00:e8:d3:aa:75:aa:1c:d0:dd:4a:e0:b3:ef: 62:19:72:05:7f:99:c0:42:05:7a:f0:c5:23:4f:e8:b0: 73:4d:ff:48:7d:62:28:62:98:7d:d0:64:13:6d:81:e3: 12:06:cb:87:fb:f8:6f:d1:5e:eb:f1:79:bc:ed:77:4a: 7c:7f:a3:64:96:db:9b:0d:75:56:4d:77:ec:9a:87:bd: 02:80:67:1b:8e:80:66:5b:ad:ac:49:dc:7c:3c:2e:db: cb:ea:c5:ae:38:69:1a:18:c0:58:cf:f2:27:e6:10:3e Fingerprint (SHA-256): 83:65:B0:C4:6F:9E:FD:A0:D2:FB:94:62:14:22:A4:A5:1D:A0:D2:A5:88:CF:98:B4:81:32:0E:24:A9:54:58:68 Fingerprint (SHA1): 8B:BF:E8:6C:9E:6C:5B:A5:0F:DC:31:44:E7:5E:A3:5D:8D:14:06:FD Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #12086: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201970 (0x19581132) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Apr 25 20:26:57 2016 Not After : Sun Apr 25 20:26:57 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:18:d9:85:6f:a3:e4:01:50:e1:dc:00:de:db:e7:08: ee:29:4a:ec:74:c7:5d:98:9d:82:16:fe:02:0d:b6:0c: 30:42:e3:67:3f:ac:21:54:b2:94:e0:d9:af:6c:2d:43: c7:7c:03:53:9a:f3:c7:4d:48:5d:4f:c4:1d:73:79:70: 98:b4:69:7a:ef:39:82:ea:ad:aa:a7:5b:5c:72:c1:b1: c6:1e:95:0d:7a:6f:b4:29:ff:5a:4d:29:ef:c4:66:db: c9:21:2a:41:96:18:0b:ff:fd:79:6e:ee:1a:10:90:0b: 0f:52:0e:58:ab:c3:b7:7e:fd:cf:17:a1:8f:fc:a1:66: 14:13:3d:d0:77:92:3b:52:e7:50:cd:e3:53:28:33:f5: db:39:8d:8e:15:a4:40:3c:96:13:20:67:96:ec:5f:c7: cb:71:e6:3e:02:82:ec:51:19:88:f4:b0:07:70:99:bb: 35:53:74:cd:87:fe:c6:9c:9a:31:0a:8b:07:6a:cf:64: e7:09:42:5c:f6:f6:37:7b:ab:12:1d:ce:42:1f:42:7c: 63:55:53:e2:5f:a4:4b:5b:c0:0d:33:5a:f1:2c:b0:55: a1:ad:1e:6f:6d:88:75:59:c1:44:2b:da:94:ca:f2:4f: 90:81:34:ba:5a:63:ae:a2:eb:95:07:13:24:90:01:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:a5:dc:f1:57:64:fd:60:6e:a1:08:a8:60:e5:d5:37: 76:07:a4:86:8b:29:1f:97:f0:b5:13:6c:d3:4d:15:55: 97:91:b5:42:34:8b:f0:04:26:47:19:0e:d7:45:17:8d: 59:44:6a:03:07:82:d1:4f:4d:54:46:af:c6:a4:bc:03: 42:b4:ca:cf:b9:bb:ce:ae:78:91:b3:b2:67:1e:c1:bd: 62:db:4c:f7:91:a1:8d:6e:a6:d2:5f:75:1c:c3:cd:24: 85:94:af:63:57:9b:20:16:09:ff:14:f7:05:5b:04:69: c0:b9:f7:60:b2:11:be:5d:99:bd:42:bc:bd:c4:98:d9: 42:40:b1:0e:29:83:d0:8f:78:0d:11:41:db:fc:28:2f: 1c:7f:52:6c:d9:0d:8a:34:98:d2:6a:7b:44:d0:d3:d2: c0:74:99:84:f2:96:5c:ef:2d:83:6f:4a:90:1d:58:1a: 52:6d:4e:f3:ca:f8:73:d4:8b:fa:f9:94:5a:3c:01:3a: 47:09:a9:63:f4:6b:e1:d0:3a:de:29:59:d2:16:0f:54: 75:d9:17:a2:a8:09:aa:b2:a8:5b:43:2c:8e:53:37:aa: c9:29:e1:70:ec:68:e7:49:c8:17:a6:5a:e1:ba:4b:9b: 57:50:22:5a:e7:e4:05:3b:43:a6:c2:29:73:06:ba:a0 Fingerprint (SHA-256): 31:C1:77:1F:A9:4E:AD:3F:8F:7E:56:91:92:22:F5:3F:A2:12:1F:DB:A4:B8:2E:D4:4A:03:DE:37:5C:E0:08:E2 Fingerprint (SHA1): B1:A6:33:D0:6E:82:CD:89:79:0E:08:18:48:49:35:92:1F:FD:78:9C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #12087: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201971 (0x19581133) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Apr 25 20:27:18 2016 Not After : Sun Apr 25 20:27:18 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:9d:2d:2b:76:70:13:b2:ca:05:d4:5f:c2:1d:93:48: fb:03:59:b6:30:af:54:aa:a4:ed:ae:7e:e1:34:8c:bd: ac:33:ae:f2:2b:8b:c3:ef:fd:4e:d8:30:e0:aa:cc:21: 55:1c:79:59:ca:d9:d7:f1:e4:82:b4:1a:ab:27:b0:b4: c5:e0:0d:52:0d:35:69:e1:22:37:b5:0b:9a:23:86:56: 21:30:a6:0d:de:1d:47:b7:6e:59:7a:d1:bf:74:b4:57: 47:e9:af:e0:12:d0:51:6e:12:f5:bb:a5:11:f4:72:e8: c4:61:82:f3:7f:e6:d2:49:a4:cf:81:f5:c5:48:4f:7d: 45:ab:4e:cc:3d:d7:66:98:40:11:99:16:f4:a0:f0:c9: 09:ee:c8:d4:a0:db:2e:7a:4e:f8:2d:a9:55:59:83:cb: 92:3d:26:8c:df:b2:c7:c7:92:cc:7c:3c:b1:b0:62:9f: a7:3f:1a:06:11:01:0f:77:7f:c2:d5:e2:e6:c9:2e:16: 35:79:ab:22:9b:51:08:f3:65:8b:bb:55:08:0e:d6:5b: 2c:c9:af:78:31:5f:15:63:39:26:9e:f6:1e:18:88:28: 35:b1:4f:8d:a0:c7:10:0d:3e:8c:a5:52:cc:88:1e:e3: 5f:c4:e8:2f:43:03:e3:34:ff:24:2d:c8:c3:19:d8:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:ca:84:13:9e:d9:20:ae:1c:7e:e9:f4:ab:00:6c:6c: fc:27:63:9c:96:68:ae:46:6e:5c:6c:36:38:06:5f:9d: 21:98:92:34:f5:fa:60:e7:98:49:3a:3d:77:67:24:43: 1a:53:93:e7:a4:07:ea:33:d0:1d:c6:2c:c9:e1:b8:99: 0f:b3:f6:4e:93:16:a6:3c:18:b7:f5:b1:73:21:0a:68: 72:06:59:27:9b:18:e0:c4:28:e0:fc:bf:82:19:52:25: 50:e2:23:84:80:61:dc:f9:3d:cf:8d:ca:9b:6b:84:12: 6f:0a:ec:bc:02:1a:8c:3b:a2:7b:2b:6d:0a:88:84:c1: 16:16:d2:51:06:5e:11:5b:85:da:db:81:d1:95:44:8b: 3b:2d:10:6a:5d:a0:36:75:bd:48:8c:18:88:90:c3:ae: 57:ab:c9:20:ca:ef:2f:8d:cd:68:34:98:14:62:54:15: 10:f4:fe:c5:42:75:b3:56:71:3c:62:ca:fa:fb:a8:72: 34:19:f1:77:31:f1:91:d1:75:2c:59:13:ba:8f:13:a4: 4f:db:fa:ac:de:29:25:f8:d4:85:46:4c:59:e6:80:2e: 93:d3:94:0d:62:d8:e7:3b:81:36:11:76:be:0d:d6:5e: a4:ad:42:d5:e9:f3:ad:cf:18:c2:e2:c9:f1:c1:68:a7 Fingerprint (SHA-256): 71:91:C2:BC:70:5A:6A:80:C8:88:CD:85:CD:15:9C:EC:21:7E:21:2E:BA:98:2C:B6:EB:D9:71:1B:8C:E0:A4:21 Fingerprint (SHA1): 4A:5D:CD:0C:01:A3:CA:3F:60:0A:CF:DA:15:15:81:14:70:14:A1:9E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #12088: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12089: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201986 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12090: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12091: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12092: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12093: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425201987 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12094: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12095: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12096: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12097: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425201988 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12098: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12099: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #12100: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12101: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425201989 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12102: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12103: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12104: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201986 (0x19581142) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:29:13 2016 Not After : Sun Apr 25 20:29:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:d8:37:12:45:0e:d0:97:8d:70:e1:2c:c6:30:e4:42: d5:c9:11:2f:97:cf:56:7d:41:1c:c0:7a:97:83:e9:26: 65:fb:4a:d1:20:75:e1:19:b5:98:35:42:93:41:d6:25: 83:89:01:6c:5b:64:d9:21:9a:8a:6a:5f:af:fe:32:9e: 8a:8e:0d:97:9e:61:0e:b9:a9:34:43:c0:71:89:55:47: 09:c5:fc:c1:c3:88:6f:38:97:76:72:9c:fb:d4:33:8c: 3f:b7:3e:1c:7a:17:f1:85:5f:33:df:88:31:cc:92:77: b1:e4:1b:6e:ce:cf:e3:b2:be:ed:1b:6a:9d:2e:c2:9d: de:93:70:46:5e:3b:a9:04:65:c5:5c:cf:87:76:ee:94: f4:84:b4:38:2c:4d:16:65:6b:80:e5:1c:fb:00:4e:bd: 72:0a:f3:28:29:1a:c8:43:38:95:b2:d2:82:42:54:e4: 6d:7b:f1:3d:34:e3:ea:cd:01:08:f6:c0:fd:55:de:53: fa:c7:45:7e:05:28:e5:4c:c1:e0:fc:e8:22:d4:6e:e8: 25:3d:e2:98:8d:ac:bf:64:16:33:f4:98:0f:af:fc:1f: 0a:2d:64:5c:3e:94:37:c1:09:6c:90:8a:74:42:7d:bb: 6d:10:47:25:58:1c:af:f1:f1:62:7b:02:b8:a7:19:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:2a:45:e4:dc:94:2c:61:8f:83:8e:de:79:aa:89:99: b1:e0:23:4c:c6:0e:f3:f6:fe:96:60:68:5b:51:76:f7: 9d:ba:53:ec:44:86:70:b3:cb:c9:23:b2:3f:88:0f:b6: e9:d9:f0:1e:3d:e0:c2:b9:3b:cc:88:79:33:19:aa:d2: 8a:d8:db:6a:d7:26:c3:48:2c:96:ff:17:eb:93:7d:08: f8:6b:57:ab:83:a2:ef:ea:b4:65:b8:10:9f:c7:1a:6a: 84:ce:d2:17:5c:b5:23:c0:bb:f3:6d:c3:ce:40:6b:c8: be:9e:7a:39:92:3b:2a:46:4e:07:5c:47:1b:07:14:3e: 04:a0:a0:8f:de:1b:8e:b7:40:f3:02:3c:79:50:54:ce: f7:1f:d5:dd:64:ce:35:e7:0d:f9:bd:6b:ef:02:2b:18: 22:de:85:94:ef:f8:91:b9:f9:7a:72:3f:84:f9:28:77: 7f:7b:31:19:8f:95:d7:b2:73:b7:f1:59:f8:63:e5:90: 2a:1c:15:4a:75:e5:45:af:fe:93:d0:c5:fc:51:38:0b: b9:cc:92:a2:ee:07:f8:8e:35:b5:69:9f:a6:c2:9c:d0: 5e:ba:db:92:48:80:55:7f:64:f6:eb:c5:7c:5b:02:a7: 69:2c:76:ea:87:9b:ce:fa:82:d4:ca:fa:ef:49:44:50 Fingerprint (SHA-256): 54:62:E2:E5:A6:1D:E1:26:1C:34:BB:D5:7E:60:41:4D:57:57:83:43:99:5E:16:79:C5:EF:D7:EB:A4:44:FE:57 Fingerprint (SHA1): E9:D5:3F:B6:F2:E6:2D:CE:95:A8:24:C2:44:E0:13:6A:77:FA:B4:F4 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12105: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12106: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201987 (0x19581143) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:29:21 2016 Not After : Sun Apr 25 20:29:21 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:4a:30:ed:5a:ec:6e:94:57:41:aa:8c:48:82:4b:b9: b2:8d:8b:50:80:e2:09:be:2d:b7:12:43:bf:cd:49:78: 29:58:d2:98:e6:15:6b:d9:f6:28:88:5f:d6:3e:48:3d: 5f:54:b7:23:f0:6d:e9:19:2c:07:72:7c:b1:de:8a:f1: 48:da:69:64:2f:de:a9:e5:d3:c7:a3:0d:5b:b8:66:77: 7a:da:f9:f1:07:b7:b9:2c:eb:16:39:42:94:4a:0d:e3: 1d:24:9f:02:3b:7f:1c:72:e7:f7:f9:24:d4:e4:18:07: df:60:13:ae:ea:7e:df:8b:d6:41:7b:94:49:57:de:4b: f6:29:fc:2e:24:f3:81:a0:cc:9a:d6:6f:31:eb:a8:06: 70:e4:23:ee:0c:1c:5c:45:ee:f5:3b:46:a2:b2:9d:1b: 15:90:04:af:ea:66:32:fe:53:fb:63:26:f1:8c:74:c4: 96:1b:3d:e8:0b:3c:52:b0:82:c0:6a:38:dd:5d:8c:f8: 85:9e:84:d6:be:c2:ad:a4:99:e3:f1:3a:7d:dd:12:a0: 40:92:36:26:36:bc:01:b5:49:03:37:c2:b5:e2:aa:78: 26:92:01:ff:46:d2:04:43:9c:ec:49:45:28:4e:dc:64: 92:dd:c0:7c:da:00:95:77:f5:4c:d9:60:ab:a5:af:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:4b:32:c9:38:f1:2b:f2:11:83:7a:75:e6:d7:07:5e: 0c:41:b7:6b:ce:03:bc:76:29:2b:d4:1e:bc:c5:ac:28: a9:44:81:28:dc:12:d3:df:e5:b9:dc:b9:b4:0a:f1:6a: 9b:d8:fc:f1:e6:ab:15:d1:e0:ac:69:ce:54:bf:e4:20: f7:da:80:52:9d:46:88:8b:48:32:82:de:fa:c4:9b:93: ac:1b:7f:a7:bb:e2:b1:70:a6:95:86:2f:c7:45:6e:d8: 49:dc:b9:bb:41:d5:81:2c:c4:b9:b2:b5:0a:b5:e4:48: b3:91:2b:e0:d0:d2:a1:44:ee:de:48:6e:9f:17:98:f8: 4e:e2:0d:28:d3:2b:13:46:de:62:38:62:a0:4b:d8:c6: b3:16:a8:10:33:21:54:4d:54:2d:c1:91:c5:a9:66:d8: 71:35:00:7c:9c:a2:72:28:3e:7d:d1:39:2b:55:00:3a: 8f:08:d5:55:76:9c:cc:85:e2:09:d7:04:14:50:bb:ae: 46:83:0a:ed:5a:35:07:9a:94:d7:0a:3b:0d:db:86:11: c5:81:f7:e2:69:2d:ae:4b:13:47:a8:00:19:2b:59:80: 17:73:5b:4a:fb:26:01:3d:d1:bd:50:6b:68:1c:15:b0: 01:94:5d:8e:07:8d:d3:76:93:45:5e:3e:aa:98:78:fb Fingerprint (SHA-256): 10:12:C7:64:44:84:F2:59:36:C3:82:6C:2F:58:EC:71:17:52:AA:14:A7:FC:B5:26:58:1E:AC:C1:F1:A7:C3:93 Fingerprint (SHA1): DA:EE:BA:9D:44:C0:25:31:CD:44:F5:97:6C:86:09:19:DA:D5:E3:13 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12107: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12108: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201988 (0x19581144) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:29:31 2016 Not After : Sun Apr 25 20:29:31 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:1d:76:05:9d:fa:6c:30:de:68:cc:4a:09:15:d5:12: cd:90:d7:1e:50:2f:4c:51:f5:e7:96:85:d7:a7:9e:31: a3:70:59:77:2b:05:c8:c7:2c:d2:7c:76:e9:4c:fd:17: 79:ec:08:83:15:4a:a1:5e:aa:d0:2c:f5:cc:aa:96:c8: ca:e1:4f:8a:de:94:c0:78:89:5d:5a:52:7a:28:75:c0: cc:e2:07:4b:34:57:a3:96:5e:09:5b:21:bc:1e:36:a6: b4:70:24:a9:ca:39:97:98:db:e5:01:fd:53:2b:fe:a8: 8a:5f:97:e3:4b:49:5d:80:fa:c3:f9:f4:f2:f5:84:30: 7a:70:44:14:da:fa:34:66:b8:e6:d8:0a:5f:bc:60:47: 79:9c:32:64:d9:da:68:de:5b:84:1d:7a:81:67:15:fb: d3:12:c2:d2:47:b7:f8:1f:6c:fc:ae:3b:ce:5f:14:46: 7e:ae:54:ef:60:7f:0c:f5:3b:36:aa:f4:ac:e3:59:ab: 64:fc:be:6e:d1:1e:d4:88:23:63:56:5e:d6:6e:99:39: 2a:f9:fa:0b:3a:4e:97:be:41:15:42:ad:00:bf:bb:2e: e1:4c:83:d8:fd:af:b2:75:a6:6d:9c:80:69:a3:a1:50: 3c:52:be:10:58:d1:60:3b:45:20:67:19:61:99:41:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:52:f7:52:48:7a:d7:d2:4f:9a:8f:cc:6b:a2:81:33: a8:67:5f:70:94:ea:7a:3a:ca:7f:9d:15:35:22:6e:97: 4c:47:c8:26:95:2e:7f:42:85:27:c9:82:03:8a:13:17: 12:46:1d:ad:32:f8:43:5c:25:d1:0e:ea:ef:31:f6:56: c9:d8:79:b7:ff:f1:66:7a:c8:aa:3b:df:e5:0a:61:f3: 79:2e:82:0c:0c:66:37:0a:9a:29:a7:bb:77:7e:0f:33: df:fb:f7:05:50:66:e5:b5:04:1a:3b:ce:91:aa:94:6d: c4:52:84:79:f4:8b:19:4a:00:d2:4e:87:4b:24:9c:01: 3b:44:3b:25:77:70:b9:05:46:84:21:46:bd:7d:94:80: 46:f2:f7:08:8a:15:df:26:c4:e6:67:c7:89:be:1f:49: 7a:28:85:49:e5:f6:f1:60:1d:0b:9b:67:34:ec:df:c6: 4a:14:74:e6:63:f5:a3:71:a1:bf:bf:bf:42:80:12:ee: a2:f9:03:d1:dc:17:29:7b:4c:d6:d6:60:a9:64:ec:03: 76:ad:db:e5:94:14:c7:18:22:b2:e1:b4:2d:95:d0:1c: 5d:ce:89:d0:ae:a5:ff:ef:f1:08:6d:63:d8:41:ea:b9: 75:96:25:d8:a5:7a:18:17:f6:29:41:00:dc:b1:41:4b Fingerprint (SHA-256): F7:77:B3:F8:14:A9:2E:33:81:12:BB:0E:EF:D3:49:A3:A5:D8:B3:9D:1C:78:4C:D3:59:F9:BA:D8:56:74:61:3A Fingerprint (SHA1): CB:B6:A1:63:CC:46:66:E6:8A:B4:FC:AC:59:52:E4:24:9A:AB:55:51 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #12109: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12110: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12111: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #12112: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #12113: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201986 (0x19581142) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:29:13 2016 Not After : Sun Apr 25 20:29:13 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:d8:37:12:45:0e:d0:97:8d:70:e1:2c:c6:30:e4:42: d5:c9:11:2f:97:cf:56:7d:41:1c:c0:7a:97:83:e9:26: 65:fb:4a:d1:20:75:e1:19:b5:98:35:42:93:41:d6:25: 83:89:01:6c:5b:64:d9:21:9a:8a:6a:5f:af:fe:32:9e: 8a:8e:0d:97:9e:61:0e:b9:a9:34:43:c0:71:89:55:47: 09:c5:fc:c1:c3:88:6f:38:97:76:72:9c:fb:d4:33:8c: 3f:b7:3e:1c:7a:17:f1:85:5f:33:df:88:31:cc:92:77: b1:e4:1b:6e:ce:cf:e3:b2:be:ed:1b:6a:9d:2e:c2:9d: de:93:70:46:5e:3b:a9:04:65:c5:5c:cf:87:76:ee:94: f4:84:b4:38:2c:4d:16:65:6b:80:e5:1c:fb:00:4e:bd: 72:0a:f3:28:29:1a:c8:43:38:95:b2:d2:82:42:54:e4: 6d:7b:f1:3d:34:e3:ea:cd:01:08:f6:c0:fd:55:de:53: fa:c7:45:7e:05:28:e5:4c:c1:e0:fc:e8:22:d4:6e:e8: 25:3d:e2:98:8d:ac:bf:64:16:33:f4:98:0f:af:fc:1f: 0a:2d:64:5c:3e:94:37:c1:09:6c:90:8a:74:42:7d:bb: 6d:10:47:25:58:1c:af:f1:f1:62:7b:02:b8:a7:19:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:2a:45:e4:dc:94:2c:61:8f:83:8e:de:79:aa:89:99: b1:e0:23:4c:c6:0e:f3:f6:fe:96:60:68:5b:51:76:f7: 9d:ba:53:ec:44:86:70:b3:cb:c9:23:b2:3f:88:0f:b6: e9:d9:f0:1e:3d:e0:c2:b9:3b:cc:88:79:33:19:aa:d2: 8a:d8:db:6a:d7:26:c3:48:2c:96:ff:17:eb:93:7d:08: f8:6b:57:ab:83:a2:ef:ea:b4:65:b8:10:9f:c7:1a:6a: 84:ce:d2:17:5c:b5:23:c0:bb:f3:6d:c3:ce:40:6b:c8: be:9e:7a:39:92:3b:2a:46:4e:07:5c:47:1b:07:14:3e: 04:a0:a0:8f:de:1b:8e:b7:40:f3:02:3c:79:50:54:ce: f7:1f:d5:dd:64:ce:35:e7:0d:f9:bd:6b:ef:02:2b:18: 22:de:85:94:ef:f8:91:b9:f9:7a:72:3f:84:f9:28:77: 7f:7b:31:19:8f:95:d7:b2:73:b7:f1:59:f8:63:e5:90: 2a:1c:15:4a:75:e5:45:af:fe:93:d0:c5:fc:51:38:0b: b9:cc:92:a2:ee:07:f8:8e:35:b5:69:9f:a6:c2:9c:d0: 5e:ba:db:92:48:80:55:7f:64:f6:eb:c5:7c:5b:02:a7: 69:2c:76:ea:87:9b:ce:fa:82:d4:ca:fa:ef:49:44:50 Fingerprint (SHA-256): 54:62:E2:E5:A6:1D:E1:26:1C:34:BB:D5:7E:60:41:4D:57:57:83:43:99:5E:16:79:C5:EF:D7:EB:A4:44:FE:57 Fingerprint (SHA1): E9:D5:3F:B6:F2:E6:2D:CE:95:A8:24:C2:44:E0:13:6A:77:FA:B4:F4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12114: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12115: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201987 (0x19581143) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:29:21 2016 Not After : Sun Apr 25 20:29:21 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:4a:30:ed:5a:ec:6e:94:57:41:aa:8c:48:82:4b:b9: b2:8d:8b:50:80:e2:09:be:2d:b7:12:43:bf:cd:49:78: 29:58:d2:98:e6:15:6b:d9:f6:28:88:5f:d6:3e:48:3d: 5f:54:b7:23:f0:6d:e9:19:2c:07:72:7c:b1:de:8a:f1: 48:da:69:64:2f:de:a9:e5:d3:c7:a3:0d:5b:b8:66:77: 7a:da:f9:f1:07:b7:b9:2c:eb:16:39:42:94:4a:0d:e3: 1d:24:9f:02:3b:7f:1c:72:e7:f7:f9:24:d4:e4:18:07: df:60:13:ae:ea:7e:df:8b:d6:41:7b:94:49:57:de:4b: f6:29:fc:2e:24:f3:81:a0:cc:9a:d6:6f:31:eb:a8:06: 70:e4:23:ee:0c:1c:5c:45:ee:f5:3b:46:a2:b2:9d:1b: 15:90:04:af:ea:66:32:fe:53:fb:63:26:f1:8c:74:c4: 96:1b:3d:e8:0b:3c:52:b0:82:c0:6a:38:dd:5d:8c:f8: 85:9e:84:d6:be:c2:ad:a4:99:e3:f1:3a:7d:dd:12:a0: 40:92:36:26:36:bc:01:b5:49:03:37:c2:b5:e2:aa:78: 26:92:01:ff:46:d2:04:43:9c:ec:49:45:28:4e:dc:64: 92:dd:c0:7c:da:00:95:77:f5:4c:d9:60:ab:a5:af:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:4b:32:c9:38:f1:2b:f2:11:83:7a:75:e6:d7:07:5e: 0c:41:b7:6b:ce:03:bc:76:29:2b:d4:1e:bc:c5:ac:28: a9:44:81:28:dc:12:d3:df:e5:b9:dc:b9:b4:0a:f1:6a: 9b:d8:fc:f1:e6:ab:15:d1:e0:ac:69:ce:54:bf:e4:20: f7:da:80:52:9d:46:88:8b:48:32:82:de:fa:c4:9b:93: ac:1b:7f:a7:bb:e2:b1:70:a6:95:86:2f:c7:45:6e:d8: 49:dc:b9:bb:41:d5:81:2c:c4:b9:b2:b5:0a:b5:e4:48: b3:91:2b:e0:d0:d2:a1:44:ee:de:48:6e:9f:17:98:f8: 4e:e2:0d:28:d3:2b:13:46:de:62:38:62:a0:4b:d8:c6: b3:16:a8:10:33:21:54:4d:54:2d:c1:91:c5:a9:66:d8: 71:35:00:7c:9c:a2:72:28:3e:7d:d1:39:2b:55:00:3a: 8f:08:d5:55:76:9c:cc:85:e2:09:d7:04:14:50:bb:ae: 46:83:0a:ed:5a:35:07:9a:94:d7:0a:3b:0d:db:86:11: c5:81:f7:e2:69:2d:ae:4b:13:47:a8:00:19:2b:59:80: 17:73:5b:4a:fb:26:01:3d:d1:bd:50:6b:68:1c:15:b0: 01:94:5d:8e:07:8d:d3:76:93:45:5e:3e:aa:98:78:fb Fingerprint (SHA-256): 10:12:C7:64:44:84:F2:59:36:C3:82:6C:2F:58:EC:71:17:52:AA:14:A7:FC:B5:26:58:1E:AC:C1:F1:A7:C3:93 Fingerprint (SHA1): DA:EE:BA:9D:44:C0:25:31:CD:44:F5:97:6C:86:09:19:DA:D5:E3:13 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12116: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12117: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201988 (0x19581144) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:29:31 2016 Not After : Sun Apr 25 20:29:31 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:1d:76:05:9d:fa:6c:30:de:68:cc:4a:09:15:d5:12: cd:90:d7:1e:50:2f:4c:51:f5:e7:96:85:d7:a7:9e:31: a3:70:59:77:2b:05:c8:c7:2c:d2:7c:76:e9:4c:fd:17: 79:ec:08:83:15:4a:a1:5e:aa:d0:2c:f5:cc:aa:96:c8: ca:e1:4f:8a:de:94:c0:78:89:5d:5a:52:7a:28:75:c0: cc:e2:07:4b:34:57:a3:96:5e:09:5b:21:bc:1e:36:a6: b4:70:24:a9:ca:39:97:98:db:e5:01:fd:53:2b:fe:a8: 8a:5f:97:e3:4b:49:5d:80:fa:c3:f9:f4:f2:f5:84:30: 7a:70:44:14:da:fa:34:66:b8:e6:d8:0a:5f:bc:60:47: 79:9c:32:64:d9:da:68:de:5b:84:1d:7a:81:67:15:fb: d3:12:c2:d2:47:b7:f8:1f:6c:fc:ae:3b:ce:5f:14:46: 7e:ae:54:ef:60:7f:0c:f5:3b:36:aa:f4:ac:e3:59:ab: 64:fc:be:6e:d1:1e:d4:88:23:63:56:5e:d6:6e:99:39: 2a:f9:fa:0b:3a:4e:97:be:41:15:42:ad:00:bf:bb:2e: e1:4c:83:d8:fd:af:b2:75:a6:6d:9c:80:69:a3:a1:50: 3c:52:be:10:58:d1:60:3b:45:20:67:19:61:99:41:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:52:f7:52:48:7a:d7:d2:4f:9a:8f:cc:6b:a2:81:33: a8:67:5f:70:94:ea:7a:3a:ca:7f:9d:15:35:22:6e:97: 4c:47:c8:26:95:2e:7f:42:85:27:c9:82:03:8a:13:17: 12:46:1d:ad:32:f8:43:5c:25:d1:0e:ea:ef:31:f6:56: c9:d8:79:b7:ff:f1:66:7a:c8:aa:3b:df:e5:0a:61:f3: 79:2e:82:0c:0c:66:37:0a:9a:29:a7:bb:77:7e:0f:33: df:fb:f7:05:50:66:e5:b5:04:1a:3b:ce:91:aa:94:6d: c4:52:84:79:f4:8b:19:4a:00:d2:4e:87:4b:24:9c:01: 3b:44:3b:25:77:70:b9:05:46:84:21:46:bd:7d:94:80: 46:f2:f7:08:8a:15:df:26:c4:e6:67:c7:89:be:1f:49: 7a:28:85:49:e5:f6:f1:60:1d:0b:9b:67:34:ec:df:c6: 4a:14:74:e6:63:f5:a3:71:a1:bf:bf:bf:42:80:12:ee: a2:f9:03:d1:dc:17:29:7b:4c:d6:d6:60:a9:64:ec:03: 76:ad:db:e5:94:14:c7:18:22:b2:e1:b4:2d:95:d0:1c: 5d:ce:89:d0:ae:a5:ff:ef:f1:08:6d:63:d8:41:ea:b9: 75:96:25:d8:a5:7a:18:17:f6:29:41:00:dc:b1:41:4b Fingerprint (SHA-256): F7:77:B3:F8:14:A9:2E:33:81:12:BB:0E:EF:D3:49:A3:A5:D8:B3:9D:1C:78:4C:D3:59:F9:BA:D8:56:74:61:3A Fingerprint (SHA1): CB:B6:A1:63:CC:46:66:E6:8A:B4:FC:AC:59:52:E4:24:9A:AB:55:51 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #12118: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12119: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12120: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201990 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12121: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12122: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12123: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12124: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425201991 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12125: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12126: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12127: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12128: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425201992 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12129: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12130: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #12131: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12132: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425201993 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12133: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12134: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #12135: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12136: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425201994 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12137: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12138: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12139: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201990 (0x19581146) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:30:15 2016 Not After : Sun Apr 25 20:30:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:87:9f:dd:a2:4e:a3:1d:9a:8a:33:7b:69:c3:e3:05: 57:29:9f:76:d0:a4:17:2c:dd:8d:7c:1e:9d:8d:3f:ef: 1c:b3:44:fb:af:64:03:0d:cc:d4:79:ca:a5:df:21:03: 61:f9:7c:2c:49:e1:56:a7:ef:29:8b:ce:d3:1c:8f:18: 8d:d1:e4:05:ee:37:db:ee:67:85:a0:bb:91:71:42:7e: 24:fa:ec:9f:b2:c5:a0:11:98:2b:4a:74:6f:df:eb:1f: 1d:47:a5:04:f3:da:1b:1c:0b:26:db:56:b3:c2:33:06: b7:1e:07:96:08:3b:e0:52:1b:83:b6:d3:e7:50:b0:a7: 8a:d9:a9:0d:4f:f0:2d:a1:68:e6:14:18:a3:10:61:09: c2:e8:2b:56:84:bc:fb:66:a8:91:cf:1b:36:f5:52:b4: fa:58:de:76:1d:a4:4c:f2:f9:57:08:a0:8a:1a:94:b3: 64:6a:a8:01:99:29:96:c0:db:fa:fd:dc:23:f6:f7:f3: b4:4f:a8:65:fa:01:c5:eb:87:b8:44:12:8f:27:0c:01: 8a:00:95:ca:61:7f:3a:0f:32:b5:62:df:85:18:b9:8b: 69:61:53:ef:a1:fd:b5:81:20:f8:2c:ee:b1:31:0f:d2: 03:e6:fe:5e:fe:09:a3:df:8f:69:89:8b:66:df:a3:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:4d:e8:0a:a9:9b:a0:7b:e0:a5:2a:61:46:03:01:a3: 14:66:0f:de:e0:8e:01:9f:94:13:68:3d:37:2f:1b:86: f6:45:4c:31:ea:ef:a2:30:f9:84:f0:7c:42:8d:4a:ea: 4f:e0:a4:ce:bb:6c:9f:e1:c1:70:5f:bb:44:35:08:cc: 50:c9:a1:a9:20:81:81:37:13:dc:e0:23:de:b7:83:7c: cd:a2:a3:a1:1d:d6:da:71:b4:cd:f8:17:8a:ab:4a:a8: 6d:b4:d1:c8:51:35:02:e4:f6:78:73:fb:41:eb:ae:85: 30:21:c7:4e:1b:75:5b:53:6c:8c:2a:4e:bc:da:a3:50: 66:f9:a0:2f:ad:08:bf:dc:46:b8:b8:69:14:92:61:33: ce:d5:1a:7c:53:cd:84:00:78:7f:15:d8:cf:38:99:32: 80:be:0d:42:80:d8:28:75:fe:73:f7:9c:c0:67:23:43: bc:d8:d4:d3:49:43:2e:84:a7:54:6c:ab:08:fa:6b:38: 71:05:b4:cd:30:10:c6:8c:78:af:50:36:46:4b:fa:23: 67:fd:5b:0b:9d:8d:3d:8d:92:02:03:70:e8:a3:ec:e5: 3a:ed:66:03:8f:4f:2c:ad:c9:f2:f1:af:19:66:9c:f0: bc:e6:67:2a:36:53:fc:c6:62:40:52:f8:6b:88:d5:38 Fingerprint (SHA-256): B2:81:22:29:5B:8E:CF:DF:13:E2:C3:E6:00:FD:56:1F:27:13:E9:BC:16:11:C7:B4:87:10:02:5C:C7:0E:1D:44 Fingerprint (SHA1): F6:42:AE:87:C0:97:E4:A8:8F:00:13:5E:6E:9D:A0:9E:71:14:F7:1C Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12140: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12141: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201991 (0x19581147) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:30:25 2016 Not After : Sun Apr 25 20:30:25 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:4b:fb:dd:b9:af:1f:54:1d:df:c4:91:a4:2d:ca:71: 72:f4:91:f6:b3:ac:cf:92:5f:5c:a8:9d:89:50:83:67: c2:7d:6e:8f:88:b4:09:17:5a:21:ec:01:22:93:aa:7c: 35:a4:2a:b1:cd:19:33:73:53:7d:c5:fa:2d:79:99:4a: 4c:82:00:c4:27:bd:70:a8:68:bb:7e:6e:a9:fe:c5:a2: dd:a3:b5:ae:ef:54:13:51:cd:01:80:a7:21:73:ab:d9: 09:28:6a:e3:5c:97:f1:5f:1a:dc:b5:89:e5:69:93:4c: d3:ff:31:b4:10:87:a5:6a:df:ad:1f:ae:19:54:f0:26: 23:c8:c0:1a:f8:22:c2:fb:36:55:04:f0:7f:e3:c3:99: 19:2d:b1:9c:86:b5:85:af:84:76:b5:78:63:a1:c5:7d: 7e:93:80:9b:6f:46:50:5d:9c:3b:be:4d:4a:cd:a7:1d: 02:79:0b:ec:b6:e2:ff:a8:4a:34:2f:56:11:9f:98:82: fd:27:27:6f:6e:08:c4:3f:a4:e3:65:c6:ea:50:db:55: 47:d6:f1:56:d0:08:9b:55:44:1a:79:fa:f6:e4:71:b7: f9:e1:51:e3:05:0c:41:bf:06:01:fb:0f:82:a6:b3:56: 2b:94:a3:04:e7:95:d9:96:9d:0e:a5:fe:6e:fa:46:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:6e:a3:a5:3a:f9:3e:50:d7:eb:b1:69:69:cf:d7:ff: 06:e9:36:b0:d9:23:28:8e:7d:d8:61:83:58:d1:1e:1e: dc:39:d3:7b:cd:0b:32:5a:6e:22:5f:a2:f5:8c:8a:6d: 6a:5b:1b:01:02:e6:13:0c:b2:21:44:eb:0b:f4:84:38: f7:9a:22:3a:1d:0c:10:d1:d1:b8:4b:55:63:3a:08:7d: 8d:6b:60:4c:af:bf:5f:fe:fd:fc:43:67:11:c5:d8:76: 14:d9:ad:c3:80:33:66:31:50:fa:a4:0d:b8:87:dd:33: 75:2c:6c:72:aa:3d:87:25:36:be:cc:f2:b1:53:11:b7: e1:e9:e5:fa:19:89:0b:d5:e3:67:25:85:72:1d:2e:ce: 13:e1:bf:2e:fa:ec:9e:0d:44:9e:14:85:e5:81:59:5e: ba:73:58:e6:98:7d:32:9d:ce:48:fc:be:56:18:b6:7d: d7:05:8a:95:c2:c3:ae:e9:d9:c1:db:51:ba:b0:be:15: 41:ee:71:a4:f7:5e:53:f2:57:64:fe:df:fb:98:18:63: b1:60:36:61:7e:db:a4:67:a6:2e:c2:ea:90:f9:7f:48: f4:b4:e7:00:90:36:0d:21:13:b3:f3:31:19:96:ae:4b: 48:eb:86:7a:e1:23:81:9b:19:f5:ec:a6:e2:69:7b:bc Fingerprint (SHA-256): 3B:05:1D:7D:FC:30:41:EF:60:03:B5:7A:CE:8C:AF:26:16:FE:51:42:FF:31:AD:1A:A6:2D:08:14:79:BE:9A:C6 Fingerprint (SHA1): D1:5E:64:06:DA:B2:25:F8:36:F1:92:24:98:AE:75:B4:26:04:93:8A Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12142: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12143: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201992 (0x19581148) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:30:33 2016 Not After : Sun Apr 25 20:30:33 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:43:96:77:3f:7b:26:87:16:91:cc:01:9f:e9:f1:a8: aa:33:fb:e2:60:70:d1:cd:8d:e1:8d:32:f8:47:7a:3e: 0e:1c:77:f0:d0:68:de:c8:64:a0:36:1d:52:ac:f1:02: c8:34:df:0e:13:c8:aa:b2:a2:f3:18:07:67:b4:38:c1: d2:78:22:6c:4b:39:23:3e:5c:61:1b:d6:63:bd:2c:4d: aa:f0:20:a0:9d:3b:59:7c:d5:c8:2c:19:12:85:ea:29: a6:f3:b2:e4:e3:d2:55:f8:01:6f:f5:77:50:71:80:41: f9:ea:d3:39:15:de:68:12:48:d8:c7:3a:7b:72:af:a8: 6a:36:15:41:96:7f:39:ab:aa:41:d8:1e:43:f5:51:6f: af:a9:a4:49:04:ac:1c:f2:b7:61:bc:71:b1:70:15:50: c0:50:7c:da:21:7d:a4:74:26:68:cf:ed:93:d1:e1:c5: 75:fb:0e:74:f8:9e:8b:9e:66:c2:38:54:4d:92:b2:0d: f3:0f:a3:79:28:ee:9c:f1:38:57:61:ea:2d:a8:ce:00: 80:f0:d3:c4:13:13:a3:c9:92:c5:65:e3:b7:15:a8:8b: 63:dc:3e:30:f0:76:7a:17:61:62:00:05:ff:67:70:b5: 13:dc:f2:6d:76:fb:1f:f5:95:76:50:43:20:46:14:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:04:23:e7:7a:ac:55:d7:cb:46:46:3e:57:50:cf:a9: 24:4a:23:f1:b1:0f:ff:32:ff:be:61:e5:76:9b:b0:82: 79:03:ed:c9:1c:64:b4:3f:bb:1b:70:f3:f1:6c:6c:ea: 0b:01:74:21:dc:54:a3:d7:0d:49:eb:6e:14:4f:67:5b: 1d:ae:02:61:18:30:10:2f:58:2c:19:ab:2a:a5:82:fa: a6:43:d0:54:60:d3:f1:50:40:50:8b:14:21:0e:f9:04: 84:74:d6:08:18:d8:b0:c0:f8:30:37:6c:a5:59:60:25: 6f:c7:85:3d:71:c3:2d:9e:2a:ae:b6:e8:a3:d2:3a:e7: 03:27:4b:dc:da:73:e9:47:57:f0:f4:92:f2:09:53:02: 0b:ec:7e:63:e3:12:8a:e1:7d:90:d3:ec:4f:0d:c3:79: a6:a5:a7:86:44:f8:5e:31:f6:21:90:2a:66:69:a6:82: ad:8d:f1:62:a8:ef:bf:44:22:a7:5a:43:e4:58:73:21: c7:99:f9:54:7c:75:7a:70:19:b7:07:c5:b8:f8:c0:46: 3f:16:a3:0f:c0:84:ca:a7:54:31:53:e3:83:13:cd:5f: 70:ce:fe:82:5e:0c:7f:0a:9f:8c:1e:e2:f2:43:a2:26: 86:68:05:19:09:63:eb:0d:20:bf:8b:d5:2c:bd:22:c2 Fingerprint (SHA-256): 8C:8D:E5:94:41:FB:54:8F:E7:7A:E7:C8:72:65:63:6A:F0:D1:B3:61:B5:6B:A8:71:CA:3A:6B:3F:0F:8A:07:11 Fingerprint (SHA1): 0A:8B:4A:1D:42:BB:FE:F7:D0:EB:EA:54:7A:2A:AF:A9:7B:79:EA:E0 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #12144: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12145: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12146: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #12147: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #12148: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201990 (0x19581146) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:30:15 2016 Not After : Sun Apr 25 20:30:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:87:9f:dd:a2:4e:a3:1d:9a:8a:33:7b:69:c3:e3:05: 57:29:9f:76:d0:a4:17:2c:dd:8d:7c:1e:9d:8d:3f:ef: 1c:b3:44:fb:af:64:03:0d:cc:d4:79:ca:a5:df:21:03: 61:f9:7c:2c:49:e1:56:a7:ef:29:8b:ce:d3:1c:8f:18: 8d:d1:e4:05:ee:37:db:ee:67:85:a0:bb:91:71:42:7e: 24:fa:ec:9f:b2:c5:a0:11:98:2b:4a:74:6f:df:eb:1f: 1d:47:a5:04:f3:da:1b:1c:0b:26:db:56:b3:c2:33:06: b7:1e:07:96:08:3b:e0:52:1b:83:b6:d3:e7:50:b0:a7: 8a:d9:a9:0d:4f:f0:2d:a1:68:e6:14:18:a3:10:61:09: c2:e8:2b:56:84:bc:fb:66:a8:91:cf:1b:36:f5:52:b4: fa:58:de:76:1d:a4:4c:f2:f9:57:08:a0:8a:1a:94:b3: 64:6a:a8:01:99:29:96:c0:db:fa:fd:dc:23:f6:f7:f3: b4:4f:a8:65:fa:01:c5:eb:87:b8:44:12:8f:27:0c:01: 8a:00:95:ca:61:7f:3a:0f:32:b5:62:df:85:18:b9:8b: 69:61:53:ef:a1:fd:b5:81:20:f8:2c:ee:b1:31:0f:d2: 03:e6:fe:5e:fe:09:a3:df:8f:69:89:8b:66:df:a3:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:4d:e8:0a:a9:9b:a0:7b:e0:a5:2a:61:46:03:01:a3: 14:66:0f:de:e0:8e:01:9f:94:13:68:3d:37:2f:1b:86: f6:45:4c:31:ea:ef:a2:30:f9:84:f0:7c:42:8d:4a:ea: 4f:e0:a4:ce:bb:6c:9f:e1:c1:70:5f:bb:44:35:08:cc: 50:c9:a1:a9:20:81:81:37:13:dc:e0:23:de:b7:83:7c: cd:a2:a3:a1:1d:d6:da:71:b4:cd:f8:17:8a:ab:4a:a8: 6d:b4:d1:c8:51:35:02:e4:f6:78:73:fb:41:eb:ae:85: 30:21:c7:4e:1b:75:5b:53:6c:8c:2a:4e:bc:da:a3:50: 66:f9:a0:2f:ad:08:bf:dc:46:b8:b8:69:14:92:61:33: ce:d5:1a:7c:53:cd:84:00:78:7f:15:d8:cf:38:99:32: 80:be:0d:42:80:d8:28:75:fe:73:f7:9c:c0:67:23:43: bc:d8:d4:d3:49:43:2e:84:a7:54:6c:ab:08:fa:6b:38: 71:05:b4:cd:30:10:c6:8c:78:af:50:36:46:4b:fa:23: 67:fd:5b:0b:9d:8d:3d:8d:92:02:03:70:e8:a3:ec:e5: 3a:ed:66:03:8f:4f:2c:ad:c9:f2:f1:af:19:66:9c:f0: bc:e6:67:2a:36:53:fc:c6:62:40:52:f8:6b:88:d5:38 Fingerprint (SHA-256): B2:81:22:29:5B:8E:CF:DF:13:E2:C3:E6:00:FD:56:1F:27:13:E9:BC:16:11:C7:B4:87:10:02:5C:C7:0E:1D:44 Fingerprint (SHA1): F6:42:AE:87:C0:97:E4:A8:8F:00:13:5E:6E:9D:A0:9E:71:14:F7:1C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12149: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12150: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201991 (0x19581147) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:30:25 2016 Not After : Sun Apr 25 20:30:25 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:4b:fb:dd:b9:af:1f:54:1d:df:c4:91:a4:2d:ca:71: 72:f4:91:f6:b3:ac:cf:92:5f:5c:a8:9d:89:50:83:67: c2:7d:6e:8f:88:b4:09:17:5a:21:ec:01:22:93:aa:7c: 35:a4:2a:b1:cd:19:33:73:53:7d:c5:fa:2d:79:99:4a: 4c:82:00:c4:27:bd:70:a8:68:bb:7e:6e:a9:fe:c5:a2: dd:a3:b5:ae:ef:54:13:51:cd:01:80:a7:21:73:ab:d9: 09:28:6a:e3:5c:97:f1:5f:1a:dc:b5:89:e5:69:93:4c: d3:ff:31:b4:10:87:a5:6a:df:ad:1f:ae:19:54:f0:26: 23:c8:c0:1a:f8:22:c2:fb:36:55:04:f0:7f:e3:c3:99: 19:2d:b1:9c:86:b5:85:af:84:76:b5:78:63:a1:c5:7d: 7e:93:80:9b:6f:46:50:5d:9c:3b:be:4d:4a:cd:a7:1d: 02:79:0b:ec:b6:e2:ff:a8:4a:34:2f:56:11:9f:98:82: fd:27:27:6f:6e:08:c4:3f:a4:e3:65:c6:ea:50:db:55: 47:d6:f1:56:d0:08:9b:55:44:1a:79:fa:f6:e4:71:b7: f9:e1:51:e3:05:0c:41:bf:06:01:fb:0f:82:a6:b3:56: 2b:94:a3:04:e7:95:d9:96:9d:0e:a5:fe:6e:fa:46:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:6e:a3:a5:3a:f9:3e:50:d7:eb:b1:69:69:cf:d7:ff: 06:e9:36:b0:d9:23:28:8e:7d:d8:61:83:58:d1:1e:1e: dc:39:d3:7b:cd:0b:32:5a:6e:22:5f:a2:f5:8c:8a:6d: 6a:5b:1b:01:02:e6:13:0c:b2:21:44:eb:0b:f4:84:38: f7:9a:22:3a:1d:0c:10:d1:d1:b8:4b:55:63:3a:08:7d: 8d:6b:60:4c:af:bf:5f:fe:fd:fc:43:67:11:c5:d8:76: 14:d9:ad:c3:80:33:66:31:50:fa:a4:0d:b8:87:dd:33: 75:2c:6c:72:aa:3d:87:25:36:be:cc:f2:b1:53:11:b7: e1:e9:e5:fa:19:89:0b:d5:e3:67:25:85:72:1d:2e:ce: 13:e1:bf:2e:fa:ec:9e:0d:44:9e:14:85:e5:81:59:5e: ba:73:58:e6:98:7d:32:9d:ce:48:fc:be:56:18:b6:7d: d7:05:8a:95:c2:c3:ae:e9:d9:c1:db:51:ba:b0:be:15: 41:ee:71:a4:f7:5e:53:f2:57:64:fe:df:fb:98:18:63: b1:60:36:61:7e:db:a4:67:a6:2e:c2:ea:90:f9:7f:48: f4:b4:e7:00:90:36:0d:21:13:b3:f3:31:19:96:ae:4b: 48:eb:86:7a:e1:23:81:9b:19:f5:ec:a6:e2:69:7b:bc Fingerprint (SHA-256): 3B:05:1D:7D:FC:30:41:EF:60:03:B5:7A:CE:8C:AF:26:16:FE:51:42:FF:31:AD:1A:A6:2D:08:14:79:BE:9A:C6 Fingerprint (SHA1): D1:5E:64:06:DA:B2:25:F8:36:F1:92:24:98:AE:75:B4:26:04:93:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12151: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12152: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201992 (0x19581148) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:30:33 2016 Not After : Sun Apr 25 20:30:33 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:43:96:77:3f:7b:26:87:16:91:cc:01:9f:e9:f1:a8: aa:33:fb:e2:60:70:d1:cd:8d:e1:8d:32:f8:47:7a:3e: 0e:1c:77:f0:d0:68:de:c8:64:a0:36:1d:52:ac:f1:02: c8:34:df:0e:13:c8:aa:b2:a2:f3:18:07:67:b4:38:c1: d2:78:22:6c:4b:39:23:3e:5c:61:1b:d6:63:bd:2c:4d: aa:f0:20:a0:9d:3b:59:7c:d5:c8:2c:19:12:85:ea:29: a6:f3:b2:e4:e3:d2:55:f8:01:6f:f5:77:50:71:80:41: f9:ea:d3:39:15:de:68:12:48:d8:c7:3a:7b:72:af:a8: 6a:36:15:41:96:7f:39:ab:aa:41:d8:1e:43:f5:51:6f: af:a9:a4:49:04:ac:1c:f2:b7:61:bc:71:b1:70:15:50: c0:50:7c:da:21:7d:a4:74:26:68:cf:ed:93:d1:e1:c5: 75:fb:0e:74:f8:9e:8b:9e:66:c2:38:54:4d:92:b2:0d: f3:0f:a3:79:28:ee:9c:f1:38:57:61:ea:2d:a8:ce:00: 80:f0:d3:c4:13:13:a3:c9:92:c5:65:e3:b7:15:a8:8b: 63:dc:3e:30:f0:76:7a:17:61:62:00:05:ff:67:70:b5: 13:dc:f2:6d:76:fb:1f:f5:95:76:50:43:20:46:14:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:04:23:e7:7a:ac:55:d7:cb:46:46:3e:57:50:cf:a9: 24:4a:23:f1:b1:0f:ff:32:ff:be:61:e5:76:9b:b0:82: 79:03:ed:c9:1c:64:b4:3f:bb:1b:70:f3:f1:6c:6c:ea: 0b:01:74:21:dc:54:a3:d7:0d:49:eb:6e:14:4f:67:5b: 1d:ae:02:61:18:30:10:2f:58:2c:19:ab:2a:a5:82:fa: a6:43:d0:54:60:d3:f1:50:40:50:8b:14:21:0e:f9:04: 84:74:d6:08:18:d8:b0:c0:f8:30:37:6c:a5:59:60:25: 6f:c7:85:3d:71:c3:2d:9e:2a:ae:b6:e8:a3:d2:3a:e7: 03:27:4b:dc:da:73:e9:47:57:f0:f4:92:f2:09:53:02: 0b:ec:7e:63:e3:12:8a:e1:7d:90:d3:ec:4f:0d:c3:79: a6:a5:a7:86:44:f8:5e:31:f6:21:90:2a:66:69:a6:82: ad:8d:f1:62:a8:ef:bf:44:22:a7:5a:43:e4:58:73:21: c7:99:f9:54:7c:75:7a:70:19:b7:07:c5:b8:f8:c0:46: 3f:16:a3:0f:c0:84:ca:a7:54:31:53:e3:83:13:cd:5f: 70:ce:fe:82:5e:0c:7f:0a:9f:8c:1e:e2:f2:43:a2:26: 86:68:05:19:09:63:eb:0d:20:bf:8b:d5:2c:bd:22:c2 Fingerprint (SHA-256): 8C:8D:E5:94:41:FB:54:8F:E7:7A:E7:C8:72:65:63:6A:F0:D1:B3:61:B5:6B:A8:71:CA:3A:6B:3F:0F:8A:07:11 Fingerprint (SHA1): 0A:8B:4A:1D:42:BB:FE:F7:D0:EB:EA:54:7A:2A:AF:A9:7B:79:EA:E0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #12153: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12154: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201990 (0x19581146) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:30:15 2016 Not After : Sun Apr 25 20:30:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:87:9f:dd:a2:4e:a3:1d:9a:8a:33:7b:69:c3:e3:05: 57:29:9f:76:d0:a4:17:2c:dd:8d:7c:1e:9d:8d:3f:ef: 1c:b3:44:fb:af:64:03:0d:cc:d4:79:ca:a5:df:21:03: 61:f9:7c:2c:49:e1:56:a7:ef:29:8b:ce:d3:1c:8f:18: 8d:d1:e4:05:ee:37:db:ee:67:85:a0:bb:91:71:42:7e: 24:fa:ec:9f:b2:c5:a0:11:98:2b:4a:74:6f:df:eb:1f: 1d:47:a5:04:f3:da:1b:1c:0b:26:db:56:b3:c2:33:06: b7:1e:07:96:08:3b:e0:52:1b:83:b6:d3:e7:50:b0:a7: 8a:d9:a9:0d:4f:f0:2d:a1:68:e6:14:18:a3:10:61:09: c2:e8:2b:56:84:bc:fb:66:a8:91:cf:1b:36:f5:52:b4: fa:58:de:76:1d:a4:4c:f2:f9:57:08:a0:8a:1a:94:b3: 64:6a:a8:01:99:29:96:c0:db:fa:fd:dc:23:f6:f7:f3: b4:4f:a8:65:fa:01:c5:eb:87:b8:44:12:8f:27:0c:01: 8a:00:95:ca:61:7f:3a:0f:32:b5:62:df:85:18:b9:8b: 69:61:53:ef:a1:fd:b5:81:20:f8:2c:ee:b1:31:0f:d2: 03:e6:fe:5e:fe:09:a3:df:8f:69:89:8b:66:df:a3:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:4d:e8:0a:a9:9b:a0:7b:e0:a5:2a:61:46:03:01:a3: 14:66:0f:de:e0:8e:01:9f:94:13:68:3d:37:2f:1b:86: f6:45:4c:31:ea:ef:a2:30:f9:84:f0:7c:42:8d:4a:ea: 4f:e0:a4:ce:bb:6c:9f:e1:c1:70:5f:bb:44:35:08:cc: 50:c9:a1:a9:20:81:81:37:13:dc:e0:23:de:b7:83:7c: cd:a2:a3:a1:1d:d6:da:71:b4:cd:f8:17:8a:ab:4a:a8: 6d:b4:d1:c8:51:35:02:e4:f6:78:73:fb:41:eb:ae:85: 30:21:c7:4e:1b:75:5b:53:6c:8c:2a:4e:bc:da:a3:50: 66:f9:a0:2f:ad:08:bf:dc:46:b8:b8:69:14:92:61:33: ce:d5:1a:7c:53:cd:84:00:78:7f:15:d8:cf:38:99:32: 80:be:0d:42:80:d8:28:75:fe:73:f7:9c:c0:67:23:43: bc:d8:d4:d3:49:43:2e:84:a7:54:6c:ab:08:fa:6b:38: 71:05:b4:cd:30:10:c6:8c:78:af:50:36:46:4b:fa:23: 67:fd:5b:0b:9d:8d:3d:8d:92:02:03:70:e8:a3:ec:e5: 3a:ed:66:03:8f:4f:2c:ad:c9:f2:f1:af:19:66:9c:f0: bc:e6:67:2a:36:53:fc:c6:62:40:52:f8:6b:88:d5:38 Fingerprint (SHA-256): B2:81:22:29:5B:8E:CF:DF:13:E2:C3:E6:00:FD:56:1F:27:13:E9:BC:16:11:C7:B4:87:10:02:5C:C7:0E:1D:44 Fingerprint (SHA1): F6:42:AE:87:C0:97:E4:A8:8F:00:13:5E:6E:9D:A0:9E:71:14:F7:1C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12155: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201990 (0x19581146) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:30:15 2016 Not After : Sun Apr 25 20:30:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:87:9f:dd:a2:4e:a3:1d:9a:8a:33:7b:69:c3:e3:05: 57:29:9f:76:d0:a4:17:2c:dd:8d:7c:1e:9d:8d:3f:ef: 1c:b3:44:fb:af:64:03:0d:cc:d4:79:ca:a5:df:21:03: 61:f9:7c:2c:49:e1:56:a7:ef:29:8b:ce:d3:1c:8f:18: 8d:d1:e4:05:ee:37:db:ee:67:85:a0:bb:91:71:42:7e: 24:fa:ec:9f:b2:c5:a0:11:98:2b:4a:74:6f:df:eb:1f: 1d:47:a5:04:f3:da:1b:1c:0b:26:db:56:b3:c2:33:06: b7:1e:07:96:08:3b:e0:52:1b:83:b6:d3:e7:50:b0:a7: 8a:d9:a9:0d:4f:f0:2d:a1:68:e6:14:18:a3:10:61:09: c2:e8:2b:56:84:bc:fb:66:a8:91:cf:1b:36:f5:52:b4: fa:58:de:76:1d:a4:4c:f2:f9:57:08:a0:8a:1a:94:b3: 64:6a:a8:01:99:29:96:c0:db:fa:fd:dc:23:f6:f7:f3: b4:4f:a8:65:fa:01:c5:eb:87:b8:44:12:8f:27:0c:01: 8a:00:95:ca:61:7f:3a:0f:32:b5:62:df:85:18:b9:8b: 69:61:53:ef:a1:fd:b5:81:20:f8:2c:ee:b1:31:0f:d2: 03:e6:fe:5e:fe:09:a3:df:8f:69:89:8b:66:df:a3:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:4d:e8:0a:a9:9b:a0:7b:e0:a5:2a:61:46:03:01:a3: 14:66:0f:de:e0:8e:01:9f:94:13:68:3d:37:2f:1b:86: f6:45:4c:31:ea:ef:a2:30:f9:84:f0:7c:42:8d:4a:ea: 4f:e0:a4:ce:bb:6c:9f:e1:c1:70:5f:bb:44:35:08:cc: 50:c9:a1:a9:20:81:81:37:13:dc:e0:23:de:b7:83:7c: cd:a2:a3:a1:1d:d6:da:71:b4:cd:f8:17:8a:ab:4a:a8: 6d:b4:d1:c8:51:35:02:e4:f6:78:73:fb:41:eb:ae:85: 30:21:c7:4e:1b:75:5b:53:6c:8c:2a:4e:bc:da:a3:50: 66:f9:a0:2f:ad:08:bf:dc:46:b8:b8:69:14:92:61:33: ce:d5:1a:7c:53:cd:84:00:78:7f:15:d8:cf:38:99:32: 80:be:0d:42:80:d8:28:75:fe:73:f7:9c:c0:67:23:43: bc:d8:d4:d3:49:43:2e:84:a7:54:6c:ab:08:fa:6b:38: 71:05:b4:cd:30:10:c6:8c:78:af:50:36:46:4b:fa:23: 67:fd:5b:0b:9d:8d:3d:8d:92:02:03:70:e8:a3:ec:e5: 3a:ed:66:03:8f:4f:2c:ad:c9:f2:f1:af:19:66:9c:f0: bc:e6:67:2a:36:53:fc:c6:62:40:52:f8:6b:88:d5:38 Fingerprint (SHA-256): B2:81:22:29:5B:8E:CF:DF:13:E2:C3:E6:00:FD:56:1F:27:13:E9:BC:16:11:C7:B4:87:10:02:5C:C7:0E:1D:44 Fingerprint (SHA1): F6:42:AE:87:C0:97:E4:A8:8F:00:13:5E:6E:9D:A0:9E:71:14:F7:1C Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12156: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201991 (0x19581147) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:30:25 2016 Not After : Sun Apr 25 20:30:25 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:4b:fb:dd:b9:af:1f:54:1d:df:c4:91:a4:2d:ca:71: 72:f4:91:f6:b3:ac:cf:92:5f:5c:a8:9d:89:50:83:67: c2:7d:6e:8f:88:b4:09:17:5a:21:ec:01:22:93:aa:7c: 35:a4:2a:b1:cd:19:33:73:53:7d:c5:fa:2d:79:99:4a: 4c:82:00:c4:27:bd:70:a8:68:bb:7e:6e:a9:fe:c5:a2: dd:a3:b5:ae:ef:54:13:51:cd:01:80:a7:21:73:ab:d9: 09:28:6a:e3:5c:97:f1:5f:1a:dc:b5:89:e5:69:93:4c: d3:ff:31:b4:10:87:a5:6a:df:ad:1f:ae:19:54:f0:26: 23:c8:c0:1a:f8:22:c2:fb:36:55:04:f0:7f:e3:c3:99: 19:2d:b1:9c:86:b5:85:af:84:76:b5:78:63:a1:c5:7d: 7e:93:80:9b:6f:46:50:5d:9c:3b:be:4d:4a:cd:a7:1d: 02:79:0b:ec:b6:e2:ff:a8:4a:34:2f:56:11:9f:98:82: fd:27:27:6f:6e:08:c4:3f:a4:e3:65:c6:ea:50:db:55: 47:d6:f1:56:d0:08:9b:55:44:1a:79:fa:f6:e4:71:b7: f9:e1:51:e3:05:0c:41:bf:06:01:fb:0f:82:a6:b3:56: 2b:94:a3:04:e7:95:d9:96:9d:0e:a5:fe:6e:fa:46:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:6e:a3:a5:3a:f9:3e:50:d7:eb:b1:69:69:cf:d7:ff: 06:e9:36:b0:d9:23:28:8e:7d:d8:61:83:58:d1:1e:1e: dc:39:d3:7b:cd:0b:32:5a:6e:22:5f:a2:f5:8c:8a:6d: 6a:5b:1b:01:02:e6:13:0c:b2:21:44:eb:0b:f4:84:38: f7:9a:22:3a:1d:0c:10:d1:d1:b8:4b:55:63:3a:08:7d: 8d:6b:60:4c:af:bf:5f:fe:fd:fc:43:67:11:c5:d8:76: 14:d9:ad:c3:80:33:66:31:50:fa:a4:0d:b8:87:dd:33: 75:2c:6c:72:aa:3d:87:25:36:be:cc:f2:b1:53:11:b7: e1:e9:e5:fa:19:89:0b:d5:e3:67:25:85:72:1d:2e:ce: 13:e1:bf:2e:fa:ec:9e:0d:44:9e:14:85:e5:81:59:5e: ba:73:58:e6:98:7d:32:9d:ce:48:fc:be:56:18:b6:7d: d7:05:8a:95:c2:c3:ae:e9:d9:c1:db:51:ba:b0:be:15: 41:ee:71:a4:f7:5e:53:f2:57:64:fe:df:fb:98:18:63: b1:60:36:61:7e:db:a4:67:a6:2e:c2:ea:90:f9:7f:48: f4:b4:e7:00:90:36:0d:21:13:b3:f3:31:19:96:ae:4b: 48:eb:86:7a:e1:23:81:9b:19:f5:ec:a6:e2:69:7b:bc Fingerprint (SHA-256): 3B:05:1D:7D:FC:30:41:EF:60:03:B5:7A:CE:8C:AF:26:16:FE:51:42:FF:31:AD:1A:A6:2D:08:14:79:BE:9A:C6 Fingerprint (SHA1): D1:5E:64:06:DA:B2:25:F8:36:F1:92:24:98:AE:75:B4:26:04:93:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12157: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201991 (0x19581147) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:30:25 2016 Not After : Sun Apr 25 20:30:25 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:4b:fb:dd:b9:af:1f:54:1d:df:c4:91:a4:2d:ca:71: 72:f4:91:f6:b3:ac:cf:92:5f:5c:a8:9d:89:50:83:67: c2:7d:6e:8f:88:b4:09:17:5a:21:ec:01:22:93:aa:7c: 35:a4:2a:b1:cd:19:33:73:53:7d:c5:fa:2d:79:99:4a: 4c:82:00:c4:27:bd:70:a8:68:bb:7e:6e:a9:fe:c5:a2: dd:a3:b5:ae:ef:54:13:51:cd:01:80:a7:21:73:ab:d9: 09:28:6a:e3:5c:97:f1:5f:1a:dc:b5:89:e5:69:93:4c: d3:ff:31:b4:10:87:a5:6a:df:ad:1f:ae:19:54:f0:26: 23:c8:c0:1a:f8:22:c2:fb:36:55:04:f0:7f:e3:c3:99: 19:2d:b1:9c:86:b5:85:af:84:76:b5:78:63:a1:c5:7d: 7e:93:80:9b:6f:46:50:5d:9c:3b:be:4d:4a:cd:a7:1d: 02:79:0b:ec:b6:e2:ff:a8:4a:34:2f:56:11:9f:98:82: fd:27:27:6f:6e:08:c4:3f:a4:e3:65:c6:ea:50:db:55: 47:d6:f1:56:d0:08:9b:55:44:1a:79:fa:f6:e4:71:b7: f9:e1:51:e3:05:0c:41:bf:06:01:fb:0f:82:a6:b3:56: 2b:94:a3:04:e7:95:d9:96:9d:0e:a5:fe:6e:fa:46:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:6e:a3:a5:3a:f9:3e:50:d7:eb:b1:69:69:cf:d7:ff: 06:e9:36:b0:d9:23:28:8e:7d:d8:61:83:58:d1:1e:1e: dc:39:d3:7b:cd:0b:32:5a:6e:22:5f:a2:f5:8c:8a:6d: 6a:5b:1b:01:02:e6:13:0c:b2:21:44:eb:0b:f4:84:38: f7:9a:22:3a:1d:0c:10:d1:d1:b8:4b:55:63:3a:08:7d: 8d:6b:60:4c:af:bf:5f:fe:fd:fc:43:67:11:c5:d8:76: 14:d9:ad:c3:80:33:66:31:50:fa:a4:0d:b8:87:dd:33: 75:2c:6c:72:aa:3d:87:25:36:be:cc:f2:b1:53:11:b7: e1:e9:e5:fa:19:89:0b:d5:e3:67:25:85:72:1d:2e:ce: 13:e1:bf:2e:fa:ec:9e:0d:44:9e:14:85:e5:81:59:5e: ba:73:58:e6:98:7d:32:9d:ce:48:fc:be:56:18:b6:7d: d7:05:8a:95:c2:c3:ae:e9:d9:c1:db:51:ba:b0:be:15: 41:ee:71:a4:f7:5e:53:f2:57:64:fe:df:fb:98:18:63: b1:60:36:61:7e:db:a4:67:a6:2e:c2:ea:90:f9:7f:48: f4:b4:e7:00:90:36:0d:21:13:b3:f3:31:19:96:ae:4b: 48:eb:86:7a:e1:23:81:9b:19:f5:ec:a6:e2:69:7b:bc Fingerprint (SHA-256): 3B:05:1D:7D:FC:30:41:EF:60:03:B5:7A:CE:8C:AF:26:16:FE:51:42:FF:31:AD:1A:A6:2D:08:14:79:BE:9A:C6 Fingerprint (SHA1): D1:5E:64:06:DA:B2:25:F8:36:F1:92:24:98:AE:75:B4:26:04:93:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12158: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201992 (0x19581148) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:30:33 2016 Not After : Sun Apr 25 20:30:33 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:43:96:77:3f:7b:26:87:16:91:cc:01:9f:e9:f1:a8: aa:33:fb:e2:60:70:d1:cd:8d:e1:8d:32:f8:47:7a:3e: 0e:1c:77:f0:d0:68:de:c8:64:a0:36:1d:52:ac:f1:02: c8:34:df:0e:13:c8:aa:b2:a2:f3:18:07:67:b4:38:c1: d2:78:22:6c:4b:39:23:3e:5c:61:1b:d6:63:bd:2c:4d: aa:f0:20:a0:9d:3b:59:7c:d5:c8:2c:19:12:85:ea:29: a6:f3:b2:e4:e3:d2:55:f8:01:6f:f5:77:50:71:80:41: f9:ea:d3:39:15:de:68:12:48:d8:c7:3a:7b:72:af:a8: 6a:36:15:41:96:7f:39:ab:aa:41:d8:1e:43:f5:51:6f: af:a9:a4:49:04:ac:1c:f2:b7:61:bc:71:b1:70:15:50: c0:50:7c:da:21:7d:a4:74:26:68:cf:ed:93:d1:e1:c5: 75:fb:0e:74:f8:9e:8b:9e:66:c2:38:54:4d:92:b2:0d: f3:0f:a3:79:28:ee:9c:f1:38:57:61:ea:2d:a8:ce:00: 80:f0:d3:c4:13:13:a3:c9:92:c5:65:e3:b7:15:a8:8b: 63:dc:3e:30:f0:76:7a:17:61:62:00:05:ff:67:70:b5: 13:dc:f2:6d:76:fb:1f:f5:95:76:50:43:20:46:14:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:04:23:e7:7a:ac:55:d7:cb:46:46:3e:57:50:cf:a9: 24:4a:23:f1:b1:0f:ff:32:ff:be:61:e5:76:9b:b0:82: 79:03:ed:c9:1c:64:b4:3f:bb:1b:70:f3:f1:6c:6c:ea: 0b:01:74:21:dc:54:a3:d7:0d:49:eb:6e:14:4f:67:5b: 1d:ae:02:61:18:30:10:2f:58:2c:19:ab:2a:a5:82:fa: a6:43:d0:54:60:d3:f1:50:40:50:8b:14:21:0e:f9:04: 84:74:d6:08:18:d8:b0:c0:f8:30:37:6c:a5:59:60:25: 6f:c7:85:3d:71:c3:2d:9e:2a:ae:b6:e8:a3:d2:3a:e7: 03:27:4b:dc:da:73:e9:47:57:f0:f4:92:f2:09:53:02: 0b:ec:7e:63:e3:12:8a:e1:7d:90:d3:ec:4f:0d:c3:79: a6:a5:a7:86:44:f8:5e:31:f6:21:90:2a:66:69:a6:82: ad:8d:f1:62:a8:ef:bf:44:22:a7:5a:43:e4:58:73:21: c7:99:f9:54:7c:75:7a:70:19:b7:07:c5:b8:f8:c0:46: 3f:16:a3:0f:c0:84:ca:a7:54:31:53:e3:83:13:cd:5f: 70:ce:fe:82:5e:0c:7f:0a:9f:8c:1e:e2:f2:43:a2:26: 86:68:05:19:09:63:eb:0d:20:bf:8b:d5:2c:bd:22:c2 Fingerprint (SHA-256): 8C:8D:E5:94:41:FB:54:8F:E7:7A:E7:C8:72:65:63:6A:F0:D1:B3:61:B5:6B:A8:71:CA:3A:6B:3F:0F:8A:07:11 Fingerprint (SHA1): 0A:8B:4A:1D:42:BB:FE:F7:D0:EB:EA:54:7A:2A:AF:A9:7B:79:EA:E0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #12159: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201992 (0x19581148) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:30:33 2016 Not After : Sun Apr 25 20:30:33 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:43:96:77:3f:7b:26:87:16:91:cc:01:9f:e9:f1:a8: aa:33:fb:e2:60:70:d1:cd:8d:e1:8d:32:f8:47:7a:3e: 0e:1c:77:f0:d0:68:de:c8:64:a0:36:1d:52:ac:f1:02: c8:34:df:0e:13:c8:aa:b2:a2:f3:18:07:67:b4:38:c1: d2:78:22:6c:4b:39:23:3e:5c:61:1b:d6:63:bd:2c:4d: aa:f0:20:a0:9d:3b:59:7c:d5:c8:2c:19:12:85:ea:29: a6:f3:b2:e4:e3:d2:55:f8:01:6f:f5:77:50:71:80:41: f9:ea:d3:39:15:de:68:12:48:d8:c7:3a:7b:72:af:a8: 6a:36:15:41:96:7f:39:ab:aa:41:d8:1e:43:f5:51:6f: af:a9:a4:49:04:ac:1c:f2:b7:61:bc:71:b1:70:15:50: c0:50:7c:da:21:7d:a4:74:26:68:cf:ed:93:d1:e1:c5: 75:fb:0e:74:f8:9e:8b:9e:66:c2:38:54:4d:92:b2:0d: f3:0f:a3:79:28:ee:9c:f1:38:57:61:ea:2d:a8:ce:00: 80:f0:d3:c4:13:13:a3:c9:92:c5:65:e3:b7:15:a8:8b: 63:dc:3e:30:f0:76:7a:17:61:62:00:05:ff:67:70:b5: 13:dc:f2:6d:76:fb:1f:f5:95:76:50:43:20:46:14:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:04:23:e7:7a:ac:55:d7:cb:46:46:3e:57:50:cf:a9: 24:4a:23:f1:b1:0f:ff:32:ff:be:61:e5:76:9b:b0:82: 79:03:ed:c9:1c:64:b4:3f:bb:1b:70:f3:f1:6c:6c:ea: 0b:01:74:21:dc:54:a3:d7:0d:49:eb:6e:14:4f:67:5b: 1d:ae:02:61:18:30:10:2f:58:2c:19:ab:2a:a5:82:fa: a6:43:d0:54:60:d3:f1:50:40:50:8b:14:21:0e:f9:04: 84:74:d6:08:18:d8:b0:c0:f8:30:37:6c:a5:59:60:25: 6f:c7:85:3d:71:c3:2d:9e:2a:ae:b6:e8:a3:d2:3a:e7: 03:27:4b:dc:da:73:e9:47:57:f0:f4:92:f2:09:53:02: 0b:ec:7e:63:e3:12:8a:e1:7d:90:d3:ec:4f:0d:c3:79: a6:a5:a7:86:44:f8:5e:31:f6:21:90:2a:66:69:a6:82: ad:8d:f1:62:a8:ef:bf:44:22:a7:5a:43:e4:58:73:21: c7:99:f9:54:7c:75:7a:70:19:b7:07:c5:b8:f8:c0:46: 3f:16:a3:0f:c0:84:ca:a7:54:31:53:e3:83:13:cd:5f: 70:ce:fe:82:5e:0c:7f:0a:9f:8c:1e:e2:f2:43:a2:26: 86:68:05:19:09:63:eb:0d:20:bf:8b:d5:2c:bd:22:c2 Fingerprint (SHA-256): 8C:8D:E5:94:41:FB:54:8F:E7:7A:E7:C8:72:65:63:6A:F0:D1:B3:61:B5:6B:A8:71:CA:3A:6B:3F:0F:8A:07:11 Fingerprint (SHA1): 0A:8B:4A:1D:42:BB:FE:F7:D0:EB:EA:54:7A:2A:AF:A9:7B:79:EA:E0 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #12160: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #12161: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425201995 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12162: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #12163: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12164: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12165: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425201996 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12166: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12167: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12168: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12169: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425201997 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #12170: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12171: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #12172: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12173: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 425201998 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12174: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12175: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #12176: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12177: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425201999 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12178: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12179: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #12180: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12181: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425202000 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12182: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12183: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #12184: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12185: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 425202001 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12186: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12187: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12188: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #12189: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #12190: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #12191: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #12192: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201995 (0x1958114b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:31:13 2016 Not After : Sun Apr 25 20:31:13 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:74:01:fe:4a:5d:ca:5e:ed:03:3a:c2:81:e1:a7:f6: ec:23:b8:94:70:64:36:f1:55:c7:76:0f:c6:1e:17:a6: 8c:b9:e0:37:a0:de:57:d3:93:46:b9:b9:68:36:08:1f: 42:6d:90:ad:8a:08:95:db:cc:df:b0:2d:a9:ac:96:fd: fe:76:8b:a2:4d:de:c7:6c:be:a6:11:09:71:f2:14:4d: 3c:78:c4:0d:23:d0:4a:0a:fe:74:79:0f:4f:37:f2:5b: 25:c7:cc:20:ce:81:e5:0c:7e:1a:5d:05:90:e3:07:84: b4:65:1d:96:91:7e:42:08:b6:b6:1b:04:89:9d:aa:a5: 31:a3:a4:73:04:d6:42:cb:46:d1:67:7f:c0:b6:86:14: 04:46:17:fb:c1:29:9a:da:bd:9f:e7:ef:8f:99:85:d0: 27:79:91:6d:b4:f1:df:c9:36:b2:f6:bf:72:75:f7:b6: 21:a1:17:e5:37:2d:7e:39:94:60:b5:91:7b:75:81:3b: df:ad:dd:d7:0b:4c:c5:7c:00:7b:84:ec:d3:75:d9:ff: b4:12:15:44:04:47:c9:76:71:5b:98:aa:a0:3d:d8:c6: 28:87:5e:41:0a:8a:6a:69:5b:04:83:57:63:9b:9e:a2: 2c:a3:3b:8e:a2:74:58:b8:66:58:b4:36:25:9e:51:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:24:b7:fe:37:39:ae:44:8d:c9:af:d4:0b:c8:f4:0a: 52:9e:34:b5:b5:7e:c1:31:21:a8:62:ae:8e:86:4f:e5: 7f:0e:f0:53:f8:55:89:2d:fd:38:c6:db:01:a7:82:f2: 5e:05:02:12:6c:b2:f4:3f:8a:e8:24:61:21:f2:c3:ce: 74:5d:43:56:44:98:4b:15:41:f2:ee:96:52:c8:55:b2: b9:7a:1c:8a:de:98:0c:b9:d4:47:30:65:ea:ad:33:c1: 68:79:9e:9f:ac:c1:e0:9a:47:7b:74:2d:8c:27:07:18: a3:ff:37:1c:7a:0a:f0:4e:4d:16:04:7a:16:41:ee:a3: 30:1b:1e:7b:8a:b3:51:19:95:68:ec:44:10:0c:4a:92: 99:17:64:f3:e4:a0:34:b6:88:47:c0:1b:b0:55:25:51: 3c:83:5a:7c:f2:43:d8:7a:c0:cb:7f:93:db:48:60:88: f3:4c:b0:c3:80:4b:88:ed:4c:15:1f:06:88:f0:ca:9b: f1:fb:20:1c:a4:de:a6:46:0f:da:1a:8d:08:a3:74:bd: a8:b7:0e:f6:b6:3c:58:cb:05:02:1e:58:90:5f:0d:73: 3a:87:89:22:a4:07:9d:ea:37:67:2d:4b:b7:56:a9:0f: cb:6a:42:72:df:bd:96:d5:e9:1b:95:04:1e:c3:e9:d0 Fingerprint (SHA-256): 8F:B2:5A:7E:30:3A:D6:D3:85:DF:EF:88:0D:56:52:B1:25:AF:8A:DE:C8:74:25:15:54:E7:8E:93:60:CA:99:33 Fingerprint (SHA1): 54:66:1E:67:29:27:8C:89:7F:56:73:96:44:B3:77:F3:4E:B1:3F:03 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12193: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12194: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12195: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12196: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425201995 (0x1958114b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:31:13 2016 Not After : Sun Apr 25 20:31:13 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:74:01:fe:4a:5d:ca:5e:ed:03:3a:c2:81:e1:a7:f6: ec:23:b8:94:70:64:36:f1:55:c7:76:0f:c6:1e:17:a6: 8c:b9:e0:37:a0:de:57:d3:93:46:b9:b9:68:36:08:1f: 42:6d:90:ad:8a:08:95:db:cc:df:b0:2d:a9:ac:96:fd: fe:76:8b:a2:4d:de:c7:6c:be:a6:11:09:71:f2:14:4d: 3c:78:c4:0d:23:d0:4a:0a:fe:74:79:0f:4f:37:f2:5b: 25:c7:cc:20:ce:81:e5:0c:7e:1a:5d:05:90:e3:07:84: b4:65:1d:96:91:7e:42:08:b6:b6:1b:04:89:9d:aa:a5: 31:a3:a4:73:04:d6:42:cb:46:d1:67:7f:c0:b6:86:14: 04:46:17:fb:c1:29:9a:da:bd:9f:e7:ef:8f:99:85:d0: 27:79:91:6d:b4:f1:df:c9:36:b2:f6:bf:72:75:f7:b6: 21:a1:17:e5:37:2d:7e:39:94:60:b5:91:7b:75:81:3b: df:ad:dd:d7:0b:4c:c5:7c:00:7b:84:ec:d3:75:d9:ff: b4:12:15:44:04:47:c9:76:71:5b:98:aa:a0:3d:d8:c6: 28:87:5e:41:0a:8a:6a:69:5b:04:83:57:63:9b:9e:a2: 2c:a3:3b:8e:a2:74:58:b8:66:58:b4:36:25:9e:51:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:24:b7:fe:37:39:ae:44:8d:c9:af:d4:0b:c8:f4:0a: 52:9e:34:b5:b5:7e:c1:31:21:a8:62:ae:8e:86:4f:e5: 7f:0e:f0:53:f8:55:89:2d:fd:38:c6:db:01:a7:82:f2: 5e:05:02:12:6c:b2:f4:3f:8a:e8:24:61:21:f2:c3:ce: 74:5d:43:56:44:98:4b:15:41:f2:ee:96:52:c8:55:b2: b9:7a:1c:8a:de:98:0c:b9:d4:47:30:65:ea:ad:33:c1: 68:79:9e:9f:ac:c1:e0:9a:47:7b:74:2d:8c:27:07:18: a3:ff:37:1c:7a:0a:f0:4e:4d:16:04:7a:16:41:ee:a3: 30:1b:1e:7b:8a:b3:51:19:95:68:ec:44:10:0c:4a:92: 99:17:64:f3:e4:a0:34:b6:88:47:c0:1b:b0:55:25:51: 3c:83:5a:7c:f2:43:d8:7a:c0:cb:7f:93:db:48:60:88: f3:4c:b0:c3:80:4b:88:ed:4c:15:1f:06:88:f0:ca:9b: f1:fb:20:1c:a4:de:a6:46:0f:da:1a:8d:08:a3:74:bd: a8:b7:0e:f6:b6:3c:58:cb:05:02:1e:58:90:5f:0d:73: 3a:87:89:22:a4:07:9d:ea:37:67:2d:4b:b7:56:a9:0f: cb:6a:42:72:df:bd:96:d5:e9:1b:95:04:1e:c3:e9:d0 Fingerprint (SHA-256): 8F:B2:5A:7E:30:3A:D6:D3:85:DF:EF:88:0D:56:52:B1:25:AF:8A:DE:C8:74:25:15:54:E7:8E:93:60:CA:99:33 Fingerprint (SHA1): 54:66:1E:67:29:27:8C:89:7F:56:73:96:44:B3:77:F3:4E:B1:3F:03 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12197: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12198: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #12199: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202002 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12200: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #12201: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12202: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12203: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425202003 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #12204: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12205: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #12206: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12207: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 425202004 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12208: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12209: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #12210: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12211: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 425202005 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12212: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12213: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12214: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12215: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 425202006 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12216: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12217: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #12218: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12219: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 425202007 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12220: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12221: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #12222: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12223: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 425202008 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12224: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12225: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12226: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12227: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 425202009 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12228: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12229: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #12230: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12231: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 425202010 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #12232: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12233: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #12234: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12235: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 425202011 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12236: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12237: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #12238: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12239: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 425202012 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12240: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12241: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #12242: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12243: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 425202013 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12244: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12245: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #12246: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12247: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 425202014 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12248: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12249: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #12250: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12251: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 425202015 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12252: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12253: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #12254: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12255: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 425202016 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12256: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12257: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #12258: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12259: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 425202017 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12260: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12261: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #12262: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12263: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 425202018 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12264: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12265: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #12266: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12267: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 425202019 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #12268: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12269: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #12270: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12271: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 425202020 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12272: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12273: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #12274: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12275: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 425202021 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12276: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12277: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #12278: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12279: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 425202022 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12280: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12281: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #12282: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12283: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 425202023 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12284: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12285: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #12286: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12287: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 425202024 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12288: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12289: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #12290: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12291: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 425202025 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12292: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12293: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #12294: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12295: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 425202026 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12296: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12297: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #12298: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12299: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 425202027 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12300: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12301: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #12302: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12303: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 425202028 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12304: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12305: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #12306: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12307: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 425202029 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12308: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12309: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #12310: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12311: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 425202030 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12312: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12313: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #12314: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12315: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 425202031 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12316: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12317: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12318: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12319: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12320: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12321: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12322: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12323: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12324: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12325: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12326: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12327: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12328: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12329: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12330: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12331: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12332: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12333: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12334: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12335: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12336: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12337: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12338: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12339: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12340: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202002 (0x19581152) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:33:09 2016 Not After : Sun Apr 25 20:33:09 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:fa:ac:9a:73:c4:4a:d8:19:ea:34:41:34:02:da:a5: f2:ac:ee:83:f3:cd:31:13:a2:b6:62:04:0c:45:c5:ba: 0a:66:32:ed:f1:06:26:a9:19:61:e2:39:78:8e:3b:36: f8:fb:9b:de:ec:f4:09:c8:3e:37:1f:84:e8:8b:0b:f7: 68:f2:44:31:0c:9d:2b:ee:b9:cf:0e:eb:46:25:58:5e: f2:3c:44:b7:e2:35:a0:43:d4:f6:73:ca:6f:d4:cd:b4: 5f:25:39:4d:4b:81:73:30:81:59:bb:da:e6:85:fd:7e: 77:a3:72:9a:d2:e9:70:fc:1e:ae:4e:82:f9:66:a7:f2: 74:0a:18:59:28:99:4c:cb:ce:4e:77:dc:2b:c5:e0:1a: 8f:5a:29:8d:b4:cc:fc:68:17:fe:fe:04:58:4d:b4:f5: 11:02:12:a6:ce:e9:68:b7:df:ec:9b:9c:db:e9:1b:36: b2:8d:1a:25:6d:be:e5:61:02:3a:55:46:9a:90:d7:bb: 02:6a:a5:e3:b2:75:4d:74:9b:96:df:94:b8:b6:fa:46: b8:0f:5a:b2:76:61:a7:6c:c9:a2:23:d0:88:f5:3f:0b: 4d:88:ea:61:ec:e4:de:b1:6e:c9:49:0b:3d:ef:63:99: aa:ce:07:3f:5d:c6:b5:c1:29:b4:dc:26:57:b5:57:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:80:27:19:a2:03:f7:cb:8d:82:2a:10:9e:ef:0a:e3: 21:f6:2c:39:6e:85:b6:83:61:8c:50:8f:22:43:d2:6e: ac:58:ec:46:7d:7d:8c:d5:88:36:57:9e:58:68:06:e4: 8b:d9:d2:ba:45:18:58:1d:8a:4c:92:08:aa:75:51:3d: 5c:9b:7d:58:89:58:9d:d0:2b:78:cc:83:86:29:fa:b5: c3:15:3c:90:83:92:92:76:a6:52:a1:88:0f:bd:94:fa: fa:ee:c6:22:58:62:27:74:a9:db:ab:89:f3:86:46:df: 76:d0:37:04:1b:d2:69:e9:e4:44:5c:c1:55:67:03:61: bd:d7:92:a7:65:2e:f1:0b:a5:4b:7f:28:cc:4d:0a:8d: 49:97:ac:67:6c:f3:20:47:5b:72:cb:a0:65:5a:fa:0f: 2b:c6:e2:df:44:ad:76:55:06:a0:5b:db:2a:fe:f2:bd: 01:82:3b:52:fe:bc:72:e5:2f:1e:dc:44:ae:67:74:ee: b0:7f:44:d1:a0:c0:96:54:4c:5f:c2:26:8c:ee:71:07: 8e:3f:20:ae:f7:02:23:10:91:c7:09:1c:87:09:6c:09: fd:c6:2f:3f:29:07:fa:e8:5c:65:52:b2:e1:51:2f:1b: 6a:a9:a4:9a:25:ae:7d:3e:90:24:02:44:8a:76:17:75 Fingerprint (SHA-256): F1:38:8E:23:CB:09:C6:55:E7:AA:D5:F8:B0:3E:70:7B:0D:CF:AE:7A:D9:42:77:74:77:64:62:69:23:8D:07:82 Fingerprint (SHA1): 7F:12:A0:5E:57:3E:0F:84:4F:F6:B5:77:D3:43:64:8B:10:B1:52:B8 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #12341: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12342: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12343: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202032 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12344: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12345: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #12346: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12347: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 425202033 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12348: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12349: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #12350: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12351: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 425202034 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12352: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12353: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #12354: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12355: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 425202035 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12356: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12357: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #12358: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12359: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 425202036 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12360: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12361: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #12362: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12363: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 425202037 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12364: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12365: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #12366: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12367: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 425202038 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12368: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12369: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12370: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202032 (0x19581170) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:38:55 2016 Not After : Sun Apr 25 20:38:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:74:93:23:46:5f:4f:2a:a1:e2:52:db:30:8a:88:39: 89:1f:44:b3:36:af:5c:ce:3f:eb:44:34:49:4e:27:5a: 22:5b:97:a8:f5:46:60:65:28:1e:3c:20:f0:c8:5d:d5: f9:be:2a:09:b2:5d:d8:4a:4c:1b:ce:25:bd:69:25:b4: 2b:e7:66:a3:55:88:46:46:21:f3:94:0a:4f:28:0e:af: e3:78:6d:ac:7b:0a:79:d7:84:91:ed:af:80:63:2b:5e: 9d:ad:17:c9:b4:8d:aa:88:63:8b:7d:9f:73:98:75:bd: fb:a6:82:00:e3:12:6a:f2:0e:c9:75:ee:40:1b:7b:09: 99:a0:d5:1c:1e:65:70:93:59:60:90:09:17:70:5d:28: f3:fb:d9:01:9a:e3:d1:78:fd:6b:23:a8:e8:b5:ff:69: b5:fb:ff:fd:f1:ce:b1:df:62:c4:1d:50:83:43:d6:a7: 5f:95:33:ac:95:03:8b:c6:76:b7:96:50:22:5d:40:c5: f4:98:24:36:cb:f9:99:a1:42:fc:c7:9e:06:e4:e3:57: 79:75:2a:46:29:16:17:58:81:82:92:61:60:34:b5:6a: 3b:84:84:b8:93:ae:c4:60:8e:3c:0a:e6:8a:37:94:c4: 84:27:20:77:92:a9:76:92:d2:47:78:54:bd:aa:b3:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:c2:24:e9:f2:36:ab:92:23:a9:aa:b5:fc:33:9a:b6: 56:3a:4b:da:ab:ce:5d:8c:e2:ac:f9:f2:f2:aa:0f:b7: 36:8b:bf:46:49:3c:d7:6a:66:5a:e4:d9:bd:a5:77:74: db:de:46:c0:0f:dc:4d:d3:be:f5:d2:82:8d:3f:65:83: d7:3d:0b:54:32:95:d8:2f:79:0f:e1:d0:15:64:95:67: 21:5c:f8:2e:b8:d4:e4:ce:cc:d7:b8:8a:7d:b9:7d:cf: d9:ad:29:35:d6:02:fc:bf:73:0e:fe:a0:f2:4a:f6:98: a9:70:65:fe:da:82:bd:94:8f:41:22:e1:57:2f:44:f3: ae:f2:0d:1a:db:83:20:10:17:e3:a9:4c:54:8c:a2:33: 7f:22:95:66:6e:2f:a8:5e:a9:ae:90:6d:e6:f9:63:59: e5:33:54:a9:d5:28:26:92:bb:cd:2e:a9:75:77:0d:9b: b3:d6:f3:d4:b1:9e:57:73:c3:f7:d4:ff:62:ed:db:40: 3b:2d:0b:af:f1:86:ff:1b:1f:44:35:a6:da:d5:45:3f: dc:7d:d0:92:fe:c8:c4:5c:f0:49:91:98:64:be:a0:04: 44:69:b7:b8:94:4a:5a:a7:1d:5f:80:e5:5b:d1:0e:6e: cd:74:09:6d:6a:d9:1b:4e:5c:0c:d9:23:d4:7f:92:6d Fingerprint (SHA-256): AB:E9:34:1D:2D:7E:1F:30:FF:66:39:EC:5D:82:FE:C6:21:C6:83:F3:71:35:14:4F:C1:8B:EE:02:4C:AA:92:DD Fingerprint (SHA1): 28:38:11:B4:E7:37:F5:C7:50:36:89:A6:7E:39:1E:53:30:62:71:B1 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #12371: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12372: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12373: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12374: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202032 (0x19581170) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:38:55 2016 Not After : Sun Apr 25 20:38:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:74:93:23:46:5f:4f:2a:a1:e2:52:db:30:8a:88:39: 89:1f:44:b3:36:af:5c:ce:3f:eb:44:34:49:4e:27:5a: 22:5b:97:a8:f5:46:60:65:28:1e:3c:20:f0:c8:5d:d5: f9:be:2a:09:b2:5d:d8:4a:4c:1b:ce:25:bd:69:25:b4: 2b:e7:66:a3:55:88:46:46:21:f3:94:0a:4f:28:0e:af: e3:78:6d:ac:7b:0a:79:d7:84:91:ed:af:80:63:2b:5e: 9d:ad:17:c9:b4:8d:aa:88:63:8b:7d:9f:73:98:75:bd: fb:a6:82:00:e3:12:6a:f2:0e:c9:75:ee:40:1b:7b:09: 99:a0:d5:1c:1e:65:70:93:59:60:90:09:17:70:5d:28: f3:fb:d9:01:9a:e3:d1:78:fd:6b:23:a8:e8:b5:ff:69: b5:fb:ff:fd:f1:ce:b1:df:62:c4:1d:50:83:43:d6:a7: 5f:95:33:ac:95:03:8b:c6:76:b7:96:50:22:5d:40:c5: f4:98:24:36:cb:f9:99:a1:42:fc:c7:9e:06:e4:e3:57: 79:75:2a:46:29:16:17:58:81:82:92:61:60:34:b5:6a: 3b:84:84:b8:93:ae:c4:60:8e:3c:0a:e6:8a:37:94:c4: 84:27:20:77:92:a9:76:92:d2:47:78:54:bd:aa:b3:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:c2:24:e9:f2:36:ab:92:23:a9:aa:b5:fc:33:9a:b6: 56:3a:4b:da:ab:ce:5d:8c:e2:ac:f9:f2:f2:aa:0f:b7: 36:8b:bf:46:49:3c:d7:6a:66:5a:e4:d9:bd:a5:77:74: db:de:46:c0:0f:dc:4d:d3:be:f5:d2:82:8d:3f:65:83: d7:3d:0b:54:32:95:d8:2f:79:0f:e1:d0:15:64:95:67: 21:5c:f8:2e:b8:d4:e4:ce:cc:d7:b8:8a:7d:b9:7d:cf: d9:ad:29:35:d6:02:fc:bf:73:0e:fe:a0:f2:4a:f6:98: a9:70:65:fe:da:82:bd:94:8f:41:22:e1:57:2f:44:f3: ae:f2:0d:1a:db:83:20:10:17:e3:a9:4c:54:8c:a2:33: 7f:22:95:66:6e:2f:a8:5e:a9:ae:90:6d:e6:f9:63:59: e5:33:54:a9:d5:28:26:92:bb:cd:2e:a9:75:77:0d:9b: b3:d6:f3:d4:b1:9e:57:73:c3:f7:d4:ff:62:ed:db:40: 3b:2d:0b:af:f1:86:ff:1b:1f:44:35:a6:da:d5:45:3f: dc:7d:d0:92:fe:c8:c4:5c:f0:49:91:98:64:be:a0:04: 44:69:b7:b8:94:4a:5a:a7:1d:5f:80:e5:5b:d1:0e:6e: cd:74:09:6d:6a:d9:1b:4e:5c:0c:d9:23:d4:7f:92:6d Fingerprint (SHA-256): AB:E9:34:1D:2D:7E:1F:30:FF:66:39:EC:5D:82:FE:C6:21:C6:83:F3:71:35:14:4F:C1:8B:EE:02:4C:AA:92:DD Fingerprint (SHA1): 28:38:11:B4:E7:37:F5:C7:50:36:89:A6:7E:39:1E:53:30:62:71:B1 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #12375: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12376: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12377: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12378: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202039 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12379: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12380: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12381: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12382: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202040 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #12383: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12384: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12385: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12386: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202041 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12387: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12388: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #12389: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12390: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425202042 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12391: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12392: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12393: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12394: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #12395: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #12396: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202039 (0x19581177) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:41:03 2016 Not After : Sun Apr 25 20:41:03 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:ac:e5:a2:78:4f:a1:f5:e0:4d:3c:70:62:58:de:a1: dc:72:b2:6e:e0:03:ea:e4:5e:ad:2e:95:84:3a:b4:26: 22:7e:0f:e2:0f:49:e9:d4:dc:2a:19:10:5c:ff:d8:a7: 2f:31:0b:79:6c:28:57:dc:29:8c:7b:15:fd:b5:65:f0: 89:f8:22:4e:89:52:7c:78:39:83:b1:7c:8c:1d:e8:b4: 28:10:09:d3:85:e3:d2:53:f6:97:56:32:9e:27:ff:71: d1:c6:08:3d:90:a6:87:67:e7:35:b8:a0:64:c7:0e:2c: 52:de:45:bf:98:a5:3e:f2:62:b6:be:ab:a1:65:64:8a: c3:0a:72:a4:e0:54:64:7a:54:5c:c8:ce:be:1f:d2:3c: 92:0b:42:96:d0:9e:01:97:12:f1:48:66:36:04:29:d7: fc:77:c0:82:61:91:53:bf:b3:62:5f:e8:41:6a:40:88: 0d:85:1e:dc:da:99:76:12:18:3b:29:3a:04:7a:66:8f: 97:6d:08:39:7c:19:56:75:a6:fe:67:b8:c8:0e:25:87: 99:67:47:42:33:75:50:da:7b:b9:70:94:b4:18:69:84: 70:d2:5b:3d:a6:37:de:11:3c:34:af:bd:10:e3:e9:e3: cc:29:b8:a6:5e:c3:f0:72:eb:7c:79:b9:c1:fe:18:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:9b:08:a5:eb:81:bf:af:08:bb:f9:9a:ac:e0:fb:8b: f1:c7:b9:f3:3d:ee:9b:98:06:93:15:ea:3f:85:3e:13: 00:a9:7e:f0:55:72:f6:4a:44:8b:28:58:c0:75:09:08: 77:5f:9b:25:ce:bd:41:48:c0:00:66:5c:34:89:8a:05: b3:6e:96:8f:7e:73:56:08:74:93:7e:73:55:fd:32:e0: 39:bb:35:7e:f2:0f:d9:cc:fe:2c:b9:19:34:7f:20:26: 55:0a:df:fd:2a:92:22:3f:f1:4b:f3:7e:c7:98:39:9c: cb:db:1a:b4:3a:50:0f:94:2f:1e:c7:8e:ed:f3:8b:72: 1d:25:5a:2a:6f:fa:f1:84:56:03:01:c0:37:9e:df:81: 2c:92:41:22:6e:5a:64:2e:bb:49:f5:b4:56:2b:6c:8e: 91:7a:06:cd:fd:f0:08:5c:f5:9d:3d:37:64:04:5f:ef: 44:a3:54:26:04:f7:99:2e:c9:79:65:46:0d:10:fb:85: 5c:82:12:65:c8:93:2b:d5:80:37:49:2f:be:47:6f:80: 90:b5:38:3a:70:8d:e1:81:07:ce:4f:27:59:fd:13:dc: 76:6d:05:d3:e7:c4:65:b0:84:e3:f3:d2:c1:53:83:71: 22:ef:d5:d9:d8:93:85:64:23:0f:ec:23:90:77:bf:bb Fingerprint (SHA-256): 35:28:22:60:CD:4F:A9:C0:71:BF:B5:37:52:0B:B5:B2:4A:84:0E:24:60:10:6F:8F:74:3E:55:5E:A2:BB:7B:6C Fingerprint (SHA1): DE:B8:78:18:3F:D3:58:5E:02:B1:62:F8:33:E6:C6:F6:A7:B9:68:52 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12397: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12398: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12399: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202040 (0x19581178) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:41:08 2016 Not After : Sun Apr 25 20:41:08 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:0a:9c:42:ed:0d:e9:6f:39:88:7c:21:e6:3a:ee:4e: ed:19:ee:97:49:79:99:ff:68:5f:9f:0a:41:53:cc:0d: f5:5a:9a:54:2f:df:92:7b:d6:bb:4a:6c:c1:bf:19:e2: 42:9c:f2:37:b8:92:9c:17:95:6b:54:c8:25:8e:52:fa: cf:fb:d1:03:fc:89:ce:df:ac:1b:e5:9c:25:29:ab:15: 21:23:68:2a:7c:be:74:a0:e2:d2:c1:8c:0a:00:84:a4: af:9d:72:47:89:1f:ff:a5:9d:da:fc:19:5e:e9:19:d3: b5:73:a6:93:f8:ec:1a:34:9e:19:73:a7:23:9d:bc:e2: 95:12:d9:22:91:cf:25:4c:72:04:ec:ef:27:9f:23:97: 28:38:04:1a:18:2a:02:69:b8:de:80:1e:9c:56:4f:93: 7c:52:81:5b:fc:f5:35:35:5c:2e:f9:95:b4:d1:51:d2: 61:4f:49:a7:92:7f:8f:54:e1:59:80:62:0d:5b:ea:72: d5:b9:85:ed:78:28:33:4a:5e:78:33:1e:d0:45:86:52: d0:7f:d7:bb:ec:3d:55:19:3d:e2:ce:a2:ef:36:e6:70: 84:5a:3c:b4:fc:b9:d0:74:fe:c3:0b:bc:7b:21:f3:51: 5c:4d:2a:a2:95:fd:fc:83:37:81:e7:2b:c4:3e:b5:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:87:29:3a:c9:eb:85:01:29:3b:a8:a9:32:a9:56:06: ad:fc:1d:62:2b:34:4b:a0:b6:c5:9d:0e:b4:d6:58:36: cf:c7:95:d1:0b:26:84:b1:38:6e:77:51:1f:90:99:d1: 09:ed:a0:b4:1a:ef:a2:0e:5c:da:44:43:8f:c9:1b:ac: 16:7c:99:9c:08:9f:bf:92:89:51:ea:fc:0a:60:4a:c5: 60:2b:bc:fe:47:74:c2:08:27:5a:88:71:0d:a8:88:43: 3a:7c:cc:e9:eb:34:02:31:c7:05:69:e4:b1:60:10:d9: 7c:a2:3b:63:1f:04:5a:2e:55:7e:d6:a9:9f:cf:a8:ce: 06:1d:fa:8a:10:61:81:19:59:7f:73:05:90:0b:f6:27: 46:fb:fa:1c:51:92:7b:44:aa:61:c4:bf:44:5b:ef:b4: ac:dc:06:b4:b5:b5:dc:78:0d:ad:0b:31:2f:33:34:1f: f0:30:44:cd:97:87:47:43:2e:af:26:b9:8f:14:7a:49: 2d:ec:b7:e1:0c:aa:c9:ca:b0:f8:b5:91:6f:8b:be:37: 1b:e7:81:9c:48:59:05:71:53:12:b1:bb:07:af:7b:20: 56:e5:ea:ad:4e:aa:77:ed:d2:ed:a5:a7:2f:e5:dc:ac: c2:32:ae:b1:33:59:4a:0e:47:dd:ba:59:76:35:a7:c5 Fingerprint (SHA-256): 6B:EB:DF:6E:5F:A5:8B:1E:4A:9E:D2:98:B3:32:F7:F8:5D:1D:38:75:91:3E:23:08:FF:9C:D5:6E:12:33:5D:31 Fingerprint (SHA1): F6:7A:63:25:D3:AA:15:58:81:00:F1:A0:3D:5C:7B:ED:8C:1B:69:EC Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12400: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12401: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202041 (0x19581179) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:41:19 2016 Not After : Sun Apr 25 20:41:19 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:ec:f0:41:6f:0e:0f:ca:d3:92:3f:95:c1:eb:67:6d: 1e:c8:c8:ab:df:29:44:a2:eb:6d:97:03:f6:9a:ff:f8: be:0c:68:b1:8e:5f:44:e1:36:26:63:b9:a8:3a:19:a0: b8:b2:9c:74:87:25:28:f7:f4:7b:df:0d:2c:f8:a0:27: 41:4e:8b:aa:01:72:8c:6d:00:d8:f8:75:16:5f:e7:5f: 0b:91:58:3a:d5:b0:a8:bd:b1:c7:52:bd:49:34:32:32: 3e:8d:e1:ec:5b:bf:82:f4:1c:1e:f1:4e:f9:c2:52:29: d7:53:3c:39:30:9b:94:49:2d:4b:2e:b0:01:95:44:58: a7:4e:70:80:ff:06:34:52:7a:4b:04:ce:25:85:1c:cd: ec:0e:df:2f:43:34:4e:05:cf:77:71:ec:2a:53:3a:34: d9:99:65:dd:66:13:10:7a:07:73:98:64:7c:41:f2:a2: 25:a4:7a:cc:6d:1f:51:a7:d4:17:b0:d1:b4:37:3e:6a: a5:2f:f4:41:d0:a8:53:64:af:c3:a5:1d:6e:c9:8b:1e: 8b:86:ed:08:09:c4:8b:23:f4:59:f9:cc:f2:39:25:19: 19:3f:14:be:b2:d8:d3:d6:e5:3c:5b:e5:e7:7b:52:67: 38:0f:79:0c:8d:62:d2:fd:11:56:b1:3f:a1:75:95:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:e3:4b:4e:37:3b:a5:7e:53:fc:2e:e3:a0:28:42:b4: 57:1f:3d:ab:8f:17:76:b2:26:45:bc:91:34:74:f7:84: f1:b6:d1:07:ac:ea:3d:45:fe:48:cb:a0:90:ca:be:5e: bb:4c:fd:82:7d:19:50:d4:a4:14:1c:f2:7b:87:5a:5a: 49:c6:02:9a:76:fc:c8:0f:5d:33:11:1f:07:17:da:ea: 5c:0b:82:82:0d:07:cc:32:4b:a1:55:4a:7a:58:29:87: 82:e1:ad:c2:ea:78:c5:9a:49:f8:ea:7f:ef:d8:2e:40: 15:95:e5:4f:34:4b:4d:4e:ac:af:0d:4f:8e:cd:67:de: e3:0f:96:86:6a:19:f6:c8:a5:ed:89:41:db:17:6b:f8: 90:9e:53:2c:c6:dc:a8:f5:cd:9e:40:8c:61:92:95:05: 40:a6:10:dd:75:f5:34:3d:a1:5f:65:ba:33:bd:d7:70: 3a:7a:4c:e8:cd:dd:59:23:37:28:a2:28:7c:51:57:f8: 94:23:46:21:3d:c0:4e:b2:5f:04:61:06:2e:0d:ba:aa: b7:3c:e9:2b:b3:3b:50:5f:02:fa:bd:40:d8:44:33:48: 8d:24:ad:21:b5:eb:ed:ce:fc:88:bf:7e:48:f0:a0:fd: c6:8a:16:ea:d5:f0:0b:da:de:ca:a8:3c:3c:dc:3f:ad Fingerprint (SHA-256): 63:9D:EC:0B:BD:DF:8D:62:B9:C0:E9:D8:F1:69:83:66:7E:DE:0B:EC:E1:9A:88:72:09:A5:FC:9E:20:E8:A9:B1 Fingerprint (SHA1): 39:29:B1:BA:A0:99:97:00:40:0E:38:6E:2B:5A:B5:44:CB:B3:78:23 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #12402: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12403: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202043 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12404: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12405: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12406: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12407: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202044 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12408: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12409: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12410: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12411: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202045 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #12412: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12413: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #12414: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12415: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 425202046 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12416: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12417: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #12418: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12419: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 425202047 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12420: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12421: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12422: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12423: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #12424: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #12425: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #12426: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202043 (0x1958117b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:41:42 2016 Not After : Sun Apr 25 20:41:42 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:e8:cf:78:84:16:9a:36:5c:f3:b2:d0:8e:fc:17:a4: 4c:11:00:4a:54:3e:88:85:d0:3d:55:64:1a:4e:8e:f0: 19:06:3e:db:46:2e:06:1a:4b:14:5c:de:f6:11:ed:a5: 4e:16:6d:3c:cf:c9:9e:11:c6:f9:7a:18:a3:49:79:87: bd:01:f7:ff:43:7e:13:fa:0e:c6:5c:97:b0:bc:88:4e: 01:62:19:0b:16:6b:62:23:a2:7a:37:9c:d4:fe:ae:26: 4a:6c:c9:a9:94:2a:b5:ca:51:43:cb:5e:12:14:6e:4b: 27:e3:5f:bb:e5:d5:dc:f7:80:1c:49:cb:c1:5c:b7:ad: 7e:d3:2b:02:8f:ce:f3:47:68:88:96:a0:7d:7d:d6:62: 2a:dd:e2:07:d7:dc:4a:22:85:39:95:f1:35:aa:d5:5f: 4b:39:c7:70:4d:ce:18:96:b8:1d:37:94:a5:a6:25:3c: a7:06:71:98:9f:01:f2:3b:4f:9f:23:d7:be:7b:c3:f9: 84:ab:0e:5b:27:8b:fd:a6:ae:44:5a:e0:85:ef:03:00: ca:cd:82:4c:78:4a:a3:28:13:16:aa:f6:7a:ae:32:2e: 1f:5d:c7:3c:3b:8f:f0:3d:85:2c:de:3e:d1:fb:bf:21: 33:00:b3:82:09:ec:41:dc:9c:3c:f5:92:e8:e8:24:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:2b:89:de:66:c1:32:1d:b0:70:29:67:b6:e3:8b:28: 81:d5:07:37:54:ad:5d:80:43:23:31:2c:df:b4:59:d2: 66:e2:48:9b:bb:2e:95:55:e5:ee:f7:8a:b3:4f:12:9d: ae:9c:b8:ba:78:dc:9b:3e:55:75:e0:9a:51:72:a2:40: 95:fd:a5:0b:6f:06:c4:c4:04:c5:7e:2e:6d:66:0c:cb: 22:91:ec:a5:18:78:d0:e2:1e:39:91:51:94:3e:be:93: d4:70:6c:05:c9:59:ae:b5:4d:38:c6:c8:5d:81:d3:7c: 0c:30:77:bc:a0:36:c4:28:fc:f7:7e:81:d5:c1:0b:7a: 0e:d7:2b:b1:d2:72:02:a9:52:d3:93:30:32:f0:6f:86: bf:7c:c6:79:33:ad:52:b6:82:8d:3f:62:fa:19:66:16: 04:c8:30:ce:73:6a:53:86:fd:a7:c8:e6:d1:c5:5e:00: 33:57:99:9c:42:fa:14:8d:cc:28:06:61:56:cd:0a:ee: a7:8a:44:75:a1:a6:2c:8b:43:0d:97:f9:a6:10:5f:43: b8:7f:a0:cf:05:90:a5:ac:b5:a6:22:94:4d:02:ff:b4: 47:05:db:98:8b:62:d0:82:6e:24:bf:51:3c:e9:75:46: ba:e8:15:44:5c:95:58:45:e7:0d:cf:1c:1a:99:de:00 Fingerprint (SHA-256): E5:83:6D:3D:33:C5:2E:F8:B6:02:E3:8F:98:11:04:9B:50:EB:86:C9:BB:BD:B7:B8:C1:44:E5:54:16:E1:5E:0D Fingerprint (SHA1): 3E:46:ED:D3:16:D3:9D:C3:88:5E:61:DC:91:B0:8B:0F:4B:FA:01:45 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12427: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12428: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202044 (0x1958117c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:41:50 2016 Not After : Sun Apr 25 20:41:50 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:01:b7:37:c5:11:b5:73:1d:d3:43:56:49:80:66:37: 36:9a:6e:94:5a:4f:43:04:b6:72:3c:ae:20:7b:04:fa: e9:3f:4a:66:e2:5d:88:6c:45:dc:37:1b:06:ae:b0:60: 62:91:7c:07:40:3d:f8:ed:40:ba:9a:52:f4:5c:57:fc: a8:30:87:6a:59:50:9f:df:d9:3f:12:62:1f:cd:ba:37: 02:81:0a:6e:6b:d6:5e:fc:3b:6b:8f:f4:ca:fe:1f:2f: 5e:a3:66:b0:23:1e:bb:53:ba:29:62:9a:6e:b3:ad:56: 00:a4:d4:c0:d3:05:be:05:36:bb:82:94:91:b8:36:1e: 7c:80:74:92:6c:c2:90:bf:00:9c:dc:af:cd:28:04:cf: bd:18:d6:c5:05:d4:42:e0:35:d2:8e:e1:ae:f8:50:69: b1:7b:00:87:40:3c:5c:85:28:e5:ed:f5:e2:ef:ee:ae: 4b:ed:b6:33:62:56:17:48:41:5a:34:6a:82:ac:3a:ee: 68:ca:17:76:90:bb:d6:44:c3:89:a5:60:ba:24:76:5b: a8:75:85:3b:92:80:65:71:01:99:58:e0:e0:65:8d:24: 0d:4e:29:3c:52:eb:40:ea:28:40:67:a9:4e:62:61:2f: aa:12:56:6f:09:f7:56:72:9a:5c:55:57:e4:68:36:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:f9:f2:a5:bd:e4:68:51:01:a9:4a:3f:1b:3c:18:9b: 84:8d:69:8e:b8:2b:3b:e3:04:fd:18:b0:64:bf:a4:79: a8:4d:e3:bc:1e:e6:94:81:74:e3:7f:0b:2a:21:13:e6: 0f:bf:d0:52:ca:f4:37:ae:20:6f:c0:92:40:3f:79:bd: dc:8b:1a:3f:16:98:8a:cf:63:c9:1d:aa:a5:78:3e:30: 6a:64:77:a3:0e:d7:20:a4:b0:e8:9d:c2:85:a1:17:84: 9d:f3:b6:e5:16:19:1e:c2:47:dd:d9:1d:4d:48:89:bc: 96:e5:2f:7e:93:dd:ea:99:8f:99:40:88:3a:6a:4e:27: 28:18:f4:3a:09:89:62:d4:48:17:2f:15:ff:68:01:12: 9e:b3:5c:3d:be:ff:b0:12:d8:fa:3a:c3:e8:8c:df:25: 96:95:1c:84:fa:69:6e:fa:36:02:c7:a1:53:ea:d7:36: 48:db:60:6e:30:5a:52:44:df:7a:be:8a:5a:37:c4:9e: 4f:64:f3:3e:4a:26:21:71:60:9e:ca:2b:54:f9:97:39: 52:ff:4b:ca:51:58:43:ee:e0:15:12:07:d7:23:10:51: e4:db:40:ec:1d:85:b8:03:20:58:75:9d:25:73:e0:ea: b9:fc:c7:fd:d9:89:25:28:46:d3:90:e6:80:bd:8a:22 Fingerprint (SHA-256): 2A:84:48:68:AC:E4:C2:C0:6D:3A:B2:7E:94:8B:4B:B6:E6:B7:3B:6A:2C:6A:D9:61:46:77:33:C5:BB:01:B9:C1 Fingerprint (SHA1): BE:A7:BC:B2:70:5C:6B:D9:21:BB:10:79:00:4E:C0:CB:C3:CF:8A:F5 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12429: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12430: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12431: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202045 (0x1958117d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:42:07 2016 Not After : Sun Apr 25 20:42:07 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:f6:41:eb:48:41:f1:d3:52:f9:da:eb:90:26:b1:00: 21:b7:1c:ef:8d:7b:8d:51:34:39:8f:50:c3:b5:8e:cc: 3a:2d:54:d4:f7:79:1f:c1:99:90:5a:a8:1b:06:9d:e1: 70:17:e0:b7:74:10:ee:61:09:9e:b0:d3:84:12:84:14: 16:cd:32:d9:e5:fc:29:57:7f:f8:6b:f3:28:9b:cb:a4: 59:d3:a7:b5:0b:2d:bf:79:14:d0:5f:0c:96:0a:09:f5: b2:c1:c8:bb:65:3a:62:b6:08:2a:d0:1a:cb:97:72:b8: 90:81:45:24:94:e9:91:cf:a7:37:68:f8:5f:47:0a:d4: 94:1f:42:f1:d1:76:ce:a5:07:bf:82:76:4b:df:12:64: f8:6f:d5:83:cd:be:9b:98:7b:9c:51:aa:2d:ab:ad:cd: 38:1a:c1:81:cf:c3:7d:05:9b:10:a3:11:32:88:a7:16: 41:16:83:ee:55:be:26:7b:a8:6c:81:02:31:20:d4:72: af:ce:5a:f6:73:c9:77:41:bf:5f:91:a8:3f:40:98:50: 11:40:83:6b:12:c2:7b:ce:61:d6:21:5e:63:5e:d0:f9: c8:90:24:0c:f9:02:d0:54:a8:0a:a9:5d:e1:d6:22:91: cc:f2:c5:8c:4e:20:3e:c4:e6:e3:71:a9:9b:b0:70:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:81:a5:41:5d:6e:f9:0f:60:fc:6e:23:70:e3:76:18: 8d:17:9b:11:fd:19:2f:fb:c7:1b:5a:2e:68:ed:83:1b: ba:15:08:90:75:e8:b5:ee:85:f4:9b:60:95:c2:12:e4: 2c:0b:b4:11:fb:01:db:e9:f2:c7:47:49:f4:87:d0:e7: 9c:a5:aa:b5:da:20:66:3e:2b:fa:e8:85:b3:89:d5:bb: 66:60:5a:47:c4:e8:53:2b:e9:fe:4c:61:b7:98:47:37: 8f:98:b7:f0:20:16:bd:55:2f:72:78:1b:56:5c:ab:ac: 1f:85:2b:1d:20:4b:f5:45:a8:a4:c4:53:83:e7:fe:4e: 09:42:ef:ad:00:77:69:d5:d9:15:e4:b5:79:51:89:c7: 04:29:fd:51:b7:8c:78:11:2c:aa:26:c3:84:dd:83:94: b5:a1:b3:ff:9b:1b:9a:18:b2:39:b1:33:bc:71:5a:bc: 37:23:c5:e1:8b:47:24:6f:ab:0c:f2:f1:1f:22:19:82: a8:43:1e:d8:8e:70:8d:05:65:bb:3c:3b:c0:7a:78:a4: 94:38:93:47:64:fb:4c:62:b0:b0:06:c7:bb:e2:31:c9: 13:2e:81:ff:bb:1d:42:9b:5c:8c:14:ad:db:8b:20:d5: 2b:1f:7a:0c:18:54:fc:ff:55:78:a9:5e:0e:f6:2d:13 Fingerprint (SHA-256): 4A:B4:D2:A4:70:CD:7A:82:32:B8:B5:36:4E:9B:EC:8C:17:E9:68:33:96:86:D9:61:02:D8:A9:32:B3:0E:8F:AC Fingerprint (SHA1): D7:E8:72:2C:6B:85:6F:DD:66:AD:F7:FD:C7:F6:13:2C:3C:FE:D5:48 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #12432: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12433: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202048 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12434: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12435: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12436: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12437: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202049 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12438: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12439: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12440: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12441: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202050 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA1Root-425201957.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12442: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12443: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #12444: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12445: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425202051 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12446: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12447: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #12448: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202048 (0x19581180) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:42:46 2016 Not After : Sun Apr 25 20:42:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:8c:26:91:d8:6e:32:fc:01:c9:0a:8c:10:d0:23:dc: e7:38:38:a5:12:3e:c2:b0:3e:14:84:a7:ba:90:d4:3b: e3:ae:14:09:04:f1:b2:d3:29:76:16:59:1e:f9:b6:cc: 32:24:ae:91:db:c5:24:9d:1f:b1:3c:7c:99:eb:7d:5b: 5c:59:39:a1:ae:1b:3e:20:cb:26:ea:1d:28:71:8f:f3: 7f:ef:05:54:cf:2f:5c:e4:3d:60:53:b1:9a:3f:54:0a: ad:4e:4c:9d:d5:85:e2:d8:8c:62:d5:8e:99:90:ad:ee: 4e:77:81:95:69:2f:02:97:80:72:77:91:b8:2c:8f:37: 71:e2:77:2d:90:50:ba:dd:b4:52:a8:86:44:73:20:65: db:a4:2e:ab:c4:49:36:5a:b9:19:ba:3e:c9:e8:98:fe: 4a:ee:e8:25:5a:fb:04:00:a0:52:90:f0:de:75:c1:ee: 01:10:2a:65:62:e5:de:04:a4:8d:91:ed:b7:cf:7d:4a: 7d:7b:0c:d4:30:73:43:8f:15:5f:91:b2:6f:72:d1:f3: a1:4b:9f:3f:47:af:8d:75:d1:5b:ba:a0:68:20:0f:4c: cf:a0:8a:a6:1a:c6:84:85:35:ce:69:55:8c:39:8d:3b: 78:fe:29:66:6e:2d:46:42:ea:e6:e4:9a:e6:03:17:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:b8:91:c5:10:0f:f7:24:4c:d2:5d:c7:7d:43:76:32: 95:9d:08:b3:86:8f:85:8a:9e:c3:6a:2e:0e:46:d5:9d: 72:0b:03:a0:fb:e6:c2:7d:c3:13:21:02:21:42:ca:5b: 95:eb:02:2f:7d:c7:fd:ba:47:ec:cd:b7:1a:91:89:f1: 41:37:bb:ef:dc:f7:92:c6:ad:28:2d:e7:e4:35:09:ed: 5f:87:dc:3e:0d:4f:1f:c0:a6:f9:31:33:c6:33:19:4a: e3:0c:a7:54:37:4d:93:8e:23:da:3e:49:94:d2:fb:86: 14:0a:8e:c2:9f:dd:52:a3:47:58:aa:0a:80:d9:5d:a2: ea:0c:6d:1f:49:11:d8:3f:bf:7b:9d:c7:c8:f2:d3:3b: b0:a1:3d:3a:9e:19:5f:57:96:ce:99:c1:40:09:8a:47: 88:b8:e5:03:57:be:a5:11:d1:c7:ab:c6:a2:ef:16:a6: ec:45:08:37:86:f8:c5:7f:fb:19:dc:a7:b6:93:d8:4c: 90:8c:0f:a1:f3:6c:73:f5:ef:ab:5e:b7:cf:6a:f6:c1: 3b:ec:2b:79:bc:c2:f2:7d:3a:f6:63:db:e4:38:3b:fd: d0:f4:38:ed:bb:c1:e6:14:fa:85:7e:f2:32:96:f7:35: e4:d2:c6:e3:58:7e:35:1b:fe:7b:e4:0f:db:b1:46:a4 Fingerprint (SHA-256): BE:D5:5A:D2:97:28:1B:E4:23:6B:39:A1:2E:B8:F4:45:71:C7:48:5C:2B:C7:09:C7:C9:55:AB:A0:B5:EB:B6:6B Fingerprint (SHA1): FD:99:AD:70:DB:36:E5:2F:C3:AC:94:C7:B1:8A:49:85:E6:EB:5E:09 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12449: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #12450: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202052 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12451: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #12452: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #12453: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202053 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12454: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #12455: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #12456: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12457: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425202054 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12458: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12459: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425202055 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12460: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12461: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #12462: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12463: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12464: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425202056 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425201958.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12465: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12466: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12467: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12468: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425202057 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12469: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12470: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #12471: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202052 (0x19581184) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:43:24 2016 Not After : Sun Apr 25 20:43:24 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a4:0f:a1:aa:3d:97:e9:bb:47:9c:2e:82:7b:43:1f: 59:f2:7c:b0:31:d1:37:4d:89:bc:8b:5f:a4:ee:91:b2: da:f8:35:19:79:1c:89:51:54:00:ee:b0:bf:94:2f:54: 4f:04:15:77:4b:6e:87:5b:ec:28:b6:e2:32:0b:01:33: f6:f8:47:7a:71:eb:4e:c5:4a:b8:07:3d:6d:a9:55:17: 74:c6:b4:34:71:e2:3f:07:23:e5:d8:2c:84:54:b4:0f: 5c:7a:ec:19:63:34:65:69:71:54:6a:66:dc:a5:c5:92: 72:f3:35:c3:2e:3a:c9:c8:0f:c4:31:20:74:c5:47:1e: e7:75:8f:3b:89:c3:03:48:c4:3f:a6:22:e1:b8:3a:f0: bd:c3:00:47:64:d3:e9:cd:45:b1:40:8c:c0:13:29:be: e8:78:38:37:f4:2b:3b:29:0d:65:29:44:b6:f4:a8:d7: a7:c8:01:31:df:5f:30:b2:e2:f6:a1:e0:ef:07:21:79: 05:e9:aa:ab:bf:d6:9c:28:06:b9:75:82:eb:11:7a:f2: e9:83:03:b9:a3:cf:6b:4b:28:64:22:3f:be:3e:a6:76: 8d:3b:7e:15:3e:4a:a7:b8:da:4d:59:67:ea:80:ad:ad: 5f:e1:d0:1b:0b:93:bc:4e:f6:14:a6:33:c4:3b:32:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:29:35:8a:56:2f:98:f8:71:14:72:17:26:19:44:54: 54:f7:a5:0d:d8:ad:c0:7c:87:f0:4e:2e:3c:f1:57:b0: f8:31:6e:2b:d1:23:e1:c6:ed:f8:dc:f8:1b:ab:52:ac: bb:0f:79:af:25:62:9c:5a:50:f4:29:49:07:e2:c6:8c: 11:4a:c2:45:80:3e:b0:1c:17:93:0f:74:4e:f5:6a:e3: e2:c2:5a:df:0c:67:a6:9f:12:c6:70:0a:05:42:22:56: f9:e5:c1:10:39:16:2c:33:3e:f6:d5:13:36:63:f4:d7: 80:a6:63:c9:51:87:63:b8:9f:db:6d:fa:1b:55:18:5c: 5b:1e:cf:00:2b:18:27:81:f6:29:c8:00:22:5a:24:11: 9f:b9:72:96:8f:65:0e:eb:02:9a:9d:75:08:53:c5:80: b3:de:c5:24:a5:6c:c1:a8:ec:0e:6f:20:a3:34:e4:2f: 8f:e6:c7:37:d7:0c:77:f3:d4:76:aa:0c:85:e0:94:f3: 4f:c2:5c:46:1b:fb:b9:92:23:0d:06:d7:ac:ff:ab:b5: 19:21:7c:dc:d2:1d:df:e9:72:75:03:46:f3:5f:58:e4: 80:ee:33:7f:23:66:a2:17:6f:5a:41:f1:7d:2d:54:5b: 54:e5:4c:49:f9:a7:dc:de:43:67:2c:4d:49:96:49:ac Fingerprint (SHA-256): 69:90:1F:74:FC:D4:03:53:04:51:3C:63:7F:9F:58:BE:BD:9F:34:D8:07:7C:30:0F:48:51:9D:7F:AA:ED:BC:C3 Fingerprint (SHA1): A3:26:B7:79:B1:BA:24:2C:11:C3:72:9D:C6:15:0A:A7:7B:EA:35:B4 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12472: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202053 (0x19581185) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:43:33 2016 Not After : Sun Apr 25 20:43:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cf:38:3d:84:42:8b:96:ba:a6:75:a0:ac:3e:84:57: f9:04:5b:b4:1f:23:d1:6b:a8:47:42:dd:06:05:67:fa: 36:12:d0:8a:c7:da:01:f6:44:a8:29:df:36:ac:ab:a7: 0f:50:65:ec:82:bd:18:fd:96:9b:85:86:19:8d:c2:97: 52:ae:85:11:89:d0:a2:69:0c:48:59:03:62:ba:95:1a: e8:f3:65:f0:65:d2:ac:7e:51:4c:f2:e2:25:89:3f:a3: 69:1b:1e:ea:48:8d:78:ce:98:ea:9c:31:07:e5:3f:50: 08:e0:18:f9:55:7e:bc:bc:e8:95:88:58:a9:26:d5:ba: 99:37:20:59:17:3d:53:91:ee:de:cb:c7:72:a7:4d:b4: a3:c1:2e:d5:96:01:4e:13:e2:96:7f:6e:c8:6f:7a:29: 55:b9:0e:74:67:05:1e:9e:b7:55:d7:c4:0c:82:6e:50: e7:4f:6e:dd:72:d0:6f:0c:a4:aa:6e:28:c0:bf:1a:40: 0b:99:81:12:2c:fc:90:54:82:3c:cf:c0:96:90:99:50: 13:4e:3d:98:94:f1:2d:1d:74:6b:53:56:ba:db:56:48: 88:87:63:58:68:09:cf:e9:c0:65:34:d5:12:48:08:7f: 3f:74:d2:c6:7a:a1:4c:67:34:e9:35:fc:5b:2f:33:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:a5:3c:23:4b:c8:b7:67:ef:65:f6:77:fa:aa:8e:e7: 17:d0:95:12:50:00:a4:a0:17:29:e6:16:87:b8:95:34: 6d:28:9e:1f:4b:ef:b3:59:a0:45:2d:89:d7:a9:cf:5a: 41:24:94:f7:75:e8:65:8e:d0:8b:40:e4:13:fb:63:d3: f0:e7:8f:90:12:6f:cc:30:96:f5:7c:ac:f3:44:2e:45: 1d:ab:f4:c1:c3:58:97:a2:b7:90:19:96:1d:e0:e5:62: f4:26:46:31:79:36:84:37:43:7a:ea:a2:f6:d3:29:32: 5d:99:77:aa:02:04:0c:7b:b7:33:fb:69:36:cf:c1:c8: 28:d7:7b:06:c1:4a:ed:3c:02:b2:15:f3:e4:c9:29:7a: 5d:6e:84:76:1e:6e:ae:b2:60:44:53:51:6d:e9:dd:e2: 94:9f:21:29:9a:12:0c:e1:ab:ef:2c:6b:3f:77:80:ce: 9b:3a:08:b3:0b:ca:cf:f8:7e:f1:00:55:81:58:71:94: 11:8e:2b:5f:11:c7:ac:1f:fc:6b:29:84:70:ae:b5:fa: 27:2d:98:23:40:ff:ba:e9:b2:ea:9e:2d:86:26:ff:cd: b5:f9:b3:1d:b1:86:50:0d:93:d1:14:ab:b8:d7:f4:7b: c3:f6:82:85:df:f4:cb:c8:ce:cc:3c:fe:6b:b3:4e:43 Fingerprint (SHA-256): 62:01:E3:2C:AB:A6:9E:3B:EE:16:40:82:97:3E:49:D7:C5:DE:4D:10:7E:89:6B:C2:42:AD:7E:8C:A5:DF:66:B6 Fingerprint (SHA1): FE:04:58:62:E9:38:FC:75:E6:0A:03:4A:7B:77:8E:6A:36:07:6F:59 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12473: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202053 (0x19581185) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:43:33 2016 Not After : Sun Apr 25 20:43:33 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:cf:38:3d:84:42:8b:96:ba:a6:75:a0:ac:3e:84:57: f9:04:5b:b4:1f:23:d1:6b:a8:47:42:dd:06:05:67:fa: 36:12:d0:8a:c7:da:01:f6:44:a8:29:df:36:ac:ab:a7: 0f:50:65:ec:82:bd:18:fd:96:9b:85:86:19:8d:c2:97: 52:ae:85:11:89:d0:a2:69:0c:48:59:03:62:ba:95:1a: e8:f3:65:f0:65:d2:ac:7e:51:4c:f2:e2:25:89:3f:a3: 69:1b:1e:ea:48:8d:78:ce:98:ea:9c:31:07:e5:3f:50: 08:e0:18:f9:55:7e:bc:bc:e8:95:88:58:a9:26:d5:ba: 99:37:20:59:17:3d:53:91:ee:de:cb:c7:72:a7:4d:b4: a3:c1:2e:d5:96:01:4e:13:e2:96:7f:6e:c8:6f:7a:29: 55:b9:0e:74:67:05:1e:9e:b7:55:d7:c4:0c:82:6e:50: e7:4f:6e:dd:72:d0:6f:0c:a4:aa:6e:28:c0:bf:1a:40: 0b:99:81:12:2c:fc:90:54:82:3c:cf:c0:96:90:99:50: 13:4e:3d:98:94:f1:2d:1d:74:6b:53:56:ba:db:56:48: 88:87:63:58:68:09:cf:e9:c0:65:34:d5:12:48:08:7f: 3f:74:d2:c6:7a:a1:4c:67:34:e9:35:fc:5b:2f:33:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:a5:3c:23:4b:c8:b7:67:ef:65:f6:77:fa:aa:8e:e7: 17:d0:95:12:50:00:a4:a0:17:29:e6:16:87:b8:95:34: 6d:28:9e:1f:4b:ef:b3:59:a0:45:2d:89:d7:a9:cf:5a: 41:24:94:f7:75:e8:65:8e:d0:8b:40:e4:13:fb:63:d3: f0:e7:8f:90:12:6f:cc:30:96:f5:7c:ac:f3:44:2e:45: 1d:ab:f4:c1:c3:58:97:a2:b7:90:19:96:1d:e0:e5:62: f4:26:46:31:79:36:84:37:43:7a:ea:a2:f6:d3:29:32: 5d:99:77:aa:02:04:0c:7b:b7:33:fb:69:36:cf:c1:c8: 28:d7:7b:06:c1:4a:ed:3c:02:b2:15:f3:e4:c9:29:7a: 5d:6e:84:76:1e:6e:ae:b2:60:44:53:51:6d:e9:dd:e2: 94:9f:21:29:9a:12:0c:e1:ab:ef:2c:6b:3f:77:80:ce: 9b:3a:08:b3:0b:ca:cf:f8:7e:f1:00:55:81:58:71:94: 11:8e:2b:5f:11:c7:ac:1f:fc:6b:29:84:70:ae:b5:fa: 27:2d:98:23:40:ff:ba:e9:b2:ea:9e:2d:86:26:ff:cd: b5:f9:b3:1d:b1:86:50:0d:93:d1:14:ab:b8:d7:f4:7b: c3:f6:82:85:df:f4:cb:c8:ce:cc:3c:fe:6b:b3:4e:43 Fingerprint (SHA-256): 62:01:E3:2C:AB:A6:9E:3B:EE:16:40:82:97:3E:49:D7:C5:DE:4D:10:7E:89:6B:C2:42:AD:7E:8C:A5:DF:66:B6 Fingerprint (SHA1): FE:04:58:62:E9:38:FC:75:E6:0A:03:4A:7B:77:8E:6A:36:07:6F:59 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12474: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #12475: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202058 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12476: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #12477: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #12478: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202059 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12479: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #12480: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #12481: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12482: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425202060 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12483: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12484: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425202061 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12485: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12486: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #12487: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12488: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12489: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425202062 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425201959.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12490: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12491: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12492: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12493: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425202063 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12494: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12495: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12496: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12497: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425202064 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-BridgeNavy-425201960.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12498: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12499: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12500: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12501: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425202065 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12502: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12503: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #12504: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202058 (0x1958118a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:44:58 2016 Not After : Sun Apr 25 20:44:58 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:07:58:f9:13:6b:50:d8:b6:47:17:e9:39:7d:ee:7b: 9e:31:d2:fc:87:8e:4e:c1:ce:75:54:27:fe:16:0f:0f: 64:ee:17:a3:1b:98:ff:0a:4d:3f:e3:d3:d5:61:fa:a0: cd:d0:04:9e:8b:65:ec:51:55:30:2b:cc:8d:5f:2c:0f: a4:10:05:73:f3:b7:95:93:27:ca:4c:f0:0e:56:d5:52: 15:48:30:2c:31:2a:31:8f:d8:87:a9:58:d8:4d:32:6f: 57:32:d0:bc:b9:c7:6b:c6:4e:2e:48:29:bc:9c:de:a3: 69:ad:bd:e3:6b:cc:21:0c:ac:1c:1b:a7:17:84:93:64: 84:87:cc:27:f6:57:87:f9:b9:e9:0a:47:a2:d9:02:27: 15:cc:1c:b2:e3:a3:b7:72:23:fd:25:87:ae:b1:77:b2: a1:e4:33:ff:c7:f8:0b:7c:ca:b7:d0:2f:34:7e:4b:00: 2f:8e:cd:c3:dd:42:54:bd:e5:e3:48:18:fe:89:d4:99: ca:75:f9:07:87:26:e9:c9:91:5e:be:96:ce:7c:c8:ed: 38:f6:06:ce:9e:5f:2c:45:f6:e1:69:e0:fb:46:44:67: 63:20:02:7b:37:b1:27:08:69:6d:2b:33:0b:54:42:a8: 37:61:a2:38:ee:c5:67:5e:58:e7:08:bf:bc:f6:6f:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:7a:16:df:7b:31:6b:39:4e:4d:4a:71:81:1c:d9:52: a3:4f:7b:fa:8f:f1:e4:42:82:63:4f:46:07:92:c3:e3: c7:6d:63:c4:5f:c3:5a:42:1c:66:d9:08:3e:ef:84:74: 86:ab:01:41:c7:26:0f:e4:ae:2d:a1:c8:48:41:91:95: 26:9f:cb:25:2e:c7:31:18:86:64:0a:d3:63:37:26:87: b4:77:76:8c:1e:12:53:d2:04:db:1f:6c:ef:87:39:3f: a6:8a:9d:b8:a7:1f:5c:45:84:47:df:06:0d:41:26:51: 70:04:16:96:73:39:13:9c:d0:f9:30:e0:42:2c:29:1a: 28:25:db:d8:b9:ec:af:88:cb:21:ba:24:39:37:1d:95: cf:77:86:b6:b8:36:50:e5:19:f9:89:01:69:e4:89:a2: f8:e3:a2:6c:67:3d:1e:b7:87:b9:ef:8a:db:cd:d6:07: dd:64:92:72:15:e4:0d:05:ca:1f:75:0b:9e:f4:b8:ad: 8e:1a:77:12:e4:cc:15:dc:ca:56:63:40:95:26:bc:eb: e7:09:9a:3b:97:bd:8c:e9:bf:35:ea:80:46:ab:7a:09: 58:4b:a7:45:40:7a:3b:c8:e4:9f:d7:76:c7:29:17:af: 08:89:5b:3e:fe:6f:5a:97:9b:8c:9b:47:ba:42:42:da Fingerprint (SHA-256): 96:D3:DD:42:8E:3F:D1:0C:E2:96:BC:A1:C6:22:15:03:E5:74:6C:3C:A4:E4:17:6B:FF:0D:EE:98:74:AD:6E:E1 Fingerprint (SHA1): 56:50:5E:C7:74:4D:A9:0B:BE:11:2C:0E:B2:08:9F:A7:03:CC:42:E9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12505: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202059 (0x1958118b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:45:02 2016 Not After : Sun Apr 25 20:45:02 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:05:4e:74:67:64:43:1d:4f:c0:c8:5c:1c:6e:aa:03: 9a:c2:c1:6c:e2:4c:40:77:af:88:64:e8:9f:07:42:f4: 75:0c:e1:87:3b:3d:ad:78:da:58:32:b1:d4:18:97:1d: 41:71:e2:2c:9c:09:32:c7:8f:8b:1e:98:48:7c:af:8f: 1e:92:66:e0:01:5b:ba:30:32:14:50:e8:0d:d9:68:a5: 81:e3:82:97:d0:90:7a:78:51:ef:b8:b9:a0:92:c6:4c: e4:75:66:33:14:2b:2a:ea:bf:e8:29:a8:b5:5a:74:04: 40:0a:1a:09:29:03:f6:8b:5e:b7:c3:d9:f3:7e:28:49: 9a:5f:4f:95:93:2e:4d:57:4c:b1:46:7a:f3:69:fc:d3: a2:b0:46:35:0b:8e:9e:61:69:45:5a:eb:e7:ce:82:ca: c6:2a:a4:8a:70:2d:29:4b:f1:18:ff:a7:17:87:ce:e1: 15:9c:1a:23:84:95:b2:fd:cf:00:e1:c4:ad:46:a7:cb: 5a:54:09:09:4f:96:a1:cf:dd:24:ec:6a:87:fa:92:10: 35:f6:b9:e7:14:92:82:aa:4d:62:c3:8d:e5:5a:6b:e6: 90:e1:ce:60:15:26:da:5e:f5:1a:a3:4e:57:f0:dc:b1: a3:1d:27:f1:d7:87:76:6c:e7:44:1a:02:72:78:4a:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:1d:54:f3:1e:cf:51:13:74:62:03:39:a4:f4:a2:70: 26:04:71:f7:09:ea:2f:44:80:79:77:b6:7a:22:a3:a6: 21:2c:21:7d:61:64:7d:ae:d9:9d:6e:c6:36:d3:d0:ae: 6f:cb:d4:76:ea:61:03:b5:be:21:6c:2c:39:60:3c:41: ce:ab:d3:6d:5b:29:b2:6f:31:a7:a6:47:50:7b:03:84: 5c:4d:0c:87:cf:c5:cd:65:b8:c8:cf:96:0e:d7:be:e3: 5a:f7:a1:8d:55:68:bc:45:ff:7b:c2:9b:91:9b:2a:6b: 04:0d:d5:ea:99:62:66:60:57:a8:dd:ab:83:8a:eb:69: 5a:94:9e:50:80:89:c4:53:96:87:eb:67:b7:43:ad:eb: dd:a9:1d:86:ac:bd:07:8f:25:79:46:bc:d6:6c:e3:8d: 02:c6:d2:ce:1b:b1:f5:d9:4c:05:89:d5:3e:50:ff:61: 3d:b2:65:20:eb:ec:cb:e5:22:aa:0f:59:f1:64:ca:c8: 77:72:22:64:9e:d6:9b:76:20:ac:4b:82:b0:5b:65:9e: 43:da:88:a3:46:2e:81:c1:91:d6:34:f7:4c:e5:ef:c3: cb:36:16:3a:bb:7c:a7:7e:48:05:5a:c2:72:07:b9:98: 74:4b:40:b0:96:2e:c3:53:d6:97:47:5a:e0:99:82:f4 Fingerprint (SHA-256): E3:7E:13:D6:A3:98:1C:81:A4:1A:DA:70:45:4E:71:17:F9:50:84:E9:E3:04:3D:A9:92:E6:AE:24:5F:91:04:CA Fingerprint (SHA1): CF:D3:D3:91:B4:13:2A:E4:55:46:63:15:DB:60:6C:E0:53:43:C0:A3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12506: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202059 (0x1958118b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:45:02 2016 Not After : Sun Apr 25 20:45:02 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:05:4e:74:67:64:43:1d:4f:c0:c8:5c:1c:6e:aa:03: 9a:c2:c1:6c:e2:4c:40:77:af:88:64:e8:9f:07:42:f4: 75:0c:e1:87:3b:3d:ad:78:da:58:32:b1:d4:18:97:1d: 41:71:e2:2c:9c:09:32:c7:8f:8b:1e:98:48:7c:af:8f: 1e:92:66:e0:01:5b:ba:30:32:14:50:e8:0d:d9:68:a5: 81:e3:82:97:d0:90:7a:78:51:ef:b8:b9:a0:92:c6:4c: e4:75:66:33:14:2b:2a:ea:bf:e8:29:a8:b5:5a:74:04: 40:0a:1a:09:29:03:f6:8b:5e:b7:c3:d9:f3:7e:28:49: 9a:5f:4f:95:93:2e:4d:57:4c:b1:46:7a:f3:69:fc:d3: a2:b0:46:35:0b:8e:9e:61:69:45:5a:eb:e7:ce:82:ca: c6:2a:a4:8a:70:2d:29:4b:f1:18:ff:a7:17:87:ce:e1: 15:9c:1a:23:84:95:b2:fd:cf:00:e1:c4:ad:46:a7:cb: 5a:54:09:09:4f:96:a1:cf:dd:24:ec:6a:87:fa:92:10: 35:f6:b9:e7:14:92:82:aa:4d:62:c3:8d:e5:5a:6b:e6: 90:e1:ce:60:15:26:da:5e:f5:1a:a3:4e:57:f0:dc:b1: a3:1d:27:f1:d7:87:76:6c:e7:44:1a:02:72:78:4a:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:1d:54:f3:1e:cf:51:13:74:62:03:39:a4:f4:a2:70: 26:04:71:f7:09:ea:2f:44:80:79:77:b6:7a:22:a3:a6: 21:2c:21:7d:61:64:7d:ae:d9:9d:6e:c6:36:d3:d0:ae: 6f:cb:d4:76:ea:61:03:b5:be:21:6c:2c:39:60:3c:41: ce:ab:d3:6d:5b:29:b2:6f:31:a7:a6:47:50:7b:03:84: 5c:4d:0c:87:cf:c5:cd:65:b8:c8:cf:96:0e:d7:be:e3: 5a:f7:a1:8d:55:68:bc:45:ff:7b:c2:9b:91:9b:2a:6b: 04:0d:d5:ea:99:62:66:60:57:a8:dd:ab:83:8a:eb:69: 5a:94:9e:50:80:89:c4:53:96:87:eb:67:b7:43:ad:eb: dd:a9:1d:86:ac:bd:07:8f:25:79:46:bc:d6:6c:e3:8d: 02:c6:d2:ce:1b:b1:f5:d9:4c:05:89:d5:3e:50:ff:61: 3d:b2:65:20:eb:ec:cb:e5:22:aa:0f:59:f1:64:ca:c8: 77:72:22:64:9e:d6:9b:76:20:ac:4b:82:b0:5b:65:9e: 43:da:88:a3:46:2e:81:c1:91:d6:34:f7:4c:e5:ef:c3: cb:36:16:3a:bb:7c:a7:7e:48:05:5a:c2:72:07:b9:98: 74:4b:40:b0:96:2e:c3:53:d6:97:47:5a:e0:99:82:f4 Fingerprint (SHA-256): E3:7E:13:D6:A3:98:1C:81:A4:1A:DA:70:45:4E:71:17:F9:50:84:E9:E3:04:3D:A9:92:E6:AE:24:5F:91:04:CA Fingerprint (SHA1): CF:D3:D3:91:B4:13:2A:E4:55:46:63:15:DB:60:6C:E0:53:43:C0:A3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12507: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #12508: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202058 (0x1958118a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:44:58 2016 Not After : Sun Apr 25 20:44:58 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:07:58:f9:13:6b:50:d8:b6:47:17:e9:39:7d:ee:7b: 9e:31:d2:fc:87:8e:4e:c1:ce:75:54:27:fe:16:0f:0f: 64:ee:17:a3:1b:98:ff:0a:4d:3f:e3:d3:d5:61:fa:a0: cd:d0:04:9e:8b:65:ec:51:55:30:2b:cc:8d:5f:2c:0f: a4:10:05:73:f3:b7:95:93:27:ca:4c:f0:0e:56:d5:52: 15:48:30:2c:31:2a:31:8f:d8:87:a9:58:d8:4d:32:6f: 57:32:d0:bc:b9:c7:6b:c6:4e:2e:48:29:bc:9c:de:a3: 69:ad:bd:e3:6b:cc:21:0c:ac:1c:1b:a7:17:84:93:64: 84:87:cc:27:f6:57:87:f9:b9:e9:0a:47:a2:d9:02:27: 15:cc:1c:b2:e3:a3:b7:72:23:fd:25:87:ae:b1:77:b2: a1:e4:33:ff:c7:f8:0b:7c:ca:b7:d0:2f:34:7e:4b:00: 2f:8e:cd:c3:dd:42:54:bd:e5:e3:48:18:fe:89:d4:99: ca:75:f9:07:87:26:e9:c9:91:5e:be:96:ce:7c:c8:ed: 38:f6:06:ce:9e:5f:2c:45:f6:e1:69:e0:fb:46:44:67: 63:20:02:7b:37:b1:27:08:69:6d:2b:33:0b:54:42:a8: 37:61:a2:38:ee:c5:67:5e:58:e7:08:bf:bc:f6:6f:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:7a:16:df:7b:31:6b:39:4e:4d:4a:71:81:1c:d9:52: a3:4f:7b:fa:8f:f1:e4:42:82:63:4f:46:07:92:c3:e3: c7:6d:63:c4:5f:c3:5a:42:1c:66:d9:08:3e:ef:84:74: 86:ab:01:41:c7:26:0f:e4:ae:2d:a1:c8:48:41:91:95: 26:9f:cb:25:2e:c7:31:18:86:64:0a:d3:63:37:26:87: b4:77:76:8c:1e:12:53:d2:04:db:1f:6c:ef:87:39:3f: a6:8a:9d:b8:a7:1f:5c:45:84:47:df:06:0d:41:26:51: 70:04:16:96:73:39:13:9c:d0:f9:30:e0:42:2c:29:1a: 28:25:db:d8:b9:ec:af:88:cb:21:ba:24:39:37:1d:95: cf:77:86:b6:b8:36:50:e5:19:f9:89:01:69:e4:89:a2: f8:e3:a2:6c:67:3d:1e:b7:87:b9:ef:8a:db:cd:d6:07: dd:64:92:72:15:e4:0d:05:ca:1f:75:0b:9e:f4:b8:ad: 8e:1a:77:12:e4:cc:15:dc:ca:56:63:40:95:26:bc:eb: e7:09:9a:3b:97:bd:8c:e9:bf:35:ea:80:46:ab:7a:09: 58:4b:a7:45:40:7a:3b:c8:e4:9f:d7:76:c7:29:17:af: 08:89:5b:3e:fe:6f:5a:97:9b:8c:9b:47:ba:42:42:da Fingerprint (SHA-256): 96:D3:DD:42:8E:3F:D1:0C:E2:96:BC:A1:C6:22:15:03:E5:74:6C:3C:A4:E4:17:6B:FF:0D:EE:98:74:AD:6E:E1 Fingerprint (SHA1): 56:50:5E:C7:74:4D:A9:0B:BE:11:2C:0E:B2:08:9F:A7:03:CC:42:E9 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12509: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202059 (0x1958118b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:45:02 2016 Not After : Sun Apr 25 20:45:02 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:05:4e:74:67:64:43:1d:4f:c0:c8:5c:1c:6e:aa:03: 9a:c2:c1:6c:e2:4c:40:77:af:88:64:e8:9f:07:42:f4: 75:0c:e1:87:3b:3d:ad:78:da:58:32:b1:d4:18:97:1d: 41:71:e2:2c:9c:09:32:c7:8f:8b:1e:98:48:7c:af:8f: 1e:92:66:e0:01:5b:ba:30:32:14:50:e8:0d:d9:68:a5: 81:e3:82:97:d0:90:7a:78:51:ef:b8:b9:a0:92:c6:4c: e4:75:66:33:14:2b:2a:ea:bf:e8:29:a8:b5:5a:74:04: 40:0a:1a:09:29:03:f6:8b:5e:b7:c3:d9:f3:7e:28:49: 9a:5f:4f:95:93:2e:4d:57:4c:b1:46:7a:f3:69:fc:d3: a2:b0:46:35:0b:8e:9e:61:69:45:5a:eb:e7:ce:82:ca: c6:2a:a4:8a:70:2d:29:4b:f1:18:ff:a7:17:87:ce:e1: 15:9c:1a:23:84:95:b2:fd:cf:00:e1:c4:ad:46:a7:cb: 5a:54:09:09:4f:96:a1:cf:dd:24:ec:6a:87:fa:92:10: 35:f6:b9:e7:14:92:82:aa:4d:62:c3:8d:e5:5a:6b:e6: 90:e1:ce:60:15:26:da:5e:f5:1a:a3:4e:57:f0:dc:b1: a3:1d:27:f1:d7:87:76:6c:e7:44:1a:02:72:78:4a:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:1d:54:f3:1e:cf:51:13:74:62:03:39:a4:f4:a2:70: 26:04:71:f7:09:ea:2f:44:80:79:77:b6:7a:22:a3:a6: 21:2c:21:7d:61:64:7d:ae:d9:9d:6e:c6:36:d3:d0:ae: 6f:cb:d4:76:ea:61:03:b5:be:21:6c:2c:39:60:3c:41: ce:ab:d3:6d:5b:29:b2:6f:31:a7:a6:47:50:7b:03:84: 5c:4d:0c:87:cf:c5:cd:65:b8:c8:cf:96:0e:d7:be:e3: 5a:f7:a1:8d:55:68:bc:45:ff:7b:c2:9b:91:9b:2a:6b: 04:0d:d5:ea:99:62:66:60:57:a8:dd:ab:83:8a:eb:69: 5a:94:9e:50:80:89:c4:53:96:87:eb:67:b7:43:ad:eb: dd:a9:1d:86:ac:bd:07:8f:25:79:46:bc:d6:6c:e3:8d: 02:c6:d2:ce:1b:b1:f5:d9:4c:05:89:d5:3e:50:ff:61: 3d:b2:65:20:eb:ec:cb:e5:22:aa:0f:59:f1:64:ca:c8: 77:72:22:64:9e:d6:9b:76:20:ac:4b:82:b0:5b:65:9e: 43:da:88:a3:46:2e:81:c1:91:d6:34:f7:4c:e5:ef:c3: cb:36:16:3a:bb:7c:a7:7e:48:05:5a:c2:72:07:b9:98: 74:4b:40:b0:96:2e:c3:53:d6:97:47:5a:e0:99:82:f4 Fingerprint (SHA-256): E3:7E:13:D6:A3:98:1C:81:A4:1A:DA:70:45:4E:71:17:F9:50:84:E9:E3:04:3D:A9:92:E6:AE:24:5F:91:04:CA Fingerprint (SHA1): CF:D3:D3:91:B4:13:2A:E4:55:46:63:15:DB:60:6C:E0:53:43:C0:A3 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12510: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202059 (0x1958118b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:45:02 2016 Not After : Sun Apr 25 20:45:02 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:05:4e:74:67:64:43:1d:4f:c0:c8:5c:1c:6e:aa:03: 9a:c2:c1:6c:e2:4c:40:77:af:88:64:e8:9f:07:42:f4: 75:0c:e1:87:3b:3d:ad:78:da:58:32:b1:d4:18:97:1d: 41:71:e2:2c:9c:09:32:c7:8f:8b:1e:98:48:7c:af:8f: 1e:92:66:e0:01:5b:ba:30:32:14:50:e8:0d:d9:68:a5: 81:e3:82:97:d0:90:7a:78:51:ef:b8:b9:a0:92:c6:4c: e4:75:66:33:14:2b:2a:ea:bf:e8:29:a8:b5:5a:74:04: 40:0a:1a:09:29:03:f6:8b:5e:b7:c3:d9:f3:7e:28:49: 9a:5f:4f:95:93:2e:4d:57:4c:b1:46:7a:f3:69:fc:d3: a2:b0:46:35:0b:8e:9e:61:69:45:5a:eb:e7:ce:82:ca: c6:2a:a4:8a:70:2d:29:4b:f1:18:ff:a7:17:87:ce:e1: 15:9c:1a:23:84:95:b2:fd:cf:00:e1:c4:ad:46:a7:cb: 5a:54:09:09:4f:96:a1:cf:dd:24:ec:6a:87:fa:92:10: 35:f6:b9:e7:14:92:82:aa:4d:62:c3:8d:e5:5a:6b:e6: 90:e1:ce:60:15:26:da:5e:f5:1a:a3:4e:57:f0:dc:b1: a3:1d:27:f1:d7:87:76:6c:e7:44:1a:02:72:78:4a:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:1d:54:f3:1e:cf:51:13:74:62:03:39:a4:f4:a2:70: 26:04:71:f7:09:ea:2f:44:80:79:77:b6:7a:22:a3:a6: 21:2c:21:7d:61:64:7d:ae:d9:9d:6e:c6:36:d3:d0:ae: 6f:cb:d4:76:ea:61:03:b5:be:21:6c:2c:39:60:3c:41: ce:ab:d3:6d:5b:29:b2:6f:31:a7:a6:47:50:7b:03:84: 5c:4d:0c:87:cf:c5:cd:65:b8:c8:cf:96:0e:d7:be:e3: 5a:f7:a1:8d:55:68:bc:45:ff:7b:c2:9b:91:9b:2a:6b: 04:0d:d5:ea:99:62:66:60:57:a8:dd:ab:83:8a:eb:69: 5a:94:9e:50:80:89:c4:53:96:87:eb:67:b7:43:ad:eb: dd:a9:1d:86:ac:bd:07:8f:25:79:46:bc:d6:6c:e3:8d: 02:c6:d2:ce:1b:b1:f5:d9:4c:05:89:d5:3e:50:ff:61: 3d:b2:65:20:eb:ec:cb:e5:22:aa:0f:59:f1:64:ca:c8: 77:72:22:64:9e:d6:9b:76:20:ac:4b:82:b0:5b:65:9e: 43:da:88:a3:46:2e:81:c1:91:d6:34:f7:4c:e5:ef:c3: cb:36:16:3a:bb:7c:a7:7e:48:05:5a:c2:72:07:b9:98: 74:4b:40:b0:96:2e:c3:53:d6:97:47:5a:e0:99:82:f4 Fingerprint (SHA-256): E3:7E:13:D6:A3:98:1C:81:A4:1A:DA:70:45:4E:71:17:F9:50:84:E9:E3:04:3D:A9:92:E6:AE:24:5F:91:04:CA Fingerprint (SHA1): CF:D3:D3:91:B4:13:2A:E4:55:46:63:15:DB:60:6C:E0:53:43:C0:A3 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12511: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #12512: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202066 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12513: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #12514: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #12515: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202067 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12516: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #12517: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #12518: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12519: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 425202068 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12520: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12521: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #12522: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12523: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 425202069 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12524: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12525: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #12526: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12527: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 425202070 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #12528: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12529: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 425202071 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #12530: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12531: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #12532: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12533: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12534: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425202072 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12535: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12536: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12537: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12538: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425202073 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12539: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12540: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12541: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12542: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425202074 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12543: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12544: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12545: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12546: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425202075 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12547: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12548: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12549: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202066 (0x19581192) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:46:18 2016 Not After : Sun Apr 25 20:46:18 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:33:5b:a2:27:03:d7:4a:c0:9f:42:bf:7d:e4:f1:28: 2d:d7:22:90:e1:3e:1f:af:f7:a4:3f:4c:d7:f0:db:68: 98:da:93:4d:82:26:9b:ab:c4:cc:f1:2e:ad:90:09:ed: de:77:6b:98:8e:8a:29:0c:6b:de:5a:61:e0:86:9f:88: 8b:a7:87:c1:bd:07:d8:b3:dd:ca:57:7c:2d:f5:5b:bf: 6b:83:0a:09:c2:e5:a7:cb:d8:97:f3:17:e7:19:0c:a0: 95:76:ab:c1:1f:39:da:8c:af:de:da:52:1e:19:82:f2: bb:e5:5e:22:63:8d:85:cd:50:a4:77:5f:70:40:32:05: be:ff:5b:7b:f7:23:ea:e2:23:30:0c:55:c9:94:85:a5: 3e:9a:04:97:a2:d0:fa:7b:5c:9a:ca:ee:a9:08:c4:31: 3c:0e:c0:b5:34:e0:fd:9d:82:02:c9:b9:d9:23:66:59: cf:5b:ad:40:f7:27:34:0e:f7:a1:f5:b9:4f:fe:85:6f: 80:72:f4:6e:8c:f1:ef:b7:5c:ba:22:63:d3:30:45:54: 3f:c6:40:8c:86:27:44:e3:0e:eb:34:d2:f3:df:ed:4d: 0e:66:74:08:48:0b:07:92:ab:7d:45:9c:46:75:e4:5d: 50:8c:9b:31:07:f5:37:e9:4c:d7:37:bd:32:04:c9:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c8:40:43:32:f4:80:76:93:85:d5:3a:59:64:c0:db:71: b4:1a:6e:84:e1:8a:89:1d:af:31:34:ff:9c:85:0c:3a: 7a:9a:4b:43:c8:ec:de:ed:5b:2a:ee:3c:6a:40:ca:12: e6:2d:24:48:7d:a9:5c:d8:bd:b5:ca:6b:44:17:fe:9f: cb:10:8a:e8:27:0a:39:51:b6:f0:c9:96:54:fc:6a:70: a9:db:78:f0:fc:b6:44:c0:b8:f7:a3:3e:90:0f:d6:dc: 7e:76:f3:a4:4e:8b:78:95:75:eb:8d:0e:18:94:7b:5b: 76:5e:c7:d4:8d:02:62:18:e1:d5:41:4e:b4:91:0e:40: 06:9f:f1:3f:83:97:3a:8a:8c:87:ab:06:24:09:66:bf: c0:07:f2:ca:d8:60:37:db:48:26:e5:0b:cc:bd:ed:b4: 4c:05:c6:15:d7:3c:e5:d1:77:45:35:92:56:60:25:9b: 73:90:75:ea:e4:b3:84:54:4c:c7:8a:b1:ea:02:73:72: 37:5c:e3:1e:45:0b:d6:47:44:8d:72:84:5d:42:e0:a5: 69:a1:e1:81:00:ae:37:a8:69:70:e6:89:a6:62:5d:bc: e6:3a:ae:16:3d:45:fa:de:7b:fb:9a:74:41:b9:ab:dd: 96:3e:c8:a9:26:4e:a6:66:5a:0c:3e:18:5e:78:2b:ec Fingerprint (SHA-256): 1D:4E:E9:E1:18:09:21:46:D6:BE:A0:13:07:4A:42:AF:B1:86:A6:38:50:DC:C8:CC:9C:E9:56:2A:57:1F:E2:4F Fingerprint (SHA1): 3E:E7:37:86:64:D3:9F:59:72:8B:D8:3C:A3:7D:60:89:02:31:AA:AF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #12550: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12551: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12552: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12553: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12554: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12555: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12556: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12557: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12558: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202067 (0x19581193) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:46:26 2016 Not After : Sun Apr 25 20:46:26 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:6f:46:9d:5f:f2:99:72:b9:ef:ec:df:88:5c:a0:9d: e0:67:61:2e:68:a6:95:f3:57:90:40:74:ca:67:6f:f4: 7f:5b:41:58:b8:15:1a:88:2e:cf:d6:59:3e:78:d6:e5: 7b:4f:d3:f3:e5:a1:4e:8a:b0:9a:48:5d:51:3b:95:38: c2:c7:0a:43:e7:04:4f:80:c0:a9:8f:2c:98:1b:88:47: 32:f2:91:fe:1f:dd:74:a8:9e:20:9e:9a:33:d6:93:56: b9:32:87:1d:b2:61:39:68:c6:8c:54:04:a8:5d:01:1b: 94:f2:51:aa:95:40:5d:3b:0a:68:80:b4:17:99:af:0e: d4:d7:6a:de:f9:81:e2:89:3e:0d:b0:b1:3a:9a:fe:d7: b0:7a:71:b4:c8:b6:a4:85:5e:ea:64:dc:80:7f:59:72: 9d:93:06:4e:0d:d5:62:4c:81:67:ee:a9:1b:a4:92:23: 83:5b:2d:9f:86:3d:b2:09:10:3a:07:df:19:31:5f:0b: e8:df:4c:34:69:ab:cb:a8:a6:5d:ce:c6:4a:67:1f:da: de:be:dd:46:57:db:2f:4a:2e:1b:06:e6:24:0b:44:4c: a3:8e:8d:54:0a:f7:f2:9e:e2:4e:6c:81:b6:61:69:09: 96:d8:8b:15:f2:e9:bf:8b:a5:26:e4:29:26:16:b1:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:90:a1:c9:da:95:0b:8f:04:da:42:e6:99:1b:af:cc: 4e:6b:e3:04:5b:18:a1:6f:d7:4d:0c:79:5a:e0:5e:1f: 4f:eb:4e:b3:f4:49:ac:0e:df:40:de:8e:26:03:3b:18: 76:78:6a:df:86:ec:49:fd:67:bd:13:b7:4c:44:78:14: cc:27:c1:09:86:17:be:c4:20:77:ba:1c:06:9e:f7:39: c2:c0:40:b8:be:0b:9b:da:ac:52:b8:ba:c1:f7:9e:e8: 23:f7:77:79:e4:ce:29:bb:e3:8b:b5:b7:69:7e:14:b2: e1:3f:06:f8:94:d0:85:cd:3c:53:61:96:e3:fb:20:2a: a4:13:04:29:bf:94:cd:9e:d8:ab:e3:72:bd:5b:90:8e: 5a:3d:c1:0d:4b:e9:7d:9a:46:ab:0e:ec:2f:ef:65:15: 95:06:6d:a9:30:dc:32:97:20:d6:7c:0c:b0:e7:64:f3: 4b:e5:e1:06:b4:15:14:96:a7:df:41:71:b4:3b:9f:3c: 1e:af:5e:93:c2:33:8b:c7:63:01:49:be:da:35:63:65: 59:f8:84:6d:5b:70:7f:df:60:31:5c:e0:99:e1:39:b3: 26:e4:3f:bd:01:f4:35:22:f5:03:3e:9b:61:4b:9f:a7: 7c:4d:be:b0:43:0e:ce:0c:82:a8:00:f5:2b:3d:90:66 Fingerprint (SHA-256): E5:6D:02:11:5F:4E:D4:34:40:43:82:B0:31:15:CD:A5:88:35:A7:ED:5F:BA:4B:41:E8:51:BF:92:81:A1:7B:1F Fingerprint (SHA1): A4:21:F3:5C:52:A8:F8:81:1E:BD:5F:50:B6:4B:89:5A:73:39:DB:49 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #12559: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12560: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12561: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12562: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12563: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12564: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12565: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #12566: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #12567: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #12568: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #12569: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #12570: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #12571: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #12572: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #12573: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #12574: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #12575: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #12576: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12577: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202076 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12578: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12579: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12580: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12581: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202077 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12582: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12583: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12584: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12585: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425202078 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12586: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12587: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12588: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12589: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 425202079 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12590: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12591: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12592: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12593: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425202080 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12594: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12595: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #12596: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12597: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 425202081 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12598: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12599: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #12600: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12601: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 425202082 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12602: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12603: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #12604: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12605: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 425202083 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12606: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12607: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #12608: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12609: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 425202084 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12610: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12611: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12612: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202076 (0x1958119c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:48:07 2016 Not After : Sun Apr 25 20:48:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4f:36:e0:d8:bf:bc:af:2f:65:31:c8:3f:58:a1:65:ec: 5d:85:bd:25:d9:dc:75:1e:6d:37:1f:44:66:ab:ca:f9: cf:bf:1b:3b:cc:b2:cd:d0:28:ce:42:7c:49:ea:bd:f1: 96:89:a6:7d:b9:37:fd:cd:2a:15:41:44:32:24:73:41: db:e6:ef:9c:48:c5:f3:36:1f:0b:79:1d:4d:06:27:03: 81:72:50:0e:99:a1:65:bd:b6:87:0d:10:3d:60:18:d0: ce:20:77:fd:b4:1e:3a:60:85:77:f1:32:f2:6f:af:1f: 98:80:97:e2:5e:96:78:e2:b2:49:9f:3b:fb:a4:77:9f: e7:ab:87:82:6d:26:4a:99:2f:ac:6e:ef:14:92:99:5b: 87:3c:93:18:81:4f:e4:2d:d5:db:5d:50:20:24:9e:b8: 2f:45:c2:9f:95:67:7b:2f:cd:f6:99:c8:d4:ab:d4:a8: 67:28:64:18:65:f6:f6:6e:55:75:7d:fa:1a:c3:c8:ce: d5:32:f0:fe:74:79:34:88:37:9e:38:bb:a9:8b:12:ed: 35:9f:2e:d7:63:00:d5:fb:83:15:d7:77:b0:26:d1:80: 32:2e:5c:06:84:83:f6:76:0f:9b:3f:72:02:07:1a:27: f6:e3:71:d3:9a:b8:0b:09:5d:0e:4a:af:41:88:6a:1d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:6a:a6:7a:24:a9:b3:43:0e:57:5a:92:2e: cf:cc:af:2b:3b:fe:26:6d:69:0e:3b:5e:fe:1a:7f:e2: 02:1d:00:e6:9a:21:80:b9:79:95:ff:60:95:25:e4:6d: bd:dd:ea:a5:af:fb:0d:6a:1f:3b:8d:53:bc:f6:68 Fingerprint (SHA-256): 03:A9:1A:C3:9E:95:1F:D7:A5:98:69:36:08:1C:EF:65:25:82:F3:1B:21:45:E9:84:F9:5C:6F:B6:34:37:09:3E Fingerprint (SHA1): 61:37:37:EF:91:D8:E3:BD:00:48:5B:9B:D3:EE:E3:C1:A6:58:1A:45 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12613: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202076 (0x1958119c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:48:07 2016 Not After : Sun Apr 25 20:48:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4f:36:e0:d8:bf:bc:af:2f:65:31:c8:3f:58:a1:65:ec: 5d:85:bd:25:d9:dc:75:1e:6d:37:1f:44:66:ab:ca:f9: cf:bf:1b:3b:cc:b2:cd:d0:28:ce:42:7c:49:ea:bd:f1: 96:89:a6:7d:b9:37:fd:cd:2a:15:41:44:32:24:73:41: db:e6:ef:9c:48:c5:f3:36:1f:0b:79:1d:4d:06:27:03: 81:72:50:0e:99:a1:65:bd:b6:87:0d:10:3d:60:18:d0: ce:20:77:fd:b4:1e:3a:60:85:77:f1:32:f2:6f:af:1f: 98:80:97:e2:5e:96:78:e2:b2:49:9f:3b:fb:a4:77:9f: e7:ab:87:82:6d:26:4a:99:2f:ac:6e:ef:14:92:99:5b: 87:3c:93:18:81:4f:e4:2d:d5:db:5d:50:20:24:9e:b8: 2f:45:c2:9f:95:67:7b:2f:cd:f6:99:c8:d4:ab:d4:a8: 67:28:64:18:65:f6:f6:6e:55:75:7d:fa:1a:c3:c8:ce: d5:32:f0:fe:74:79:34:88:37:9e:38:bb:a9:8b:12:ed: 35:9f:2e:d7:63:00:d5:fb:83:15:d7:77:b0:26:d1:80: 32:2e:5c:06:84:83:f6:76:0f:9b:3f:72:02:07:1a:27: f6:e3:71:d3:9a:b8:0b:09:5d:0e:4a:af:41:88:6a:1d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:6a:a6:7a:24:a9:b3:43:0e:57:5a:92:2e: cf:cc:af:2b:3b:fe:26:6d:69:0e:3b:5e:fe:1a:7f:e2: 02:1d:00:e6:9a:21:80:b9:79:95:ff:60:95:25:e4:6d: bd:dd:ea:a5:af:fb:0d:6a:1f:3b:8d:53:bc:f6:68 Fingerprint (SHA-256): 03:A9:1A:C3:9E:95:1F:D7:A5:98:69:36:08:1C:EF:65:25:82:F3:1B:21:45:E9:84:F9:5C:6F:B6:34:37:09:3E Fingerprint (SHA1): 61:37:37:EF:91:D8:E3:BD:00:48:5B:9B:D3:EE:E3:C1:A6:58:1A:45 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12614: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202076 (0x1958119c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:48:07 2016 Not After : Sun Apr 25 20:48:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4f:36:e0:d8:bf:bc:af:2f:65:31:c8:3f:58:a1:65:ec: 5d:85:bd:25:d9:dc:75:1e:6d:37:1f:44:66:ab:ca:f9: cf:bf:1b:3b:cc:b2:cd:d0:28:ce:42:7c:49:ea:bd:f1: 96:89:a6:7d:b9:37:fd:cd:2a:15:41:44:32:24:73:41: db:e6:ef:9c:48:c5:f3:36:1f:0b:79:1d:4d:06:27:03: 81:72:50:0e:99:a1:65:bd:b6:87:0d:10:3d:60:18:d0: ce:20:77:fd:b4:1e:3a:60:85:77:f1:32:f2:6f:af:1f: 98:80:97:e2:5e:96:78:e2:b2:49:9f:3b:fb:a4:77:9f: e7:ab:87:82:6d:26:4a:99:2f:ac:6e:ef:14:92:99:5b: 87:3c:93:18:81:4f:e4:2d:d5:db:5d:50:20:24:9e:b8: 2f:45:c2:9f:95:67:7b:2f:cd:f6:99:c8:d4:ab:d4:a8: 67:28:64:18:65:f6:f6:6e:55:75:7d:fa:1a:c3:c8:ce: d5:32:f0:fe:74:79:34:88:37:9e:38:bb:a9:8b:12:ed: 35:9f:2e:d7:63:00:d5:fb:83:15:d7:77:b0:26:d1:80: 32:2e:5c:06:84:83:f6:76:0f:9b:3f:72:02:07:1a:27: f6:e3:71:d3:9a:b8:0b:09:5d:0e:4a:af:41:88:6a:1d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:6a:a6:7a:24:a9:b3:43:0e:57:5a:92:2e: cf:cc:af:2b:3b:fe:26:6d:69:0e:3b:5e:fe:1a:7f:e2: 02:1d:00:e6:9a:21:80:b9:79:95:ff:60:95:25:e4:6d: bd:dd:ea:a5:af:fb:0d:6a:1f:3b:8d:53:bc:f6:68 Fingerprint (SHA-256): 03:A9:1A:C3:9E:95:1F:D7:A5:98:69:36:08:1C:EF:65:25:82:F3:1B:21:45:E9:84:F9:5C:6F:B6:34:37:09:3E Fingerprint (SHA1): 61:37:37:EF:91:D8:E3:BD:00:48:5B:9B:D3:EE:E3:C1:A6:58:1A:45 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #12615: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202076 (0x1958119c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:48:07 2016 Not After : Sun Apr 25 20:48:07 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4f:36:e0:d8:bf:bc:af:2f:65:31:c8:3f:58:a1:65:ec: 5d:85:bd:25:d9:dc:75:1e:6d:37:1f:44:66:ab:ca:f9: cf:bf:1b:3b:cc:b2:cd:d0:28:ce:42:7c:49:ea:bd:f1: 96:89:a6:7d:b9:37:fd:cd:2a:15:41:44:32:24:73:41: db:e6:ef:9c:48:c5:f3:36:1f:0b:79:1d:4d:06:27:03: 81:72:50:0e:99:a1:65:bd:b6:87:0d:10:3d:60:18:d0: ce:20:77:fd:b4:1e:3a:60:85:77:f1:32:f2:6f:af:1f: 98:80:97:e2:5e:96:78:e2:b2:49:9f:3b:fb:a4:77:9f: e7:ab:87:82:6d:26:4a:99:2f:ac:6e:ef:14:92:99:5b: 87:3c:93:18:81:4f:e4:2d:d5:db:5d:50:20:24:9e:b8: 2f:45:c2:9f:95:67:7b:2f:cd:f6:99:c8:d4:ab:d4:a8: 67:28:64:18:65:f6:f6:6e:55:75:7d:fa:1a:c3:c8:ce: d5:32:f0:fe:74:79:34:88:37:9e:38:bb:a9:8b:12:ed: 35:9f:2e:d7:63:00:d5:fb:83:15:d7:77:b0:26:d1:80: 32:2e:5c:06:84:83:f6:76:0f:9b:3f:72:02:07:1a:27: f6:e3:71:d3:9a:b8:0b:09:5d:0e:4a:af:41:88:6a:1d Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3d:02:1c:6a:a6:7a:24:a9:b3:43:0e:57:5a:92:2e: cf:cc:af:2b:3b:fe:26:6d:69:0e:3b:5e:fe:1a:7f:e2: 02:1d:00:e6:9a:21:80:b9:79:95:ff:60:95:25:e4:6d: bd:dd:ea:a5:af:fb:0d:6a:1f:3b:8d:53:bc:f6:68 Fingerprint (SHA-256): 03:A9:1A:C3:9E:95:1F:D7:A5:98:69:36:08:1C:EF:65:25:82:F3:1B:21:45:E9:84:F9:5C:6F:B6:34:37:09:3E Fingerprint (SHA1): 61:37:37:EF:91:D8:E3:BD:00:48:5B:9B:D3:EE:E3:C1:A6:58:1A:45 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #12616: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12617: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12618: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12619: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #12620: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12621: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12622: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12623: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12624: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12625: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12626: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12627: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #12628: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12629: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12630: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12631: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #12632: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12633: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12634: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12635: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12636: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12637: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12638: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12639: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #12640: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12641: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12642: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12643: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425205024Z nextupdate=20170425205024Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 20:50:24 2016 Next Update: Tue Apr 25 20:50:24 2017 CRL Extensions: chains.sh: #12644: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425205025Z nextupdate=20170425205025Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 20:50:25 2016 Next Update: Tue Apr 25 20:50:25 2017 CRL Extensions: chains.sh: #12645: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425205025Z nextupdate=20170425205025Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 20:50:25 2016 Next Update: Tue Apr 25 20:50:25 2017 CRL Extensions: chains.sh: #12646: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425205026Z nextupdate=20170425205026Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 20:50:26 2016 Next Update: Tue Apr 25 20:50:26 2017 CRL Extensions: chains.sh: #12647: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425205027Z addcert 14 20160425205027Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 20:50:27 2016 Next Update: Tue Apr 25 20:50:25 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Apr 25 20:50:27 2016 CRL Extensions: chains.sh: #12648: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425205028Z addcert 15 20160425205028Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 20:50:28 2016 Next Update: Tue Apr 25 20:50:25 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Apr 25 20:50:28 2016 CRL Extensions: chains.sh: #12649: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12650: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12651: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #12652: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #12653: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #12654: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #12655: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #12656: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #12657: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #12658: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:49:17 2016 Not After : Sun Apr 25 20:49:17 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:f5:1a:bf:f5:c1:9f:32:ce:1d:53:69:1e:86:76:29: 8c:e7:c5:3f:6f:4d:aa:30:9e:bf:6e:6c:0b:cd:a2:20: 80:0f:ce:e3:91:02:10:6f:af:1e:be:c7:88:76:21:43: f1:60:8e:12:e1:26:ab:15:a1:53:dd:16:d3:16:80:44: 64:f1:5f:79:2a:22:d5:1f:96:76:1d:d0:2b:85:3a:a1: a5:93:3f:35:a5:90:c2:d3:7e:d5:c7:2c:b3:84:25:f0: b8:3a:d3:97:cc:fa:52:98:67:0f:6b:12:6e:54:b2:4f: 91:52:2c:d3:c5:33:84:d2:7d:80:4e:44:26:31:d4:3e: 34:91:7b:18:d8:dd:7f:86:53:31:ea:c1:15:24:bc:85: 6b:65:10:e8:b6:c6:dd:48:86:93:23:87:b7:8c:b6:01: 2e:64:17:f1:dd:25:cc:02:61:e8:23:a0:ad:66:aa:e4: 54:74:e7:c8:46:72:f7:a1:99:19:86:e6:be:f2:7f:34: 87:e5:81:7a:ba:21:b4:fc:79:0d:b8:ea:c6:e9:a4:6e: 23:40:61:71:b4:18:e4:ab:6b:f3:7f:6b:c6:35:ca:a7: 2b:99:2f:03:86:53:42:66:30:52:ca:a6:99:cc:80:c4: de:56:f7:a1:5b:10:10:94:80:64:be:3a:20:9b:36:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:f3:20:77:51:9a:a4:d1:2e:d5:98:30:a1:7e:e2:86: 2a:51:45:de:96:b4:33:71:bd:df:8d:d8:89:1c:38:aa: 88:99:96:3c:22:5d:05:91:9d:31:e6:bc:35:2a:84:9b: 83:53:4f:d1:d6:f8:9f:80:9a:a9:25:07:0c:0b:85:3e: 81:17:2a:52:de:95:fb:ff:e2:11:78:6f:ce:e1:c2:73: fe:b1:f1:8b:8a:96:55:79:6b:1c:43:82:7e:7b:0c:01: b9:fc:ec:83:55:5f:96:9f:21:10:67:07:98:45:de:89: 15:6f:31:c8:d3:c6:34:54:3d:b2:1d:14:ee:d3:f4:cc: ef:5e:ad:d1:e0:32:10:2e:e5:61:3b:3f:fd:e6:f0:44: f8:ca:e2:ab:59:a8:ca:1e:0e:2a:9c:6a:ff:6a:a2:e6: 66:d4:73:18:2c:8a:8c:d7:01:01:eb:19:9e:d5:6d:93: 2d:b4:9d:d3:b1:fc:ff:06:7e:93:60:df:37:71:cd:a9: 7d:c6:a0:ac:88:0f:04:30:63:13:12:52:57:6a:11:13: 3a:c6:fa:62:db:81:06:0e:ae:55:dc:16:66:7a:17:17: 81:01:18:e7:cd:77:95:81:81:d3:d5:04:73:9e:3d:5c: 0f:1b:a8:c2:92:a9:b4:6c:74:40:44:d0:e1:87:a0:d7 Fingerprint (SHA-256): EE:7B:83:5E:2E:00:5E:49:BE:99:68:34:B8:7F:B5:EB:CD:98:58:9D:13:BB:2F:4B:83:52:B4:C0:47:89:97:C7 Fingerprint (SHA1): 96:D7:A6:7A:DF:7D:3A:24:EA:9A:9C:5F:AF:32:28:53:5B:B4:CE:EC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #12659: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #12660: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:49:17 2016 Not After : Sun Apr 25 20:49:17 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:f5:1a:bf:f5:c1:9f:32:ce:1d:53:69:1e:86:76:29: 8c:e7:c5:3f:6f:4d:aa:30:9e:bf:6e:6c:0b:cd:a2:20: 80:0f:ce:e3:91:02:10:6f:af:1e:be:c7:88:76:21:43: f1:60:8e:12:e1:26:ab:15:a1:53:dd:16:d3:16:80:44: 64:f1:5f:79:2a:22:d5:1f:96:76:1d:d0:2b:85:3a:a1: a5:93:3f:35:a5:90:c2:d3:7e:d5:c7:2c:b3:84:25:f0: b8:3a:d3:97:cc:fa:52:98:67:0f:6b:12:6e:54:b2:4f: 91:52:2c:d3:c5:33:84:d2:7d:80:4e:44:26:31:d4:3e: 34:91:7b:18:d8:dd:7f:86:53:31:ea:c1:15:24:bc:85: 6b:65:10:e8:b6:c6:dd:48:86:93:23:87:b7:8c:b6:01: 2e:64:17:f1:dd:25:cc:02:61:e8:23:a0:ad:66:aa:e4: 54:74:e7:c8:46:72:f7:a1:99:19:86:e6:be:f2:7f:34: 87:e5:81:7a:ba:21:b4:fc:79:0d:b8:ea:c6:e9:a4:6e: 23:40:61:71:b4:18:e4:ab:6b:f3:7f:6b:c6:35:ca:a7: 2b:99:2f:03:86:53:42:66:30:52:ca:a6:99:cc:80:c4: de:56:f7:a1:5b:10:10:94:80:64:be:3a:20:9b:36:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:f3:20:77:51:9a:a4:d1:2e:d5:98:30:a1:7e:e2:86: 2a:51:45:de:96:b4:33:71:bd:df:8d:d8:89:1c:38:aa: 88:99:96:3c:22:5d:05:91:9d:31:e6:bc:35:2a:84:9b: 83:53:4f:d1:d6:f8:9f:80:9a:a9:25:07:0c:0b:85:3e: 81:17:2a:52:de:95:fb:ff:e2:11:78:6f:ce:e1:c2:73: fe:b1:f1:8b:8a:96:55:79:6b:1c:43:82:7e:7b:0c:01: b9:fc:ec:83:55:5f:96:9f:21:10:67:07:98:45:de:89: 15:6f:31:c8:d3:c6:34:54:3d:b2:1d:14:ee:d3:f4:cc: ef:5e:ad:d1:e0:32:10:2e:e5:61:3b:3f:fd:e6:f0:44: f8:ca:e2:ab:59:a8:ca:1e:0e:2a:9c:6a:ff:6a:a2:e6: 66:d4:73:18:2c:8a:8c:d7:01:01:eb:19:9e:d5:6d:93: 2d:b4:9d:d3:b1:fc:ff:06:7e:93:60:df:37:71:cd:a9: 7d:c6:a0:ac:88:0f:04:30:63:13:12:52:57:6a:11:13: 3a:c6:fa:62:db:81:06:0e:ae:55:dc:16:66:7a:17:17: 81:01:18:e7:cd:77:95:81:81:d3:d5:04:73:9e:3d:5c: 0f:1b:a8:c2:92:a9:b4:6c:74:40:44:d0:e1:87:a0:d7 Fingerprint (SHA-256): EE:7B:83:5E:2E:00:5E:49:BE:99:68:34:B8:7F:B5:EB:CD:98:58:9D:13:BB:2F:4B:83:52:B4:C0:47:89:97:C7 Fingerprint (SHA1): 96:D7:A6:7A:DF:7D:3A:24:EA:9A:9C:5F:AF:32:28:53:5B:B4:CE:EC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #12661: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #12662: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12663: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202085 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12664: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12665: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #12666: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12667: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 425202086 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12668: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12669: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12670: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201976.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12671: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425201961.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12672: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12673: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #12674: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201976.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12675: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 425202087 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12676: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12677: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12678: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201976.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12679: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425201962.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12680: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12681: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #12682: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12683: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 425202088 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12684: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12685: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12686: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201976.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12687: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425201963.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12688: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12689: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12690: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201976.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #12691: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425201964.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12692: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12693: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425205239Z nextupdate=20170425205239Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 20:52:39 2016 Next Update: Tue Apr 25 20:52:39 2017 CRL Extensions: chains.sh: #12694: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425205240Z nextupdate=20170425205240Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 20:52:40 2016 Next Update: Tue Apr 25 20:52:40 2017 CRL Extensions: chains.sh: #12695: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425205241Z nextupdate=20170425205241Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 20:52:41 2016 Next Update: Tue Apr 25 20:52:41 2017 CRL Extensions: chains.sh: #12696: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425205241Z nextupdate=20170425205241Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 20:52:41 2016 Next Update: Tue Apr 25 20:52:41 2017 CRL Extensions: chains.sh: #12697: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425205242Z addcert 20 20160425205242Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 20:52:42 2016 Next Update: Tue Apr 25 20:52:40 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 20:52:42 2016 CRL Extensions: chains.sh: #12698: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425205243Z addcert 40 20160425205243Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 20:52:43 2016 Next Update: Tue Apr 25 20:52:40 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 20:52:42 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Apr 25 20:52:43 2016 CRL Extensions: chains.sh: #12699: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12700: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12701: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #12702: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202085 (0x195811a5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:50:42 2016 Not After : Sun Apr 25 20:50:42 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:3f:d3:0c:1f:62:3d:70:88:50:85:c9:5f:ac:46:da: eb:dc:29:18:1a:09:ac:f2:fd:71:1c:9b:eb:f5:83:00: e1:77:b1:ca:72:7c:61:cc:17:d8:4f:39:e4:08:0d:52: 4c:61:33:e9:99:8a:41:54:ed:65:8c:dc:83:5a:16:4e: e7:66:9c:32:0c:d0:32:af:21:33:9b:64:b1:bd:ed:a8: a1:cb:6d:40:d0:2c:51:37:0e:92:93:13:ac:52:9e:05: 89:cf:20:b8:09:ad:03:32:74:71:af:d2:bf:ed:44:c2: 13:c5:7b:6e:95:1b:e7:92:44:fe:14:83:f1:70:1a:a0: 5d:a9:fe:87:cc:07:4f:17:b5:c4:c3:ff:e5:c6:c6:0f: 41:eb:63:4f:9b:9e:60:b8:23:fe:86:48:c0:4a:ef:16: 37:05:ef:86:6d:64:4d:32:94:ed:d8:37:62:d1:94:76: a5:27:96:49:54:da:96:ce:69:eb:68:23:47:01:29:f8: 50:f8:16:80:69:f4:ab:a6:5a:8f:a5:82:56:f4:cf:04: b1:e5:78:d7:0b:a9:18:72:e0:6c:d2:7c:9d:d0:5c:ba: 4e:ed:44:75:58:54:38:45:26:09:fc:81:46:8e:63:40: e7:42:32:9d:12:2b:51:82:72:3c:32:d5:dc:5c:d9:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:67:20:04:2f:e4:ff:58:d6:26:29:8b:f6:eb:27:e2: 5f:5e:47:8c:ec:ae:3e:9e:43:a3:0f:83:7d:11:7a:4c: 70:a9:f9:70:f3:1e:78:43:ce:6d:ed:73:97:b5:d3:3a: ea:d9:a2:bc:1b:4f:c6:f9:09:f1:64:81:1b:bd:e7:e8: fd:8e:f4:63:ba:01:cf:0b:73:75:e7:b6:b9:cc:79:0e: 6f:bd:d9:dd:49:6c:db:0f:03:28:79:17:5d:5e:58:48: 15:fc:8a:47:48:80:78:b6:77:a4:2d:94:ca:16:e1:c4: 97:6d:8a:8b:6f:14:13:28:16:17:55:7e:cb:b0:6e:56: 30:31:92:b0:76:77:cb:98:6b:e2:81:67:3f:f4:e1:8f: 87:61:32:d5:6e:d1:eb:ce:ad:01:cd:36:07:40:56:f8: eb:0e:78:3a:ba:fd:fc:0b:23:88:42:79:79:bb:74:d6: 69:74:53:36:25:4b:e4:66:b1:3d:fa:11:1d:9a:f8:de: b8:0b:7f:d7:16:d9:34:16:d9:09:9e:03:7c:99:a0:fa: 58:5f:f1:20:f5:d0:10:c3:aa:04:62:b8:89:36:91:85: 1c:e6:ab:f2:d1:ee:52:17:6f:4d:c2:54:92:2a:f9:88: cf:02:ce:48:da:10:82:d8:ee:dc:e4:f4:02:ec:09:de Fingerprint (SHA-256): 7B:AC:DB:36:4F:2B:3B:3F:1E:58:B3:EB:38:67:9B:55:ED:98:C6:EC:5C:B9:C2:11:E8:28:40:71:C5:01:4E:20 Fingerprint (SHA1): 0D:C0:84:11:6A:1B:65:B1:5D:57:10:63:95:23:57:CA:51:85:CB:14 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #12703: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #12704: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202085 (0x195811a5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:50:42 2016 Not After : Sun Apr 25 20:50:42 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:3f:d3:0c:1f:62:3d:70:88:50:85:c9:5f:ac:46:da: eb:dc:29:18:1a:09:ac:f2:fd:71:1c:9b:eb:f5:83:00: e1:77:b1:ca:72:7c:61:cc:17:d8:4f:39:e4:08:0d:52: 4c:61:33:e9:99:8a:41:54:ed:65:8c:dc:83:5a:16:4e: e7:66:9c:32:0c:d0:32:af:21:33:9b:64:b1:bd:ed:a8: a1:cb:6d:40:d0:2c:51:37:0e:92:93:13:ac:52:9e:05: 89:cf:20:b8:09:ad:03:32:74:71:af:d2:bf:ed:44:c2: 13:c5:7b:6e:95:1b:e7:92:44:fe:14:83:f1:70:1a:a0: 5d:a9:fe:87:cc:07:4f:17:b5:c4:c3:ff:e5:c6:c6:0f: 41:eb:63:4f:9b:9e:60:b8:23:fe:86:48:c0:4a:ef:16: 37:05:ef:86:6d:64:4d:32:94:ed:d8:37:62:d1:94:76: a5:27:96:49:54:da:96:ce:69:eb:68:23:47:01:29:f8: 50:f8:16:80:69:f4:ab:a6:5a:8f:a5:82:56:f4:cf:04: b1:e5:78:d7:0b:a9:18:72:e0:6c:d2:7c:9d:d0:5c:ba: 4e:ed:44:75:58:54:38:45:26:09:fc:81:46:8e:63:40: e7:42:32:9d:12:2b:51:82:72:3c:32:d5:dc:5c:d9:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:67:20:04:2f:e4:ff:58:d6:26:29:8b:f6:eb:27:e2: 5f:5e:47:8c:ec:ae:3e:9e:43:a3:0f:83:7d:11:7a:4c: 70:a9:f9:70:f3:1e:78:43:ce:6d:ed:73:97:b5:d3:3a: ea:d9:a2:bc:1b:4f:c6:f9:09:f1:64:81:1b:bd:e7:e8: fd:8e:f4:63:ba:01:cf:0b:73:75:e7:b6:b9:cc:79:0e: 6f:bd:d9:dd:49:6c:db:0f:03:28:79:17:5d:5e:58:48: 15:fc:8a:47:48:80:78:b6:77:a4:2d:94:ca:16:e1:c4: 97:6d:8a:8b:6f:14:13:28:16:17:55:7e:cb:b0:6e:56: 30:31:92:b0:76:77:cb:98:6b:e2:81:67:3f:f4:e1:8f: 87:61:32:d5:6e:d1:eb:ce:ad:01:cd:36:07:40:56:f8: eb:0e:78:3a:ba:fd:fc:0b:23:88:42:79:79:bb:74:d6: 69:74:53:36:25:4b:e4:66:b1:3d:fa:11:1d:9a:f8:de: b8:0b:7f:d7:16:d9:34:16:d9:09:9e:03:7c:99:a0:fa: 58:5f:f1:20:f5:d0:10:c3:aa:04:62:b8:89:36:91:85: 1c:e6:ab:f2:d1:ee:52:17:6f:4d:c2:54:92:2a:f9:88: cf:02:ce:48:da:10:82:d8:ee:dc:e4:f4:02:ec:09:de Fingerprint (SHA-256): 7B:AC:DB:36:4F:2B:3B:3F:1E:58:B3:EB:38:67:9B:55:ED:98:C6:EC:5C:B9:C2:11:E8:28:40:71:C5:01:4E:20 Fingerprint (SHA1): 0D:C0:84:11:6A:1B:65:B1:5D:57:10:63:95:23:57:CA:51:85:CB:14 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #12705: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #12706: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #12707: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202089 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12708: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #12709: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12710: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12711: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425202090 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12712: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12713: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12714: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12715: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202091 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12716: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12717: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12718: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12719: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 425202092 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12720: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12721: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #12722: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202093 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12723: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #12724: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #12725: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12726: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 425202094 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12727: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12728: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #12729: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12730: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 425202095 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12731: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12732: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #12733: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #12734: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #12735: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202089 (0x195811a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:53:25 2016 Not After : Sun Apr 25 20:53:25 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a3:b7:32:2b:5f:40:9f:12:dc:b7:a0:ad:77:52:bf: 3d:79:94:b9:ad:83:04:42:a3:8e:89:ab:f7:e3:15:7a: 69:bd:8a:79:44:0e:86:7f:f8:34:1b:ac:31:4b:2a:1c: 56:ff:d8:ab:12:7a:6e:3c:2a:e1:e0:bd:18:3a:73:e4: d5:d2:c5:d8:0c:8d:94:5b:ff:dd:1f:a5:72:3f:40:eb: 25:3e:65:e2:4a:f9:2a:f5:c6:fa:98:aa:9a:cb:f3:e1: 9e:b7:56:c1:0c:60:28:74:0a:0c:8a:fb:94:c9:ba:ad: c3:8f:f5:fa:aa:e1:40:3d:ee:65:e4:e7:3c:c7:1c:a9: f9:35:23:f0:f2:b8:f2:f4:9f:55:3a:cf:dd:5e:0e:dd: 82:91:87:08:be:85:cc:f7:b6:cb:03:59:91:85:f2:92: 10:36:3f:b3:9f:7d:18:38:d3:d1:bc:f4:ed:2b:d1:78: dc:88:f7:29:ac:86:bd:7f:e3:21:e4:34:b2:c7:67:23: b5:b1:16:b3:a0:ae:c3:f9:b8:84:52:b9:9a:0e:13:1d: 3d:da:3f:94:9f:9d:64:7e:a4:95:4c:09:87:ce:8c:29: b7:71:56:88:9a:b7:4a:0d:db:a8:5d:3d:83:a0:2c:a9: 1a:f9:9f:75:6f:b8:c4:6d:40:07:2c:6b:0b:bb:e7:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:24:db:65:2d:8a:aa:99:72:e5:98:3b:be:90:6b:57: 16:9b:80:a3:c7:59:6a:19:18:fd:45:c0:5c:c5:dd:9a: d7:94:ea:71:ac:f6:8a:9e:32:9e:a4:20:dc:39:47:16: 1c:bb:30:38:4d:66:6a:89:fa:65:cf:73:58:6c:c4:12: 3a:fe:76:8e:d0:6e:13:54:66:08:88:28:65:ad:82:87: a1:22:24:f7:d9:93:41:f7:93:7d:f0:ed:74:dc:5f:44: c5:77:39:5a:37:ba:23:c0:a6:f4:db:dc:dc:79:63:4a: e8:43:b5:04:29:bf:5d:a9:cb:dd:d9:df:44:34:23:96: 2c:2b:5a:f5:5b:00:22:7b:3e:00:d0:b7:f6:4a:3e:87: e2:ad:2d:26:e3:b7:fa:27:d4:37:e4:33:3f:a0:04:16: 0a:d7:21:0d:d1:0f:1b:93:bb:91:eb:06:c0:f0:96:12: a5:44:42:02:86:d4:8d:5b:c9:75:ac:de:e8:58:d2:4c: 54:8e:84:94:d0:14:28:62:d1:25:4b:da:61:61:2b:b6: bf:0c:ca:b5:42:3c:8b:ae:88:8d:2e:b2:e4:b0:7c:9e: bb:2d:06:41:cd:0b:58:01:11:4e:ef:d2:45:5f:30:eb: 6f:29:ab:63:51:1a:58:49:a3:31:48:6d:7d:54:f5:7b Fingerprint (SHA-256): CC:10:03:D7:F3:8B:0E:4D:1F:EE:D4:C1:61:4E:11:1D:4F:6C:7F:88:9C:9D:92:6C:B5:0D:27:68:51:5A:A5:C4 Fingerprint (SHA1): B4:F8:6B:89:FC:CA:62:5F:40:5A:98:A8:16:98:EF:35:EE:5D:B0:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12736: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202091 (0x195811ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:53:58 2016 Not After : Sun Apr 25 20:53:58 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:73:e7:73:69:6a:ba:07:60:a3:14:44:ca:2a:13:ad: 28:01:72:24:88:61:40:a8:36:b8:0f:4e:78:b0:8a:87: 08:a6:00:07:c7:3f:a4:01:3c:57:55:af:e8:d1:43:84: 09:6e:7d:c8:8f:70:a2:f3:96:f5:fe:2a:0f:0f:5a:58: 9f:4e:a9:74:02:38:53:6d:a1:90:fc:e8:c5:53:e3:e0: 1d:5f:a1:5e:74:45:44:a3:49:92:77:39:e4:d6:de:f3: ce:73:92:a2:55:14:ee:5c:eb:37:15:60:8a:c6:10:bc: 32:d8:4d:20:b2:85:45:13:93:bf:0e:21:fc:ae:19:0d: 35:10:51:d1:41:74:8d:21:d3:8f:59:55:a8:70:4d:8d: 78:c0:af:e0:a3:44:ce:e0:5a:7d:9a:f7:0e:1e:02:f4: 75:39:67:89:6b:e3:be:27:85:ee:17:ac:74:a4:69:e6: 71:f4:a5:a2:4e:17:4d:d7:50:87:6c:0f:63:3c:81:59: d2:3b:4f:9e:ce:89:e4:95:13:d4:20:54:e5:a2:01:0e: 8c:af:c6:65:6c:cb:70:51:12:82:48:27:68:d9:69:8d: 87:69:40:33:30:26:22:1b:6c:ef:79:df:2b:b1:c9:73: 9b:3c:63:40:62:c9:a2:76:00:05:46:f0:4e:4d:4f:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:6d:6b:c7:c4:b6:64:b3:c2:1a:21:d2:ca:ef:40:ed: e8:b1:74:35:bc:e2:80:0c:f4:fb:89:19:b6:04:bd:08: c0:42:96:83:1e:80:29:4e:7f:cd:10:92:ef:55:1c:d5: 82:05:9c:f9:d0:50:13:9d:a6:ad:77:c1:95:50:4a:d0: 39:54:a6:97:66:82:29:7a:a0:71:dc:d0:f8:0f:99:cc: 79:d1:27:ad:85:ce:40:dc:e3:ce:42:4b:83:f9:92:ee: 35:6e:24:4d:1d:65:c4:15:76:7c:dd:a8:62:a8:b2:b6: 6f:0a:48:ff:d5:9f:69:50:13:67:8e:d6:44:87:61:f8: b5:ea:68:f6:5e:87:15:19:bc:ef:f8:aa:3a:32:19:fd: c1:e6:20:53:4c:46:53:2f:32:5a:45:56:9d:87:e7:34: 8c:d9:02:ca:e4:85:f4:c0:95:ab:1e:a0:b6:09:4e:0d: 1b:46:4d:32:55:be:82:37:53:1b:fd:fb:20:af:65:50: 0a:53:b3:07:d3:32:42:fa:b8:4d:6f:bc:b1:79:3f:9b: 47:fc:98:35:3f:2c:1c:b1:05:58:cb:d9:3f:41:4e:f1: 28:cc:e4:b7:2c:32:52:3b:f7:aa:6b:3d:95:52:42:0a: 4b:9c:29:c1:18:fb:5b:0f:e3:97:19:7c:f4:b7:f9:2f Fingerprint (SHA-256): 1A:3F:75:34:B7:F1:41:03:4E:EE:79:EA:3A:E0:93:AE:6D:5B:66:32:17:D9:83:65:23:46:96:BA:F3:CA:2B:25 Fingerprint (SHA1): 11:81:19:69:F2:C7:0E:C3:D7:00:3C:75:9C:0C:4B:E9:1A:EA:8F:56 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #12737: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202089 (0x195811a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:53:25 2016 Not After : Sun Apr 25 20:53:25 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a3:b7:32:2b:5f:40:9f:12:dc:b7:a0:ad:77:52:bf: 3d:79:94:b9:ad:83:04:42:a3:8e:89:ab:f7:e3:15:7a: 69:bd:8a:79:44:0e:86:7f:f8:34:1b:ac:31:4b:2a:1c: 56:ff:d8:ab:12:7a:6e:3c:2a:e1:e0:bd:18:3a:73:e4: d5:d2:c5:d8:0c:8d:94:5b:ff:dd:1f:a5:72:3f:40:eb: 25:3e:65:e2:4a:f9:2a:f5:c6:fa:98:aa:9a:cb:f3:e1: 9e:b7:56:c1:0c:60:28:74:0a:0c:8a:fb:94:c9:ba:ad: c3:8f:f5:fa:aa:e1:40:3d:ee:65:e4:e7:3c:c7:1c:a9: f9:35:23:f0:f2:b8:f2:f4:9f:55:3a:cf:dd:5e:0e:dd: 82:91:87:08:be:85:cc:f7:b6:cb:03:59:91:85:f2:92: 10:36:3f:b3:9f:7d:18:38:d3:d1:bc:f4:ed:2b:d1:78: dc:88:f7:29:ac:86:bd:7f:e3:21:e4:34:b2:c7:67:23: b5:b1:16:b3:a0:ae:c3:f9:b8:84:52:b9:9a:0e:13:1d: 3d:da:3f:94:9f:9d:64:7e:a4:95:4c:09:87:ce:8c:29: b7:71:56:88:9a:b7:4a:0d:db:a8:5d:3d:83:a0:2c:a9: 1a:f9:9f:75:6f:b8:c4:6d:40:07:2c:6b:0b:bb:e7:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:24:db:65:2d:8a:aa:99:72:e5:98:3b:be:90:6b:57: 16:9b:80:a3:c7:59:6a:19:18:fd:45:c0:5c:c5:dd:9a: d7:94:ea:71:ac:f6:8a:9e:32:9e:a4:20:dc:39:47:16: 1c:bb:30:38:4d:66:6a:89:fa:65:cf:73:58:6c:c4:12: 3a:fe:76:8e:d0:6e:13:54:66:08:88:28:65:ad:82:87: a1:22:24:f7:d9:93:41:f7:93:7d:f0:ed:74:dc:5f:44: c5:77:39:5a:37:ba:23:c0:a6:f4:db:dc:dc:79:63:4a: e8:43:b5:04:29:bf:5d:a9:cb:dd:d9:df:44:34:23:96: 2c:2b:5a:f5:5b:00:22:7b:3e:00:d0:b7:f6:4a:3e:87: e2:ad:2d:26:e3:b7:fa:27:d4:37:e4:33:3f:a0:04:16: 0a:d7:21:0d:d1:0f:1b:93:bb:91:eb:06:c0:f0:96:12: a5:44:42:02:86:d4:8d:5b:c9:75:ac:de:e8:58:d2:4c: 54:8e:84:94:d0:14:28:62:d1:25:4b:da:61:61:2b:b6: bf:0c:ca:b5:42:3c:8b:ae:88:8d:2e:b2:e4:b0:7c:9e: bb:2d:06:41:cd:0b:58:01:11:4e:ef:d2:45:5f:30:eb: 6f:29:ab:63:51:1a:58:49:a3:31:48:6d:7d:54:f5:7b Fingerprint (SHA-256): CC:10:03:D7:F3:8B:0E:4D:1F:EE:D4:C1:61:4E:11:1D:4F:6C:7F:88:9C:9D:92:6C:B5:0D:27:68:51:5A:A5:C4 Fingerprint (SHA1): B4:F8:6B:89:FC:CA:62:5F:40:5A:98:A8:16:98:EF:35:EE:5D:B0:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12738: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #12739: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202089 (0x195811a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:53:25 2016 Not After : Sun Apr 25 20:53:25 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a3:b7:32:2b:5f:40:9f:12:dc:b7:a0:ad:77:52:bf: 3d:79:94:b9:ad:83:04:42:a3:8e:89:ab:f7:e3:15:7a: 69:bd:8a:79:44:0e:86:7f:f8:34:1b:ac:31:4b:2a:1c: 56:ff:d8:ab:12:7a:6e:3c:2a:e1:e0:bd:18:3a:73:e4: d5:d2:c5:d8:0c:8d:94:5b:ff:dd:1f:a5:72:3f:40:eb: 25:3e:65:e2:4a:f9:2a:f5:c6:fa:98:aa:9a:cb:f3:e1: 9e:b7:56:c1:0c:60:28:74:0a:0c:8a:fb:94:c9:ba:ad: c3:8f:f5:fa:aa:e1:40:3d:ee:65:e4:e7:3c:c7:1c:a9: f9:35:23:f0:f2:b8:f2:f4:9f:55:3a:cf:dd:5e:0e:dd: 82:91:87:08:be:85:cc:f7:b6:cb:03:59:91:85:f2:92: 10:36:3f:b3:9f:7d:18:38:d3:d1:bc:f4:ed:2b:d1:78: dc:88:f7:29:ac:86:bd:7f:e3:21:e4:34:b2:c7:67:23: b5:b1:16:b3:a0:ae:c3:f9:b8:84:52:b9:9a:0e:13:1d: 3d:da:3f:94:9f:9d:64:7e:a4:95:4c:09:87:ce:8c:29: b7:71:56:88:9a:b7:4a:0d:db:a8:5d:3d:83:a0:2c:a9: 1a:f9:9f:75:6f:b8:c4:6d:40:07:2c:6b:0b:bb:e7:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:24:db:65:2d:8a:aa:99:72:e5:98:3b:be:90:6b:57: 16:9b:80:a3:c7:59:6a:19:18:fd:45:c0:5c:c5:dd:9a: d7:94:ea:71:ac:f6:8a:9e:32:9e:a4:20:dc:39:47:16: 1c:bb:30:38:4d:66:6a:89:fa:65:cf:73:58:6c:c4:12: 3a:fe:76:8e:d0:6e:13:54:66:08:88:28:65:ad:82:87: a1:22:24:f7:d9:93:41:f7:93:7d:f0:ed:74:dc:5f:44: c5:77:39:5a:37:ba:23:c0:a6:f4:db:dc:dc:79:63:4a: e8:43:b5:04:29:bf:5d:a9:cb:dd:d9:df:44:34:23:96: 2c:2b:5a:f5:5b:00:22:7b:3e:00:d0:b7:f6:4a:3e:87: e2:ad:2d:26:e3:b7:fa:27:d4:37:e4:33:3f:a0:04:16: 0a:d7:21:0d:d1:0f:1b:93:bb:91:eb:06:c0:f0:96:12: a5:44:42:02:86:d4:8d:5b:c9:75:ac:de:e8:58:d2:4c: 54:8e:84:94:d0:14:28:62:d1:25:4b:da:61:61:2b:b6: bf:0c:ca:b5:42:3c:8b:ae:88:8d:2e:b2:e4:b0:7c:9e: bb:2d:06:41:cd:0b:58:01:11:4e:ef:d2:45:5f:30:eb: 6f:29:ab:63:51:1a:58:49:a3:31:48:6d:7d:54:f5:7b Fingerprint (SHA-256): CC:10:03:D7:F3:8B:0E:4D:1F:EE:D4:C1:61:4E:11:1D:4F:6C:7F:88:9C:9D:92:6C:B5:0D:27:68:51:5A:A5:C4 Fingerprint (SHA1): B4:F8:6B:89:FC:CA:62:5F:40:5A:98:A8:16:98:EF:35:EE:5D:B0:55 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12740: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202091 (0x195811ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 20:53:58 2016 Not After : Sun Apr 25 20:53:58 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:73:e7:73:69:6a:ba:07:60:a3:14:44:ca:2a:13:ad: 28:01:72:24:88:61:40:a8:36:b8:0f:4e:78:b0:8a:87: 08:a6:00:07:c7:3f:a4:01:3c:57:55:af:e8:d1:43:84: 09:6e:7d:c8:8f:70:a2:f3:96:f5:fe:2a:0f:0f:5a:58: 9f:4e:a9:74:02:38:53:6d:a1:90:fc:e8:c5:53:e3:e0: 1d:5f:a1:5e:74:45:44:a3:49:92:77:39:e4:d6:de:f3: ce:73:92:a2:55:14:ee:5c:eb:37:15:60:8a:c6:10:bc: 32:d8:4d:20:b2:85:45:13:93:bf:0e:21:fc:ae:19:0d: 35:10:51:d1:41:74:8d:21:d3:8f:59:55:a8:70:4d:8d: 78:c0:af:e0:a3:44:ce:e0:5a:7d:9a:f7:0e:1e:02:f4: 75:39:67:89:6b:e3:be:27:85:ee:17:ac:74:a4:69:e6: 71:f4:a5:a2:4e:17:4d:d7:50:87:6c:0f:63:3c:81:59: d2:3b:4f:9e:ce:89:e4:95:13:d4:20:54:e5:a2:01:0e: 8c:af:c6:65:6c:cb:70:51:12:82:48:27:68:d9:69:8d: 87:69:40:33:30:26:22:1b:6c:ef:79:df:2b:b1:c9:73: 9b:3c:63:40:62:c9:a2:76:00:05:46:f0:4e:4d:4f:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:6d:6b:c7:c4:b6:64:b3:c2:1a:21:d2:ca:ef:40:ed: e8:b1:74:35:bc:e2:80:0c:f4:fb:89:19:b6:04:bd:08: c0:42:96:83:1e:80:29:4e:7f:cd:10:92:ef:55:1c:d5: 82:05:9c:f9:d0:50:13:9d:a6:ad:77:c1:95:50:4a:d0: 39:54:a6:97:66:82:29:7a:a0:71:dc:d0:f8:0f:99:cc: 79:d1:27:ad:85:ce:40:dc:e3:ce:42:4b:83:f9:92:ee: 35:6e:24:4d:1d:65:c4:15:76:7c:dd:a8:62:a8:b2:b6: 6f:0a:48:ff:d5:9f:69:50:13:67:8e:d6:44:87:61:f8: b5:ea:68:f6:5e:87:15:19:bc:ef:f8:aa:3a:32:19:fd: c1:e6:20:53:4c:46:53:2f:32:5a:45:56:9d:87:e7:34: 8c:d9:02:ca:e4:85:f4:c0:95:ab:1e:a0:b6:09:4e:0d: 1b:46:4d:32:55:be:82:37:53:1b:fd:fb:20:af:65:50: 0a:53:b3:07:d3:32:42:fa:b8:4d:6f:bc:b1:79:3f:9b: 47:fc:98:35:3f:2c:1c:b1:05:58:cb:d9:3f:41:4e:f1: 28:cc:e4:b7:2c:32:52:3b:f7:aa:6b:3d:95:52:42:0a: 4b:9c:29:c1:18:fb:5b:0f:e3:97:19:7c:f4:b7:f9:2f Fingerprint (SHA-256): 1A:3F:75:34:B7:F1:41:03:4E:EE:79:EA:3A:E0:93:AE:6D:5B:66:32:17:D9:83:65:23:46:96:BA:F3:CA:2B:25 Fingerprint (SHA1): 11:81:19:69:F2:C7:0E:C3:D7:00:3C:75:9C:0C:4B:E9:1A:EA:8F:56 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #12741: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #12742: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #12743: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #12744: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202089 (0x195811a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:53:25 2016 Not After : Sun Apr 25 20:53:25 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a3:b7:32:2b:5f:40:9f:12:dc:b7:a0:ad:77:52:bf: 3d:79:94:b9:ad:83:04:42:a3:8e:89:ab:f7:e3:15:7a: 69:bd:8a:79:44:0e:86:7f:f8:34:1b:ac:31:4b:2a:1c: 56:ff:d8:ab:12:7a:6e:3c:2a:e1:e0:bd:18:3a:73:e4: d5:d2:c5:d8:0c:8d:94:5b:ff:dd:1f:a5:72:3f:40:eb: 25:3e:65:e2:4a:f9:2a:f5:c6:fa:98:aa:9a:cb:f3:e1: 9e:b7:56:c1:0c:60:28:74:0a:0c:8a:fb:94:c9:ba:ad: c3:8f:f5:fa:aa:e1:40:3d:ee:65:e4:e7:3c:c7:1c:a9: f9:35:23:f0:f2:b8:f2:f4:9f:55:3a:cf:dd:5e:0e:dd: 82:91:87:08:be:85:cc:f7:b6:cb:03:59:91:85:f2:92: 10:36:3f:b3:9f:7d:18:38:d3:d1:bc:f4:ed:2b:d1:78: dc:88:f7:29:ac:86:bd:7f:e3:21:e4:34:b2:c7:67:23: b5:b1:16:b3:a0:ae:c3:f9:b8:84:52:b9:9a:0e:13:1d: 3d:da:3f:94:9f:9d:64:7e:a4:95:4c:09:87:ce:8c:29: b7:71:56:88:9a:b7:4a:0d:db:a8:5d:3d:83:a0:2c:a9: 1a:f9:9f:75:6f:b8:c4:6d:40:07:2c:6b:0b:bb:e7:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:24:db:65:2d:8a:aa:99:72:e5:98:3b:be:90:6b:57: 16:9b:80:a3:c7:59:6a:19:18:fd:45:c0:5c:c5:dd:9a: d7:94:ea:71:ac:f6:8a:9e:32:9e:a4:20:dc:39:47:16: 1c:bb:30:38:4d:66:6a:89:fa:65:cf:73:58:6c:c4:12: 3a:fe:76:8e:d0:6e:13:54:66:08:88:28:65:ad:82:87: a1:22:24:f7:d9:93:41:f7:93:7d:f0:ed:74:dc:5f:44: c5:77:39:5a:37:ba:23:c0:a6:f4:db:dc:dc:79:63:4a: e8:43:b5:04:29:bf:5d:a9:cb:dd:d9:df:44:34:23:96: 2c:2b:5a:f5:5b:00:22:7b:3e:00:d0:b7:f6:4a:3e:87: e2:ad:2d:26:e3:b7:fa:27:d4:37:e4:33:3f:a0:04:16: 0a:d7:21:0d:d1:0f:1b:93:bb:91:eb:06:c0:f0:96:12: a5:44:42:02:86:d4:8d:5b:c9:75:ac:de:e8:58:d2:4c: 54:8e:84:94:d0:14:28:62:d1:25:4b:da:61:61:2b:b6: bf:0c:ca:b5:42:3c:8b:ae:88:8d:2e:b2:e4:b0:7c:9e: bb:2d:06:41:cd:0b:58:01:11:4e:ef:d2:45:5f:30:eb: 6f:29:ab:63:51:1a:58:49:a3:31:48:6d:7d:54:f5:7b Fingerprint (SHA-256): CC:10:03:D7:F3:8B:0E:4D:1F:EE:D4:C1:61:4E:11:1D:4F:6C:7F:88:9C:9D:92:6C:B5:0D:27:68:51:5A:A5:C4 Fingerprint (SHA1): B4:F8:6B:89:FC:CA:62:5F:40:5A:98:A8:16:98:EF:35:EE:5D:B0:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12745: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202093 (0x195811ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 20:54:18 2016 Not After : Sun Apr 25 20:54:18 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:8f:14:08:3a:cc:0d:aa:56:3c:9c:06:2b:99:31:a2: f1:29:97:47:e7:b9:f0:da:35:ce:a2:9e:bf:95:17:f5: 49:21:38:0a:97:9d:90:56:4d:25:42:49:77:ef:6b:ee: 21:ff:e5:bd:75:04:05:2d:64:05:38:95:46:8a:10:0f: 44:86:31:a3:96:4d:3d:47:81:e7:ba:29:22:86:58:0d: 6a:2e:03:08:e2:8c:a2:7b:2e:3a:07:a9:94:a1:db:e5: a8:94:3e:c6:1a:9d:b3:bb:79:51:f5:e2:8c:57:7f:38: d1:0b:e4:95:89:f3:07:ed:f0:06:d0:9f:52:47:4c:bd: c1:a0:ba:c1:ec:2f:35:75:a0:c9:c7:7f:91:60:2d:66: 10:a6:65:81:3c:65:e3:a3:6d:7f:e1:fc:b8:dc:f3:3c: 94:46:44:91:44:3b:12:35:4e:b2:de:e9:f3:af:a5:90: f7:21:79:94:5f:14:a1:d8:12:e9:14:14:ab:51:5a:7c: 9f:fb:16:28:76:05:0c:0f:ba:90:17:56:19:ce:c2:5a: 13:92:07:07:3f:e7:05:8b:cd:37:5f:4d:fb:2c:4f:74: 17:54:aa:8d:54:f5:69:09:aa:5e:64:11:eb:f8:b3:1f: 26:75:64:6a:58:fc:5a:ff:4b:35:75:df:bb:8e:2c:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:02:82:e5:14:f1:10:eb:a2:3a:88:29:65:24:24:29: d9:4c:25:fb:2d:2c:38:b2:f2:d5:b0:dc:d1:90:b0:0d: 81:8e:66:10:25:a9:ee:81:ab:31:2c:0d:35:67:56:7c: 55:a1:da:d8:90:00:6b:91:15:95:e4:1c:e0:eb:3d:ce: 13:3f:2d:40:ab:f5:fc:ca:c1:f1:05:5a:8f:36:15:68: 29:31:0e:72:01:ac:db:83:ea:2d:be:c2:86:08:81:05: ae:d9:6d:10:56:47:a7:d0:4a:52:b1:8a:60:3c:0c:d9: ef:cf:7d:6e:e7:b7:79:63:0f:d4:61:5a:b7:94:04:29: 8a:dd:95:2c:ca:fb:e0:e8:a8:e5:10:9b:5b:27:ed:c7: 67:0b:7c:20:31:e8:bf:d4:8f:bc:da:83:7e:fc:82:48: 0b:1c:43:62:6c:12:9b:91:4b:d1:25:ca:62:e6:60:25: 97:e0:a2:59:ce:7a:02:2c:df:4c:7b:54:69:84:39:08: 6e:23:7c:7c:3e:2f:94:4d:cb:85:50:a3:07:60:a9:22: 07:8f:ad:a8:ca:be:34:18:6c:c3:52:7c:75:c8:55:82: 1c:60:ef:2b:3b:71:d5:f1:32:35:23:af:d3:e5:4d:99: 18:1f:42:77:86:68:4b:4c:86:34:8a:3c:ca:e9:af:e5 Fingerprint (SHA-256): 3B:38:33:DE:A2:87:9A:5F:C3:6D:12:AB:B9:6A:AE:F7:A1:B5:A9:F5:A7:90:D4:58:8F:81:1D:4A:49:B2:BF:B6 Fingerprint (SHA1): 04:97:FC:06:2B:23:D0:3D:76:8B:23:F7:27:FD:2D:2E:57:6F:06:11 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #12746: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202089 (0x195811a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 20:53:25 2016 Not After : Sun Apr 25 20:53:25 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a3:b7:32:2b:5f:40:9f:12:dc:b7:a0:ad:77:52:bf: 3d:79:94:b9:ad:83:04:42:a3:8e:89:ab:f7:e3:15:7a: 69:bd:8a:79:44:0e:86:7f:f8:34:1b:ac:31:4b:2a:1c: 56:ff:d8:ab:12:7a:6e:3c:2a:e1:e0:bd:18:3a:73:e4: d5:d2:c5:d8:0c:8d:94:5b:ff:dd:1f:a5:72:3f:40:eb: 25:3e:65:e2:4a:f9:2a:f5:c6:fa:98:aa:9a:cb:f3:e1: 9e:b7:56:c1:0c:60:28:74:0a:0c:8a:fb:94:c9:ba:ad: c3:8f:f5:fa:aa:e1:40:3d:ee:65:e4:e7:3c:c7:1c:a9: f9:35:23:f0:f2:b8:f2:f4:9f:55:3a:cf:dd:5e:0e:dd: 82:91:87:08:be:85:cc:f7:b6:cb:03:59:91:85:f2:92: 10:36:3f:b3:9f:7d:18:38:d3:d1:bc:f4:ed:2b:d1:78: dc:88:f7:29:ac:86:bd:7f:e3:21:e4:34:b2:c7:67:23: b5:b1:16:b3:a0:ae:c3:f9:b8:84:52:b9:9a:0e:13:1d: 3d:da:3f:94:9f:9d:64:7e:a4:95:4c:09:87:ce:8c:29: b7:71:56:88:9a:b7:4a:0d:db:a8:5d:3d:83:a0:2c:a9: 1a:f9:9f:75:6f:b8:c4:6d:40:07:2c:6b:0b:bb:e7:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:24:db:65:2d:8a:aa:99:72:e5:98:3b:be:90:6b:57: 16:9b:80:a3:c7:59:6a:19:18:fd:45:c0:5c:c5:dd:9a: d7:94:ea:71:ac:f6:8a:9e:32:9e:a4:20:dc:39:47:16: 1c:bb:30:38:4d:66:6a:89:fa:65:cf:73:58:6c:c4:12: 3a:fe:76:8e:d0:6e:13:54:66:08:88:28:65:ad:82:87: a1:22:24:f7:d9:93:41:f7:93:7d:f0:ed:74:dc:5f:44: c5:77:39:5a:37:ba:23:c0:a6:f4:db:dc:dc:79:63:4a: e8:43:b5:04:29:bf:5d:a9:cb:dd:d9:df:44:34:23:96: 2c:2b:5a:f5:5b:00:22:7b:3e:00:d0:b7:f6:4a:3e:87: e2:ad:2d:26:e3:b7:fa:27:d4:37:e4:33:3f:a0:04:16: 0a:d7:21:0d:d1:0f:1b:93:bb:91:eb:06:c0:f0:96:12: a5:44:42:02:86:d4:8d:5b:c9:75:ac:de:e8:58:d2:4c: 54:8e:84:94:d0:14:28:62:d1:25:4b:da:61:61:2b:b6: bf:0c:ca:b5:42:3c:8b:ae:88:8d:2e:b2:e4:b0:7c:9e: bb:2d:06:41:cd:0b:58:01:11:4e:ef:d2:45:5f:30:eb: 6f:29:ab:63:51:1a:58:49:a3:31:48:6d:7d:54:f5:7b Fingerprint (SHA-256): CC:10:03:D7:F3:8B:0E:4D:1F:EE:D4:C1:61:4E:11:1D:4F:6C:7F:88:9C:9D:92:6C:B5:0D:27:68:51:5A:A5:C4 Fingerprint (SHA1): B4:F8:6B:89:FC:CA:62:5F:40:5A:98:A8:16:98:EF:35:EE:5D:B0:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12747: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #12748: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #12749: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #12750: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #12751: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #12752: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202094 (0x195811ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 20:54:30 2016 Not After : Sun Apr 25 20:54:30 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:f5:79:c9:ef:08:bb:c6:3a:0f:c0:81:ac:56:7d:52: bd:fd:fb:b1:a3:3f:2b:b0:1d:85:94:87:d4:1b:8d:05: 17:5c:1f:5b:30:10:cb:d6:52:df:2e:23:ef:0e:8b:f8: 6c:77:14:db:cb:c9:c2:a2:91:66:0d:1e:c3:1c:12:10: 5d:4f:ac:3a:2c:91:33:d0:eb:ba:f7:85:b5:59:8a:42: 66:2f:02:7e:ae:52:32:e0:fc:a1:e6:4c:7c:df:8c:95: 12:1a:79:7d:5f:18:3a:50:88:51:1e:e0:71:b8:0f:04: cf:75:69:dd:b8:e7:c2:f2:cd:0b:4c:db:5d:ae:11:de: b2:c7:9a:bf:3b:ab:bc:93:6b:9e:5c:44:7c:be:da:69: 37:8d:ab:96:5a:2a:b6:e9:62:ae:2a:e0:c0:76:c7:d7: 53:be:33:83:b9:b5:bc:4c:da:2b:69:d0:ef:25:ef:38: e1:0d:54:26:6f:46:31:83:ac:72:cd:48:b1:c4:2e:91: 36:85:6e:a0:92:b2:bd:5a:25:ab:10:73:61:db:73:cb: 4b:9c:aa:e5:ae:e1:29:93:1e:6c:00:86:66:31:1d:32: 72:02:fb:3b:64:51:2b:a9:bb:b1:49:bc:50:f2:39:f5: 11:83:1a:af:b7:ed:2c:0e:96:0a:d9:97:3c:a9:cb:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:c3:24:83:12:3a:f9:10:27:82:bd:19:ff:5c:9f:76: 8a:42:ea:16:ec:72:65:5a:8a:8d:88:e1:01:ea:fb:ca: cd:c6:89:5d:60:6e:ab:4e:15:dd:ca:d9:8d:9b:1a:73: 2a:39:a5:88:bf:51:0c:24:f1:0c:7b:63:5d:0e:00:de: b1:82:9c:db:a7:1f:a3:75:ba:12:94:24:26:c3:5c:d3: 30:09:f9:6b:a8:2d:b9:5a:c4:2f:0b:a9:f4:47:ca:4b: eb:15:06:7f:0f:0f:e3:31:a6:65:30:5a:ad:1f:4f:41: ca:99:79:0c:49:b8:84:d0:1b:cf:08:ed:2e:09:86:11: ac:cb:cd:2e:10:a8:f0:e1:45:5b:da:15:de:09:a1:e9: 53:f9:fa:ed:0b:10:5b:cb:df:3c:2d:d5:ac:c0:6b:f2: 51:62:ed:92:a3:09:07:c1:2b:8d:18:e7:30:0b:a6:ad: 53:20:f4:f6:b5:70:ac:0d:7c:59:6d:e8:91:54:2b:bd: af:5b:40:1b:85:6c:34:5f:2f:df:ca:b2:2e:81:42:c6: 21:32:89:04:94:db:8b:0c:01:83:83:b7:2b:dd:08:19: 9e:84:b5:39:7f:81:af:f8:cd:43:ec:76:19:24:f4:0b: d8:37:26:87:5a:61:a8:22:ce:0a:03:fa:ec:c2:db:b8 Fingerprint (SHA-256): 1A:2D:94:27:6C:99:34:AE:1E:38:2D:7C:A6:59:06:F3:2F:D7:76:F4:9E:56:B5:68:97:0B:E9:9D:48:9D:6C:BC Fingerprint (SHA1): D5:F0:2E:2C:4E:65:8A:1F:0C:3D:CE:96:10:50:4F:46:86:F0:68:6C Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #12753: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #12754: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #12755: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #12756: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #12757: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12758: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12759: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #12760: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12761: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12762: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #12763: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #12764: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #12765: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12766: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12767: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #12768: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12769: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12770: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12771: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #12772: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12773: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #12774: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #12775: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #12776: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 16909 at Mon Apr 25 20:55:25 UTC 2016 kill -USR1 16909 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 16909 killed at Mon Apr 25 20:55:25 UTC 2016 httpserv starting at Mon Apr 25 20:55:25 UTC 2016 httpserv -D -p 9719 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.28098 & trying to connect to httpserv at Mon Apr 25 20:55:25 UTC 2016 tstclnt -p 9719 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9719 (address=::1) kill -0 456 >/dev/null 2>/dev/null httpserv with PID 456 found at Mon Apr 25 20:55:26 UTC 2016 httpserv with PID 456 started at Mon Apr 25 20:55:26 UTC 2016 chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #12777: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202096 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12778: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #12779: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #12780: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202097 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12781: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #12782: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #12783: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12784: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425202098 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12785: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12786: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425202099 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12787: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12788: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #12789: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #12790: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12791: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 425202100 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12792: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12793: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12794: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #12795: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #12796: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202097 (0x195811b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:55:56 2016 Not After : Sun Apr 25 20:55:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:07:45:e3:e4:95:8c:6d:98:96:09:40:a9:d5:73:65: b9:fa:d2:00:8e:4a:1b:65:8e:28:cc:0d:4a:92:7e:4a: b2:8c:e6:81:ea:c4:2b:14:4d:48:38:1c:31:26:11:ca: fd:b2:f8:8f:c2:8f:e0:81:86:70:56:2c:3d:f3:88:ba: df:74:47:99:58:29:0c:2f:0a:4d:74:0d:b4:ac:af:f5: 8f:ac:b9:10:b3:ff:ea:43:86:81:0e:df:c4:47:b8:69: 62:fe:cc:81:97:da:d7:eb:ca:9d:73:3e:a4:ce:f7:54: c3:c5:d8:f3:d3:a7:8c:3e:55:90:fa:24:01:b4:84:f0: 23:d1:c3:ea:cd:c0:de:5b:93:88:92:6f:b4:c6:66:3f: ae:a1:97:b5:76:b4:7d:05:23:4f:a6:a3:1c:62:a5:66: a2:51:db:0b:f5:ec:81:ee:7b:d5:b0:13:95:3c:30:04: 58:f1:47:ea:39:6d:ef:43:90:28:6e:46:e2:0c:36:2c: c7:13:78:15:01:40:17:42:bf:b0:23:10:33:bc:ef:63: 00:89:01:6a:bf:32:a4:59:e8:1c:b6:f1:84:9d:c9:bb: 33:49:2a:1e:eb:f0:75:ee:bf:b7:08:5c:8e:a5:51:ca: 5f:6d:cd:dd:bb:38:7d:cf:2d:d2:92:07:72:d6:a0:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:19:6b:f4:10:5c:1e:aa:d3:f3:52:d0:cc:2f:51:e6: 1d:84:a7:62:fa:0a:d8:70:65:1c:0d:0a:91:99:10:ea: 6c:28:a4:ad:e9:db:df:fd:db:1b:fd:76:1b:e8:d4:28: a0:46:fd:5a:c5:09:7a:0d:03:1c:af:3c:2b:2b:e1:2c: c7:b7:70:72:02:28:ce:7b:79:8d:93:d8:14:00:2c:64: 98:95:bc:8e:b3:ab:89:93:f9:9a:0e:ac:f1:a6:14:56: 2b:49:68:8d:cb:51:87:2d:a6:ee:43:ef:38:a2:37:41: ff:e4:a8:ed:5f:c4:34:29:26:11:0b:ef:37:fd:f9:90: 09:4f:80:a6:58:2c:10:36:69:66:82:f2:ef:d3:62:40: 42:94:06:cc:d4:91:9b:5d:e8:7e:fc:ce:36:d6:f2:28: 61:c7:10:40:da:10:a1:de:a9:fe:92:94:89:38:2e:78: c6:41:a0:7a:44:10:c8:c8:6b:75:aa:61:20:3d:2c:60: d2:58:60:e7:7f:ca:c7:7c:e1:56:94:b9:dd:4d:6e:fd: f4:c6:88:80:3c:6d:73:84:ec:63:75:e6:d0:2b:3d:6d: be:81:f5:ae:ed:92:6e:6e:b4:0d:2a:cd:a8:3c:29:de: 3e:29:50:ee:6e:0a:d2:9a:41:8d:8a:67:7e:93:50:10 Fingerprint (SHA-256): 7C:D6:23:2D:90:D1:45:57:FB:5F:BB:BC:70:CB:39:F9:72:9F:50:50:81:79:93:5C:08:D7:C3:06:50:1B:BD:E5 Fingerprint (SHA1): 12:F5:05:4E:20:D9:05:12:0B:B4:78:36:82:AF:42:A4:2E:BD:56:28 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12797: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202096 (0x195811b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:55:47 2016 Not After : Sun Apr 25 20:55:47 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:c7:83:76:35:cb:4d:f2:24:c9:70:80:4b:c1:d0:47: 68:a0:f5:44:78:e9:f3:69:e4:a1:6e:17:ab:47:4d:e1: ae:d1:31:fe:fd:a0:7e:14:4a:29:85:20:46:02:95:ca: c9:71:c7:60:57:89:82:33:fe:05:18:a3:79:21:b1:b3: 36:72:67:85:07:90:1b:47:3f:b2:f1:4b:1f:03:d9:74: a0:db:30:eb:5c:79:70:11:d5:e9:bb:bb:6a:4f:73:f9: 3a:05:47:93:b9:95:9f:99:91:11:e4:dd:bc:e6:e6:f8: fb:d6:7d:82:89:d1:10:66:c7:7c:96:ee:c3:77:29:c1: df:b4:93:01:2f:11:f2:81:41:5e:4d:90:61:f7:d4:27: 98:f6:2d:b9:fa:49:71:a6:6d:0e:8c:0f:58:a0:1c:af: d8:e6:e7:35:21:89:ae:cd:5e:3a:a1:16:5b:6f:47:a5: a9:2b:aa:40:84:d8:fe:aa:14:a0:0d:e6:8f:0b:a3:fc: 9f:0a:b6:66:31:0f:84:02:8d:f7:86:6c:93:e3:7b:16: 5a:17:f3:8f:e1:66:0c:cc:72:fe:5b:2c:3a:c6:1a:82: 09:c1:e8:91:c4:c7:4d:d8:92:95:21:45:a8:38:90:7b: b3:f9:9c:11:48:85:43:26:b0:5f:d1:5a:fa:65:b4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:04:9d:c7:60:12:c4:8f:52:20:ef:73:f9:22:1f:2c: 32:6f:6e:3f:98:38:f9:5a:8f:1e:eb:d7:04:fc:db:d3: 5d:04:2e:d9:29:6e:ae:81:cd:07:81:30:95:7b:e5:c3: 74:8c:dc:76:92:cd:23:6a:ed:b3:b3:1e:f2:61:81:9c: ff:be:58:35:4e:c0:2e:b0:1c:ca:19:45:05:25:db:b9: f5:a7:e0:98:1a:02:f2:b0:df:d7:2f:6f:27:a8:b0:76: 85:df:27:f6:66:99:99:1d:48:92:02:03:c0:4b:bb:e5: 04:a8:97:fd:d6:de:12:cb:72:63:56:92:12:e7:46:02: 7b:4b:f0:1f:52:a3:93:9f:e8:df:41:ce:a7:77:c5:21: 58:03:f5:f5:98:ab:45:20:89:e8:50:71:05:5f:e4:07: 40:3b:59:34:e5:c6:8c:7a:3e:ad:3f:65:13:66:f2:cf: 59:dc:30:b2:44:dc:17:1f:86:5e:19:2e:1d:01:21:d4: 7a:b5:9a:cb:fd:37:b0:32:e4:81:65:72:3c:c4:2d:b7: 5d:11:3a:59:2e:f5:71:19:0c:7d:f9:46:d9:b5:31:ea: 90:d3:5d:20:b2:dd:de:0c:71:09:5c:f5:69:13:31:97: 88:c1:14:96:5e:c6:45:81:21:44:a9:61:d9:64:1e:72 Fingerprint (SHA-256): DE:09:AA:93:47:E4:A3:B8:68:7D:4A:DB:96:7A:3A:47:03:1C:27:D2:5B:B2:29:6C:AB:13:C7:B7:8A:3B:4E:49 Fingerprint (SHA1): 76:10:60:AA:6F:A0:57:23:0A:43:84:2C:E9:46:53:06:C8:87:7B:D7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12798: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #12799: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #12800: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #12801: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202096 (0x195811b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:55:47 2016 Not After : Sun Apr 25 20:55:47 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:c7:83:76:35:cb:4d:f2:24:c9:70:80:4b:c1:d0:47: 68:a0:f5:44:78:e9:f3:69:e4:a1:6e:17:ab:47:4d:e1: ae:d1:31:fe:fd:a0:7e:14:4a:29:85:20:46:02:95:ca: c9:71:c7:60:57:89:82:33:fe:05:18:a3:79:21:b1:b3: 36:72:67:85:07:90:1b:47:3f:b2:f1:4b:1f:03:d9:74: a0:db:30:eb:5c:79:70:11:d5:e9:bb:bb:6a:4f:73:f9: 3a:05:47:93:b9:95:9f:99:91:11:e4:dd:bc:e6:e6:f8: fb:d6:7d:82:89:d1:10:66:c7:7c:96:ee:c3:77:29:c1: df:b4:93:01:2f:11:f2:81:41:5e:4d:90:61:f7:d4:27: 98:f6:2d:b9:fa:49:71:a6:6d:0e:8c:0f:58:a0:1c:af: d8:e6:e7:35:21:89:ae:cd:5e:3a:a1:16:5b:6f:47:a5: a9:2b:aa:40:84:d8:fe:aa:14:a0:0d:e6:8f:0b:a3:fc: 9f:0a:b6:66:31:0f:84:02:8d:f7:86:6c:93:e3:7b:16: 5a:17:f3:8f:e1:66:0c:cc:72:fe:5b:2c:3a:c6:1a:82: 09:c1:e8:91:c4:c7:4d:d8:92:95:21:45:a8:38:90:7b: b3:f9:9c:11:48:85:43:26:b0:5f:d1:5a:fa:65:b4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:04:9d:c7:60:12:c4:8f:52:20:ef:73:f9:22:1f:2c: 32:6f:6e:3f:98:38:f9:5a:8f:1e:eb:d7:04:fc:db:d3: 5d:04:2e:d9:29:6e:ae:81:cd:07:81:30:95:7b:e5:c3: 74:8c:dc:76:92:cd:23:6a:ed:b3:b3:1e:f2:61:81:9c: ff:be:58:35:4e:c0:2e:b0:1c:ca:19:45:05:25:db:b9: f5:a7:e0:98:1a:02:f2:b0:df:d7:2f:6f:27:a8:b0:76: 85:df:27:f6:66:99:99:1d:48:92:02:03:c0:4b:bb:e5: 04:a8:97:fd:d6:de:12:cb:72:63:56:92:12:e7:46:02: 7b:4b:f0:1f:52:a3:93:9f:e8:df:41:ce:a7:77:c5:21: 58:03:f5:f5:98:ab:45:20:89:e8:50:71:05:5f:e4:07: 40:3b:59:34:e5:c6:8c:7a:3e:ad:3f:65:13:66:f2:cf: 59:dc:30:b2:44:dc:17:1f:86:5e:19:2e:1d:01:21:d4: 7a:b5:9a:cb:fd:37:b0:32:e4:81:65:72:3c:c4:2d:b7: 5d:11:3a:59:2e:f5:71:19:0c:7d:f9:46:d9:b5:31:ea: 90:d3:5d:20:b2:dd:de:0c:71:09:5c:f5:69:13:31:97: 88:c1:14:96:5e:c6:45:81:21:44:a9:61:d9:64:1e:72 Fingerprint (SHA-256): DE:09:AA:93:47:E4:A3:B8:68:7D:4A:DB:96:7A:3A:47:03:1C:27:D2:5B:B2:29:6C:AB:13:C7:B7:8A:3B:4E:49 Fingerprint (SHA1): 76:10:60:AA:6F:A0:57:23:0A:43:84:2C:E9:46:53:06:C8:87:7B:D7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12802: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202097 (0x195811b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:55:56 2016 Not After : Sun Apr 25 20:55:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:07:45:e3:e4:95:8c:6d:98:96:09:40:a9:d5:73:65: b9:fa:d2:00:8e:4a:1b:65:8e:28:cc:0d:4a:92:7e:4a: b2:8c:e6:81:ea:c4:2b:14:4d:48:38:1c:31:26:11:ca: fd:b2:f8:8f:c2:8f:e0:81:86:70:56:2c:3d:f3:88:ba: df:74:47:99:58:29:0c:2f:0a:4d:74:0d:b4:ac:af:f5: 8f:ac:b9:10:b3:ff:ea:43:86:81:0e:df:c4:47:b8:69: 62:fe:cc:81:97:da:d7:eb:ca:9d:73:3e:a4:ce:f7:54: c3:c5:d8:f3:d3:a7:8c:3e:55:90:fa:24:01:b4:84:f0: 23:d1:c3:ea:cd:c0:de:5b:93:88:92:6f:b4:c6:66:3f: ae:a1:97:b5:76:b4:7d:05:23:4f:a6:a3:1c:62:a5:66: a2:51:db:0b:f5:ec:81:ee:7b:d5:b0:13:95:3c:30:04: 58:f1:47:ea:39:6d:ef:43:90:28:6e:46:e2:0c:36:2c: c7:13:78:15:01:40:17:42:bf:b0:23:10:33:bc:ef:63: 00:89:01:6a:bf:32:a4:59:e8:1c:b6:f1:84:9d:c9:bb: 33:49:2a:1e:eb:f0:75:ee:bf:b7:08:5c:8e:a5:51:ca: 5f:6d:cd:dd:bb:38:7d:cf:2d:d2:92:07:72:d6:a0:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:19:6b:f4:10:5c:1e:aa:d3:f3:52:d0:cc:2f:51:e6: 1d:84:a7:62:fa:0a:d8:70:65:1c:0d:0a:91:99:10:ea: 6c:28:a4:ad:e9:db:df:fd:db:1b:fd:76:1b:e8:d4:28: a0:46:fd:5a:c5:09:7a:0d:03:1c:af:3c:2b:2b:e1:2c: c7:b7:70:72:02:28:ce:7b:79:8d:93:d8:14:00:2c:64: 98:95:bc:8e:b3:ab:89:93:f9:9a:0e:ac:f1:a6:14:56: 2b:49:68:8d:cb:51:87:2d:a6:ee:43:ef:38:a2:37:41: ff:e4:a8:ed:5f:c4:34:29:26:11:0b:ef:37:fd:f9:90: 09:4f:80:a6:58:2c:10:36:69:66:82:f2:ef:d3:62:40: 42:94:06:cc:d4:91:9b:5d:e8:7e:fc:ce:36:d6:f2:28: 61:c7:10:40:da:10:a1:de:a9:fe:92:94:89:38:2e:78: c6:41:a0:7a:44:10:c8:c8:6b:75:aa:61:20:3d:2c:60: d2:58:60:e7:7f:ca:c7:7c:e1:56:94:b9:dd:4d:6e:fd: f4:c6:88:80:3c:6d:73:84:ec:63:75:e6:d0:2b:3d:6d: be:81:f5:ae:ed:92:6e:6e:b4:0d:2a:cd:a8:3c:29:de: 3e:29:50:ee:6e:0a:d2:9a:41:8d:8a:67:7e:93:50:10 Fingerprint (SHA-256): 7C:D6:23:2D:90:D1:45:57:FB:5F:BB:BC:70:CB:39:F9:72:9F:50:50:81:79:93:5C:08:D7:C3:06:50:1B:BD:E5 Fingerprint (SHA1): 12:F5:05:4E:20:D9:05:12:0B:B4:78:36:82:AF:42:A4:2E:BD:56:28 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12803: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #12804: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #12805: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #12806: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #12807: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #12808: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202097 (0x195811b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:55:56 2016 Not After : Sun Apr 25 20:55:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:07:45:e3:e4:95:8c:6d:98:96:09:40:a9:d5:73:65: b9:fa:d2:00:8e:4a:1b:65:8e:28:cc:0d:4a:92:7e:4a: b2:8c:e6:81:ea:c4:2b:14:4d:48:38:1c:31:26:11:ca: fd:b2:f8:8f:c2:8f:e0:81:86:70:56:2c:3d:f3:88:ba: df:74:47:99:58:29:0c:2f:0a:4d:74:0d:b4:ac:af:f5: 8f:ac:b9:10:b3:ff:ea:43:86:81:0e:df:c4:47:b8:69: 62:fe:cc:81:97:da:d7:eb:ca:9d:73:3e:a4:ce:f7:54: c3:c5:d8:f3:d3:a7:8c:3e:55:90:fa:24:01:b4:84:f0: 23:d1:c3:ea:cd:c0:de:5b:93:88:92:6f:b4:c6:66:3f: ae:a1:97:b5:76:b4:7d:05:23:4f:a6:a3:1c:62:a5:66: a2:51:db:0b:f5:ec:81:ee:7b:d5:b0:13:95:3c:30:04: 58:f1:47:ea:39:6d:ef:43:90:28:6e:46:e2:0c:36:2c: c7:13:78:15:01:40:17:42:bf:b0:23:10:33:bc:ef:63: 00:89:01:6a:bf:32:a4:59:e8:1c:b6:f1:84:9d:c9:bb: 33:49:2a:1e:eb:f0:75:ee:bf:b7:08:5c:8e:a5:51:ca: 5f:6d:cd:dd:bb:38:7d:cf:2d:d2:92:07:72:d6:a0:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:19:6b:f4:10:5c:1e:aa:d3:f3:52:d0:cc:2f:51:e6: 1d:84:a7:62:fa:0a:d8:70:65:1c:0d:0a:91:99:10:ea: 6c:28:a4:ad:e9:db:df:fd:db:1b:fd:76:1b:e8:d4:28: a0:46:fd:5a:c5:09:7a:0d:03:1c:af:3c:2b:2b:e1:2c: c7:b7:70:72:02:28:ce:7b:79:8d:93:d8:14:00:2c:64: 98:95:bc:8e:b3:ab:89:93:f9:9a:0e:ac:f1:a6:14:56: 2b:49:68:8d:cb:51:87:2d:a6:ee:43:ef:38:a2:37:41: ff:e4:a8:ed:5f:c4:34:29:26:11:0b:ef:37:fd:f9:90: 09:4f:80:a6:58:2c:10:36:69:66:82:f2:ef:d3:62:40: 42:94:06:cc:d4:91:9b:5d:e8:7e:fc:ce:36:d6:f2:28: 61:c7:10:40:da:10:a1:de:a9:fe:92:94:89:38:2e:78: c6:41:a0:7a:44:10:c8:c8:6b:75:aa:61:20:3d:2c:60: d2:58:60:e7:7f:ca:c7:7c:e1:56:94:b9:dd:4d:6e:fd: f4:c6:88:80:3c:6d:73:84:ec:63:75:e6:d0:2b:3d:6d: be:81:f5:ae:ed:92:6e:6e:b4:0d:2a:cd:a8:3c:29:de: 3e:29:50:ee:6e:0a:d2:9a:41:8d:8a:67:7e:93:50:10 Fingerprint (SHA-256): 7C:D6:23:2D:90:D1:45:57:FB:5F:BB:BC:70:CB:39:F9:72:9F:50:50:81:79:93:5C:08:D7:C3:06:50:1B:BD:E5 Fingerprint (SHA1): 12:F5:05:4E:20:D9:05:12:0B:B4:78:36:82:AF:42:A4:2E:BD:56:28 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12809: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202097 (0x195811b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 20:55:56 2016 Not After : Sun Apr 25 20:55:56 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:07:45:e3:e4:95:8c:6d:98:96:09:40:a9:d5:73:65: b9:fa:d2:00:8e:4a:1b:65:8e:28:cc:0d:4a:92:7e:4a: b2:8c:e6:81:ea:c4:2b:14:4d:48:38:1c:31:26:11:ca: fd:b2:f8:8f:c2:8f:e0:81:86:70:56:2c:3d:f3:88:ba: df:74:47:99:58:29:0c:2f:0a:4d:74:0d:b4:ac:af:f5: 8f:ac:b9:10:b3:ff:ea:43:86:81:0e:df:c4:47:b8:69: 62:fe:cc:81:97:da:d7:eb:ca:9d:73:3e:a4:ce:f7:54: c3:c5:d8:f3:d3:a7:8c:3e:55:90:fa:24:01:b4:84:f0: 23:d1:c3:ea:cd:c0:de:5b:93:88:92:6f:b4:c6:66:3f: ae:a1:97:b5:76:b4:7d:05:23:4f:a6:a3:1c:62:a5:66: a2:51:db:0b:f5:ec:81:ee:7b:d5:b0:13:95:3c:30:04: 58:f1:47:ea:39:6d:ef:43:90:28:6e:46:e2:0c:36:2c: c7:13:78:15:01:40:17:42:bf:b0:23:10:33:bc:ef:63: 00:89:01:6a:bf:32:a4:59:e8:1c:b6:f1:84:9d:c9:bb: 33:49:2a:1e:eb:f0:75:ee:bf:b7:08:5c:8e:a5:51:ca: 5f:6d:cd:dd:bb:38:7d:cf:2d:d2:92:07:72:d6:a0:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:19:6b:f4:10:5c:1e:aa:d3:f3:52:d0:cc:2f:51:e6: 1d:84:a7:62:fa:0a:d8:70:65:1c:0d:0a:91:99:10:ea: 6c:28:a4:ad:e9:db:df:fd:db:1b:fd:76:1b:e8:d4:28: a0:46:fd:5a:c5:09:7a:0d:03:1c:af:3c:2b:2b:e1:2c: c7:b7:70:72:02:28:ce:7b:79:8d:93:d8:14:00:2c:64: 98:95:bc:8e:b3:ab:89:93:f9:9a:0e:ac:f1:a6:14:56: 2b:49:68:8d:cb:51:87:2d:a6:ee:43:ef:38:a2:37:41: ff:e4:a8:ed:5f:c4:34:29:26:11:0b:ef:37:fd:f9:90: 09:4f:80:a6:58:2c:10:36:69:66:82:f2:ef:d3:62:40: 42:94:06:cc:d4:91:9b:5d:e8:7e:fc:ce:36:d6:f2:28: 61:c7:10:40:da:10:a1:de:a9:fe:92:94:89:38:2e:78: c6:41:a0:7a:44:10:c8:c8:6b:75:aa:61:20:3d:2c:60: d2:58:60:e7:7f:ca:c7:7c:e1:56:94:b9:dd:4d:6e:fd: f4:c6:88:80:3c:6d:73:84:ec:63:75:e6:d0:2b:3d:6d: be:81:f5:ae:ed:92:6e:6e:b4:0d:2a:cd:a8:3c:29:de: 3e:29:50:ee:6e:0a:d2:9a:41:8d:8a:67:7e:93:50:10 Fingerprint (SHA-256): 7C:D6:23:2D:90:D1:45:57:FB:5F:BB:BC:70:CB:39:F9:72:9F:50:50:81:79:93:5C:08:D7:C3:06:50:1B:BD:E5 Fingerprint (SHA1): 12:F5:05:4E:20:D9:05:12:0B:B4:78:36:82:AF:42:A4:2E:BD:56:28 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12810: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #12811: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #12812: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #12813: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #12814: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #12815: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202096 (0x195811b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:55:47 2016 Not After : Sun Apr 25 20:55:47 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:c7:83:76:35:cb:4d:f2:24:c9:70:80:4b:c1:d0:47: 68:a0:f5:44:78:e9:f3:69:e4:a1:6e:17:ab:47:4d:e1: ae:d1:31:fe:fd:a0:7e:14:4a:29:85:20:46:02:95:ca: c9:71:c7:60:57:89:82:33:fe:05:18:a3:79:21:b1:b3: 36:72:67:85:07:90:1b:47:3f:b2:f1:4b:1f:03:d9:74: a0:db:30:eb:5c:79:70:11:d5:e9:bb:bb:6a:4f:73:f9: 3a:05:47:93:b9:95:9f:99:91:11:e4:dd:bc:e6:e6:f8: fb:d6:7d:82:89:d1:10:66:c7:7c:96:ee:c3:77:29:c1: df:b4:93:01:2f:11:f2:81:41:5e:4d:90:61:f7:d4:27: 98:f6:2d:b9:fa:49:71:a6:6d:0e:8c:0f:58:a0:1c:af: d8:e6:e7:35:21:89:ae:cd:5e:3a:a1:16:5b:6f:47:a5: a9:2b:aa:40:84:d8:fe:aa:14:a0:0d:e6:8f:0b:a3:fc: 9f:0a:b6:66:31:0f:84:02:8d:f7:86:6c:93:e3:7b:16: 5a:17:f3:8f:e1:66:0c:cc:72:fe:5b:2c:3a:c6:1a:82: 09:c1:e8:91:c4:c7:4d:d8:92:95:21:45:a8:38:90:7b: b3:f9:9c:11:48:85:43:26:b0:5f:d1:5a:fa:65:b4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:04:9d:c7:60:12:c4:8f:52:20:ef:73:f9:22:1f:2c: 32:6f:6e:3f:98:38:f9:5a:8f:1e:eb:d7:04:fc:db:d3: 5d:04:2e:d9:29:6e:ae:81:cd:07:81:30:95:7b:e5:c3: 74:8c:dc:76:92:cd:23:6a:ed:b3:b3:1e:f2:61:81:9c: ff:be:58:35:4e:c0:2e:b0:1c:ca:19:45:05:25:db:b9: f5:a7:e0:98:1a:02:f2:b0:df:d7:2f:6f:27:a8:b0:76: 85:df:27:f6:66:99:99:1d:48:92:02:03:c0:4b:bb:e5: 04:a8:97:fd:d6:de:12:cb:72:63:56:92:12:e7:46:02: 7b:4b:f0:1f:52:a3:93:9f:e8:df:41:ce:a7:77:c5:21: 58:03:f5:f5:98:ab:45:20:89:e8:50:71:05:5f:e4:07: 40:3b:59:34:e5:c6:8c:7a:3e:ad:3f:65:13:66:f2:cf: 59:dc:30:b2:44:dc:17:1f:86:5e:19:2e:1d:01:21:d4: 7a:b5:9a:cb:fd:37:b0:32:e4:81:65:72:3c:c4:2d:b7: 5d:11:3a:59:2e:f5:71:19:0c:7d:f9:46:d9:b5:31:ea: 90:d3:5d:20:b2:dd:de:0c:71:09:5c:f5:69:13:31:97: 88:c1:14:96:5e:c6:45:81:21:44:a9:61:d9:64:1e:72 Fingerprint (SHA-256): DE:09:AA:93:47:E4:A3:B8:68:7D:4A:DB:96:7A:3A:47:03:1C:27:D2:5B:B2:29:6C:AB:13:C7:B7:8A:3B:4E:49 Fingerprint (SHA1): 76:10:60:AA:6F:A0:57:23:0A:43:84:2C:E9:46:53:06:C8:87:7B:D7 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12816: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202096 (0x195811b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 20:55:47 2016 Not After : Sun Apr 25 20:55:47 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:c7:83:76:35:cb:4d:f2:24:c9:70:80:4b:c1:d0:47: 68:a0:f5:44:78:e9:f3:69:e4:a1:6e:17:ab:47:4d:e1: ae:d1:31:fe:fd:a0:7e:14:4a:29:85:20:46:02:95:ca: c9:71:c7:60:57:89:82:33:fe:05:18:a3:79:21:b1:b3: 36:72:67:85:07:90:1b:47:3f:b2:f1:4b:1f:03:d9:74: a0:db:30:eb:5c:79:70:11:d5:e9:bb:bb:6a:4f:73:f9: 3a:05:47:93:b9:95:9f:99:91:11:e4:dd:bc:e6:e6:f8: fb:d6:7d:82:89:d1:10:66:c7:7c:96:ee:c3:77:29:c1: df:b4:93:01:2f:11:f2:81:41:5e:4d:90:61:f7:d4:27: 98:f6:2d:b9:fa:49:71:a6:6d:0e:8c:0f:58:a0:1c:af: d8:e6:e7:35:21:89:ae:cd:5e:3a:a1:16:5b:6f:47:a5: a9:2b:aa:40:84:d8:fe:aa:14:a0:0d:e6:8f:0b:a3:fc: 9f:0a:b6:66:31:0f:84:02:8d:f7:86:6c:93:e3:7b:16: 5a:17:f3:8f:e1:66:0c:cc:72:fe:5b:2c:3a:c6:1a:82: 09:c1:e8:91:c4:c7:4d:d8:92:95:21:45:a8:38:90:7b: b3:f9:9c:11:48:85:43:26:b0:5f:d1:5a:fa:65:b4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:04:9d:c7:60:12:c4:8f:52:20:ef:73:f9:22:1f:2c: 32:6f:6e:3f:98:38:f9:5a:8f:1e:eb:d7:04:fc:db:d3: 5d:04:2e:d9:29:6e:ae:81:cd:07:81:30:95:7b:e5:c3: 74:8c:dc:76:92:cd:23:6a:ed:b3:b3:1e:f2:61:81:9c: ff:be:58:35:4e:c0:2e:b0:1c:ca:19:45:05:25:db:b9: f5:a7:e0:98:1a:02:f2:b0:df:d7:2f:6f:27:a8:b0:76: 85:df:27:f6:66:99:99:1d:48:92:02:03:c0:4b:bb:e5: 04:a8:97:fd:d6:de:12:cb:72:63:56:92:12:e7:46:02: 7b:4b:f0:1f:52:a3:93:9f:e8:df:41:ce:a7:77:c5:21: 58:03:f5:f5:98:ab:45:20:89:e8:50:71:05:5f:e4:07: 40:3b:59:34:e5:c6:8c:7a:3e:ad:3f:65:13:66:f2:cf: 59:dc:30:b2:44:dc:17:1f:86:5e:19:2e:1d:01:21:d4: 7a:b5:9a:cb:fd:37:b0:32:e4:81:65:72:3c:c4:2d:b7: 5d:11:3a:59:2e:f5:71:19:0c:7d:f9:46:d9:b5:31:ea: 90:d3:5d:20:b2:dd:de:0c:71:09:5c:f5:69:13:31:97: 88:c1:14:96:5e:c6:45:81:21:44:a9:61:d9:64:1e:72 Fingerprint (SHA-256): DE:09:AA:93:47:E4:A3:B8:68:7D:4A:DB:96:7A:3A:47:03:1C:27:D2:5B:B2:29:6C:AB:13:C7:B7:8A:3B:4E:49 Fingerprint (SHA1): 76:10:60:AA:6F:A0:57:23:0A:43:84:2C:E9:46:53:06:C8:87:7B:D7 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #12817: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #12818: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202101 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12819: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #12820: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #12821: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202102 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12822: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #12823: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #12824: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202103 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12825: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #12826: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #12827: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202104 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12828: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #12829: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #12830: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202105 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12831: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #12832: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #12833: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202106 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12834: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #12835: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #12836: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202107 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12837: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #12838: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #12839: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202108 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12840: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #12841: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #12842: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202109 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12843: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #12844: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #12845: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12846: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 425202110 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12847: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12848: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 425202111 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12849: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12850: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 425202112 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12851: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12852: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #12853: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #12854: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12855: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 425202113 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12856: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12857: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 425202114 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12858: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12859: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 425202115 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12860: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12861: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #12862: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #12863: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12864: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 425202116 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12865: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12866: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 425202117 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12867: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12868: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 425202118 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12869: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12870: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #12871: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #12872: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12873: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 425202119 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12874: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12875: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 425202120 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12876: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12877: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 425202121 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12878: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12879: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #12880: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12881: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12882: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 425202122 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12883: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12884: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #12885: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12886: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425202123 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #12887: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12888: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202101 (0x195811b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Mon Apr 25 20:56:42 2016 Not After : Sun Apr 25 20:56:42 2066 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:88:60:88:e3:39:79:f4:3c:c6:85:95:97:2d:6d:7f: 6a:98:2b:f9:9c:72:ab:30:cc:a1:28:4a:c3:ec:28:63: ed:4e:d9:bc:a1:b3:fe:ea:88:f6:0b:cf:87:39:54:42: 24:fc:b9:f9:28:c3:0c:9d:b7:13:c7:d9:65:2f:04:29: af:c0:1c:9b:98:a8:32:28:52:fb:86:be:dd:81:50:fb: e5:08:38:87:d6:6d:da:65:4f:4d:64:c2:c1:d9:c5:68: a6:c1:92:98:3f:1f:f5:b3:ff:b4:f0:8a:19:8a:c5:3a: 35:eb:0e:22:4e:cb:2c:23:3f:f2:37:66:43:35:66:82: 95:da:1e:39:07:f5:5f:22:a1:43:dc:9c:a3:96:cb:8c: 02:04:e2:79:f9:41:97:39:02:7f:52:f0:4e:56:09:c4: 5d:96:bc:a5:9a:73:79:56:ce:04:72:9b:cf:2b:d5:87: 3a:33:28:e3:b7:65:f7:2a:a9:3b:3d:ce:62:37:ea:a0: e2:e3:9c:1c:67:2f:a3:2d:a9:b6:20:33:79:69:01:10: 01:40:6d:85:94:9c:db:6d:52:a9:7a:61:c5:9b:d6:1a: b7:57:14:a7:2e:31:d9:9f:12:1f:a4:8e:6f:75:54:40: 34:2d:14:70:f6:1b:07:a4:27:6c:a2:17:42:37:b8:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:4a:a2:c4:f6:90:75:58:64:92:7d:e4:a9:c0:c7:ac: 20:fe:4b:0d:18:9b:19:fc:b3:f6:3b:3f:55:a0:5f:33: b3:e9:e5:4b:22:cf:0d:ab:c6:0e:38:52:a1:22:13:f2: d3:a9:4a:2b:a6:7f:57:3b:80:c6:77:7a:3c:94:e9:4a: 87:d4:1e:25:ea:46:1b:64:79:7e:22:ed:31:78:e1:ac: fa:6e:73:b6:3a:60:b1:3b:f4:f9:f9:9a:1f:88:20:54: c3:b4:69:62:d2:05:72:c3:2c:6f:32:bc:e2:47:5e:ff: 10:38:db:0a:07:b8:6a:db:23:ba:47:1f:dc:26:08:7f: a5:5d:da:f1:7f:94:45:ab:12:f3:ac:97:25:a6:34:b2: 89:22:1c:bb:5d:e6:b7:52:3b:13:4f:d4:41:ca:49:f9: ec:6c:fa:ee:0d:02:b5:8f:9e:1f:6b:24:7c:62:7f:95: d1:3f:a4:76:eb:59:31:95:d9:02:8c:f2:ff:2f:e2:f6: 85:a8:21:50:0b:68:14:01:f2:15:13:df:c1:86:a8:39: 83:35:5a:4f:59:11:1c:4a:96:69:c9:37:4c:0c:5a:4b: 19:91:11:c1:42:e7:f9:e3:5f:7c:f0:76:5a:ca:eb:ff: 7e:8d:8a:fd:1e:8b:f1:d9:17:70:5b:82:f9:b6:d7:5d Fingerprint (SHA-256): E2:BB:FA:D0:A4:C3:C6:9A:C7:CF:14:65:29:7F:8A:1F:4F:BC:52:91:8C:C5:6E:EF:4B:A4:59:15:FF:4D:24:18 Fingerprint (SHA1): AB:D4:C2:19:31:89:B4:9E:ED:AD:2E:95:CB:45:D8:59:AA:D8:FD:BC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #12889: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202102 (0x195811b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Mon Apr 25 20:56:50 2016 Not After : Sun Apr 25 20:56:50 2066 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:0a:cb:6d:fd:4b:e1:e4:88:4a:59:ba:fd:cb:7e:11: 73:e4:33:03:2c:57:43:4f:5a:66:d8:49:8e:01:5f:e4: ac:04:c3:ba:ad:d8:1c:64:33:1b:a9:8d:85:37:c7:a8: 57:cf:eb:8f:60:6f:9b:d5:3e:dc:c4:72:10:d0:85:a5: fb:41:71:ca:34:52:4f:d8:b6:1b:90:5e:2c:a9:a6:b9: f5:e0:a1:3a:6f:fb:a1:bc:ba:81:93:4d:3f:dd:b6:62: 21:27:4a:3a:82:bd:e2:47:1c:4f:9e:2f:8c:a6:13:c4: 1f:e6:56:db:bb:46:2d:50:25:df:80:04:b0:22:08:29: e3:89:b8:f6:27:5a:4f:41:af:c0:8f:f3:89:63:c1:47: 44:51:22:97:58:4f:01:b5:23:a0:40:85:ef:ce:05:bb: a5:de:5d:2c:36:da:fa:e0:ba:2d:24:df:76:57:7b:1f: 18:bd:01:14:c2:1d:e4:2c:77:61:2b:9a:b6:87:e3:ee: 83:1e:1e:2b:46:dd:7b:40:6a:90:73:96:1f:e3:5e:7c: 0e:09:f9:ea:2c:51:aa:34:d2:a2:94:96:bc:8d:8a:db: 7a:15:ed:96:b9:fb:be:75:6a:96:46:cb:90:f5:ff:3e: ab:02:6d:79:46:c7:ea:ee:9f:70:5a:6a:9f:9d:49:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:01:60:51:6b:e9:10:a0:b1:9d:1f:66:44:bf:5f:d3: e2:4e:e0:a8:31:be:b6:d1:9d:02:2a:38:24:cc:a5:94: 09:0f:c0:a8:06:ac:ce:8e:e7:7f:8a:42:f8:e5:01:d3: b6:ba:87:c1:1c:b0:e5:e7:d5:b0:2f:7d:27:da:8b:28: 50:90:3e:59:a9:32:47:40:46:91:8e:07:7e:39:b0:90: 58:27:d4:03:a1:f9:c3:64:20:58:cb:43:e1:72:66:0e: 20:b3:9f:87:12:31:ce:33:dc:a5:b2:30:5a:da:ea:23: 4d:1f:da:a7:04:5d:6d:54:88:ce:b9:03:c1:b5:c5:07: a3:f6:3e:7d:60:eb:ce:36:10:f2:72:62:a3:ea:e8:95: 21:c5:87:21:51:b0:5c:96:6f:54:0f:27:84:dc:1a:df: 63:4b:09:aa:c4:f8:f1:b0:50:e5:a3:a0:e4:b8:30:9c: 97:94:ee:e5:a5:31:23:e1:66:65:5c:c4:bd:77:b7:c1: 58:45:3c:81:64:a6:bf:96:40:db:7f:e4:e8:62:75:6c: a2:33:44:da:6b:f3:de:6e:df:f7:78:75:08:d3:01:bb: 5e:75:b1:3f:d0:0b:42:0a:c3:6a:22:a6:70:e5:0f:2a: 95:0e:89:ce:2d:75:b3:55:2c:4a:75:9b:64:1e:62:52 Fingerprint (SHA-256): E9:3E:C9:4D:8B:39:0E:E5:EE:5F:36:72:B5:8B:18:C5:02:54:00:24:D7:61:5A:DE:AE:A3:33:D5:F5:41:EF:A1 Fingerprint (SHA1): 5B:E2:3E:23:7F:49:48:D6:6C:0B:40:56:7C:C1:96:7F:AF:B4:67:69 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #12890: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202103 (0x195811b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Mon Apr 25 20:56:59 2016 Not After : Sun Apr 25 20:56:59 2066 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:3a:db:14:c0:10:fa:e4:42:6c:6b:51:38:b4:fd:18: 2e:53:57:79:04:94:82:f4:24:e3:07:e6:1e:98:49:ad: 45:b6:f2:ff:74:a3:12:40:2a:89:c9:3e:02:42:3f:52: 19:f0:44:c5:fc:f2:08:43:1d:30:ce:d4:ca:97:e4:59: c7:e3:03:8d:05:3d:28:d2:e9:36:5f:80:f2:c1:d1:a3: 55:fd:8d:a7:90:d6:67:59:a7:49:93:cd:62:1b:61:61: 93:30:31:b7:23:62:04:f9:09:ce:ef:f5:f5:2b:47:b7: a2:4e:c1:4a:d2:f0:a7:92:7a:e2:28:28:08:94:f6:fd: 21:96:5a:d9:80:ba:b0:3b:ae:f0:ab:a5:f7:1e:af:d9: 83:5e:7f:f1:08:f2:6f:a4:82:f5:5a:23:41:e9:e2:be: 88:d0:89:60:8c:c9:9b:b9:2c:a4:f9:be:21:9a:e1:25: cc:bb:1c:f8:9f:a6:3e:d0:02:fd:4e:0d:d4:f7:f5:e3: a5:92:50:cd:da:c4:9a:53:15:d2:9e:df:86:f1:20:04: 35:30:1c:e2:5d:2a:2f:54:d1:b4:eb:29:a2:85:80:69: d3:4f:e3:45:e8:d4:82:f2:f6:a6:80:f6:9c:f3:34:f9: 6f:65:e3:5e:64:fd:25:ca:29:fb:8c:af:3c:d1:e5:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:68:87:78:eb:05:a2:6e:13:4c:63:7a:75:88:49:db: bc:8b:09:51:32:c0:4b:c9:4b:34:d3:aa:06:75:27:a8: 58:06:50:e5:f3:ab:e7:cb:07:69:36:b2:6d:dd:9c:78: 46:74:c6:bb:b0:65:6a:1c:98:ba:3b:e1:81:61:63:32: dc:27:12:8d:f5:03:b9:c9:11:0b:5b:71:a1:17:ab:6f: 95:20:28:e3:94:0f:cf:1a:da:b4:31:f9:5d:83:bd:33: 0f:2c:5d:22:01:29:dc:20:cd:1f:70:de:f4:07:fa:03: 62:64:de:ae:a9:4b:f3:12:82:22:36:97:b2:df:0b:29: d6:6c:22:87:1f:58:b8:54:a0:ff:16:aa:a0:9a:e1:b0: 89:cb:30:b4:04:20:d7:e7:e9:17:46:bd:60:18:07:b4: 1c:89:ad:33:64:58:00:4f:c7:dc:09:f7:f5:95:b1:9f: cc:2c:9d:5d:74:4d:5c:4f:18:d9:e8:b9:8e:1a:b1:19: 29:1b:ee:9f:42:4d:d4:e8:a1:3e:ce:19:b6:b1:3a:4b: cc:64:44:6b:85:8b:cb:fd:47:8e:94:6e:be:bc:1e:43: da:89:7d:1e:35:7c:ca:d8:35:3e:e0:9b:b2:3b:10:c1: a6:86:c3:7e:34:1e:ac:24:4d:8a:90:22:74:00:f7:31 Fingerprint (SHA-256): C4:BE:21:E1:78:C3:43:C4:97:34:FF:6F:71:C4:F5:D0:34:D5:7A:CD:5C:6C:AE:FF:9B:39:C9:60:42:21:4D:FE Fingerprint (SHA1): A5:CF:FC:72:3B:D4:7C:23:6E:57:2A:36:2C:11:43:D6:99:E0:26:88 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #12891: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202104 (0x195811b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Mon Apr 25 20:57:05 2016 Not After : Sun Apr 25 20:57:05 2066 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:3e:2f:11:43:b0:6e:58:1e:e1:43:01:86:3b:f0:c4: 67:62:37:b7:d2:5a:e5:e2:60:5f:34:33:0d:7b:52:df: ed:5d:84:42:80:72:45:62:75:fc:52:c3:02:11:27:0c: f5:d2:85:c4:46:d1:43:45:de:ba:c9:d9:f6:04:e4:37: 68:ac:7e:f2:4d:46:5f:57:f9:98:21:e9:32:cb:bd:fa: 85:73:5a:10:28:94:04:df:1c:f8:0e:ee:1c:bf:07:84: a9:66:62:41:72:47:5a:67:96:38:77:4c:63:7c:23:39: 11:f6:87:97:84:fe:40:5c:79:9e:c5:95:00:a8:5c:92: 86:78:f6:07:0d:33:35:13:40:ab:8c:82:2a:ef:b8:84: f5:8e:15:95:ce:64:d7:52:3d:dc:c2:77:bb:d7:1a:9c: cd:23:0a:51:d8:a6:eb:ad:d1:32:5e:c6:b1:57:b7:0d: 35:11:a2:2f:21:31:b8:f8:d0:b3:ee:8a:4f:8b:e5:a7: db:ee:34:1c:da:57:df:7c:0e:0f:d5:7c:8a:e0:1a:af: 91:cf:ce:8d:e0:9c:1b:bf:dc:1e:66:94:75:78:cd:5e: 89:46:50:cf:77:72:7d:93:b9:b4:ac:76:85:9a:43:88: 32:7b:6b:50:11:3a:87:55:d3:6d:af:be:cc:85:17:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:cf:2d:65:af:c3:99:a2:1d:53:c4:28:24:a9:d2:ac: e8:71:e2:03:c8:9f:f2:06:2f:9a:30:03:41:5e:5e:e7: 97:ea:29:7c:47:9d:19:02:c5:2f:b4:8a:e5:7e:7e:2b: e6:c3:35:ee:e1:b3:37:ad:6f:31:a1:52:72:cc:18:7a: 29:19:bb:f3:52:eb:10:47:d7:ab:00:ba:8a:28:a4:13: 95:ce:5c:8b:25:d6:9b:62:5c:fd:7f:48:f9:41:5f:37: 8b:67:6b:72:fa:aa:28:80:1c:c1:b4:54:0d:d8:36:d7: e2:ed:44:77:8f:c1:b1:bb:eb:a2:55:f9:17:cf:32:35: 30:c3:f2:e3:13:2e:bb:31:3d:8f:48:b2:7f:4d:4e:e7: 67:73:8e:af:28:30:97:f0:dd:28:5b:49:9f:6f:d7:d5: f7:26:94:7e:35:08:f9:5f:45:ce:c4:74:15:4e:5b:91: 6c:cb:05:60:ee:05:7a:9b:a3:76:8c:ad:63:de:3c:32: 36:a1:04:e3:c2:a6:bb:61:cd:a8:59:b2:d9:5c:04:9b: c1:8a:f9:76:fa:ae:72:f3:e4:76:2c:16:7b:03:74:33: 9c:27:0a:9d:ae:a4:f4:91:a8:8e:b3:6b:32:05:df:06: ab:61:20:e6:11:26:d1:f3:81:37:7a:91:90:44:b1:53 Fingerprint (SHA-256): 62:E2:24:5D:16:EF:3E:99:97:BA:E0:C6:AF:E3:4A:C8:F7:42:5E:3F:70:14:B5:C5:FC:D0:5A:D6:5B:40:52:6D Fingerprint (SHA1): F1:99:0C:71:44:80:47:C5:2A:07:83:2C:11:6F:DA:AE:79:85:A1:4F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #12892: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202105 (0x195811b9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Mon Apr 25 20:57:18 2016 Not After : Sun Apr 25 20:57:18 2066 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:76:ca:2b:b5:f7:fb:99:47:f9:3d:28:9c:5f:35:d0: 32:3a:99:5d:c9:ea:80:06:91:73:87:d8:ab:17:15:47: 02:98:dc:67:d4:11:66:5f:5b:3b:50:35:57:59:3f:6c: 0e:1b:16:12:be:a3:ff:17:80:d5:93:dd:7b:8c:a0:3a: 75:e6:f5:dc:b6:c2:13:80:01:5b:90:0f:64:06:44:03: af:0e:28:82:d2:15:b3:23:3e:7b:de:09:30:4f:47:f4: 8a:b9:9a:74:2a:fd:50:00:a8:64:ec:6b:56:e5:a7:b5: ac:29:9a:1f:b8:03:c0:83:8b:04:e7:56:10:49:40:84: 0e:db:8a:19:3d:c5:91:12:9b:46:0e:f6:06:96:13:2d: fa:ed:46:73:55:ab:3c:a4:7c:70:20:5a:67:e0:4c:f6: dc:d2:4e:c5:eb:85:25:aa:e6:eb:81:4a:12:a3:68:60: 15:d7:7e:3d:58:20:3f:af:58:3d:85:2d:cf:cd:f8:ed: 76:2e:99:71:ec:c1:cb:72:60:38:fc:5b:7b:b2:b2:f4: e5:a5:7d:de:be:7d:ab:55:36:90:ef:61:5c:d6:79:85: 9e:20:8d:6e:bc:cb:6f:3d:89:cb:f4:d3:30:3d:8b:76: a6:b0:d8:f9:b5:00:76:6d:3b:a3:19:0a:19:24:81:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:a3:32:aa:01:32:ee:27:54:dd:32:30:24:2d:83:55: 05:79:5c:03:18:0d:da:68:e0:3d:69:32:fc:ae:af:51: 46:f8:14:63:46:2d:93:e8:ef:b0:17:00:c8:71:25:58: 15:31:ae:54:8e:d0:0d:54:3b:6c:23:d7:9c:27:29:d8: 98:37:2f:4e:ca:d8:b0:23:9e:a1:99:0b:ce:94:23:d2: 79:56:a7:14:58:37:fb:02:85:f1:ad:71:a2:02:3d:ad: d7:8f:d2:c3:fc:35:2e:d1:68:f7:3e:6a:84:b2:1a:f6: 47:04:47:f2:28:1a:bd:0a:fb:26:f8:1b:0b:c3:f1:1e: a6:f0:e2:55:60:d4:f7:34:0e:3a:45:51:0e:b5:25:50: 79:0c:7b:61:c7:e6:48:5a:d1:4e:43:62:85:d0:26:d2: c5:27:ae:6a:f7:9c:ab:d8:a6:5f:ba:b3:5d:62:7f:27: e6:b0:1b:d6:19:6b:b5:29:e7:80:8e:1a:49:0d:2d:e3: 74:0c:c4:74:0c:b3:52:33:60:d4:48:37:86:c4:6c:32: 94:de:d3:cf:19:ab:cd:bc:70:47:5b:cc:76:38:b7:83: 91:8f:a0:78:ac:92:0b:bd:24:a6:e6:98:1a:63:3f:8c: 54:ae:e1:e9:2b:10:cd:2b:a6:68:96:c8:70:c3:b7:8d Fingerprint (SHA-256): 64:4E:B0:46:53:76:E1:CF:DB:D2:6C:F4:29:0D:36:F6:A3:F0:CE:5A:FD:3C:02:78:3F:56:34:F8:03:DD:02:DB Fingerprint (SHA1): 12:8B:DF:E5:D5:2D:2C:B9:99:E9:FB:2F:ED:12:3F:9F:9C:7E:FF:DB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #12893: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202106 (0x195811ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Mon Apr 25 20:57:31 2016 Not After : Sun Apr 25 20:57:31 2066 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:0e:40:d2:d5:8c:4f:cb:8b:14:cb:1c:7b:73:dd:26: a7:53:df:8f:29:90:57:56:97:5d:f6:e1:04:fd:2b:87: a4:98:42:41:17:e7:ff:cf:11:17:90:de:a2:50:f2:68: fe:0e:0f:79:64:0f:19:4c:dd:ba:6a:f4:28:e8:e8:79: ff:93:d9:74:c9:73:22:f4:5c:d3:a2:a3:91:78:20:d8: 94:ca:f8:f5:85:a6:a2:ca:03:28:b2:05:d6:40:8b:53: eb:86:76:78:21:40:6c:31:7d:d2:d2:eb:36:89:b7:d7: 67:78:b2:64:f4:d7:51:66:af:9d:61:b2:f8:ad:8b:44: a6:2f:97:ee:bc:b2:c0:e8:60:28:13:75:58:56:c7:1d: 83:67:74:8d:c0:14:b3:9c:ba:04:e5:c7:51:17:92:0e: 21:39:f2:17:cc:d6:9b:54:46:a1:42:85:94:b9:a0:b5: 82:3c:da:c3:f6:65:1f:d3:83:1d:1d:e3:7f:13:5e:b1: 91:63:25:27:94:77:17:94:32:3f:26:1e:8f:ff:6e:f3: 83:f1:74:8f:5e:3f:22:4e:64:36:d2:23:b2:ad:d0:a9: fb:81:d6:43:f3:64:22:98:ff:18:35:1c:e5:9d:47:3d: 11:e9:eb:90:03:1b:c5:a0:45:43:f5:65:8b:15:24:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:08:ec:5c:a7:7c:51:62:8e:e3:59:15:01:c5:1f:27: 83:c6:22:aa:86:47:62:73:3c:eb:2e:b0:30:95:c1:eb: 4e:f5:dd:71:d8:58:fe:e1:d2:4b:be:b3:ce:73:90:9e: 2d:b7:2d:26:50:d5:18:b3:c7:56:c7:ce:ca:69:38:c8: 3e:34:7b:fa:88:d3:1d:73:fa:8f:40:95:b4:03:d4:89: da:1d:31:5b:dc:b6:60:d6:4c:1e:2b:c0:93:1c:7c:84: e8:bc:6a:2d:40:4b:17:34:d1:7c:01:9e:29:f0:da:33: 2c:06:95:2c:55:47:81:0f:1f:db:79:e6:13:7f:18:c6: 26:5c:aa:a1:58:3f:e1:16:b9:48:fb:c5:0b:94:ac:59: 57:f0:23:fb:28:90:df:66:2e:eb:42:3f:a2:3e:b9:39: 92:9c:c3:9a:80:62:eb:49:b2:da:50:6e:1e:4b:5a:e8: b5:97:e4:4d:69:34:eb:b4:76:d8:41:e7:46:50:21:31: 0a:34:a1:1d:b4:c4:97:b0:a3:ea:e6:19:c7:19:a9:ec: e9:4d:71:f0:63:3a:66:85:34:0b:e0:98:61:42:9a:fc: a2:6f:07:9e:c4:21:2b:93:7d:b6:18:df:3a:70:8e:4f: f8:3f:4c:fc:46:37:f1:c6:17:6a:3b:8e:41:53:c3:45 Fingerprint (SHA-256): D5:24:34:18:CB:6D:CE:09:09:72:E5:8D:6A:FB:32:BE:6A:AA:D3:66:0C:F5:92:6E:8D:E4:E0:D6:77:88:A0:27 Fingerprint (SHA1): 8B:C1:D8:C3:61:95:BF:DB:F2:06:EB:6F:C5:11:BC:41:34:75:22:2D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #12894: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202107 (0x195811bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Mon Apr 25 20:57:37 2016 Not After : Sun Apr 25 20:57:37 2066 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:d3:17:83:81:76:0c:3b:f2:90:c9:98:91:75:2c:27: c0:77:9a:02:df:35:cb:92:4f:f4:5c:a4:70:dd:fb:e0: ca:da:bb:0a:4c:4c:f1:9d:b7:12:62:6f:ed:3e:dd:49: b1:9c:2b:95:ec:3f:dd:2a:df:24:1f:05:6f:d6:ae:43: fd:3d:01:dd:87:46:5d:ec:c8:62:c1:2d:ce:77:af:9e: 86:28:74:30:a2:7e:6c:40:69:ce:77:43:c6:5f:9b:35: 9b:f6:7a:48:b0:ec:cc:72:b4:ff:ed:5c:60:be:32:d7: 43:57:fc:09:b4:dc:8d:59:05:ab:fb:6a:c3:cd:e0:99: e8:3a:14:9d:02:ce:5c:0a:c6:bc:14:e2:77:ae:67:84: cf:17:a3:19:c4:f4:b2:78:77:d3:77:dc:1e:43:91:91: da:f3:f7:b1:cd:97:e7:b4:39:68:f5:e6:29:4c:f3:18: 09:d2:c3:b9:46:dc:c4:2a:af:bd:2d:17:5b:ad:d2:3b: ef:ad:e8:33:fe:2a:3c:7f:ca:2d:cd:1b:40:7f:e5:4d: 0a:0c:bb:49:73:8f:6a:1f:3a:27:b9:9c:68:78:6c:30: 52:36:5e:12:81:83:a4:ba:6c:f0:ae:c9:2e:aa:60:03: 72:11:04:96:28:ab:6f:1c:d2:1a:03:a9:4b:24:ca:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:2e:cf:45:aa:9f:3b:34:b2:f5:ff:01:9a:e3:2d:d9: 7b:96:87:62:cc:e1:77:4b:e3:0e:e1:03:a7:cc:c4:a6: ee:22:8b:9c:6b:1a:18:3f:ec:de:fe:e9:82:ed:32:47: 64:57:54:9d:f3:5f:6b:61:60:c5:ab:b3:3e:7d:eb:df: 56:07:cd:54:9d:d1:13:05:26:e0:ea:23:9c:7b:58:62: 32:5c:ce:f7:09:cd:2d:1c:47:05:e2:a1:cb:32:2b:23: 34:3d:ba:1b:ab:31:62:de:9b:ca:23:a1:c1:49:3c:0b: 54:dd:5b:3e:0d:7e:79:7b:89:51:30:31:8a:95:54:ea: 90:27:22:61:c3:fe:3c:be:fb:f4:5d:38:81:b1:53:e2: 84:9f:45:e0:8e:8d:3f:5e:89:94:f7:b1:98:59:86:1a: 5c:09:98:0b:74:a3:77:8a:82:d5:a6:ce:d6:26:74:e6: f1:16:7f:83:c0:19:b5:7b:2e:54:ef:69:06:b8:9b:6f: 55:06:e7:7e:0c:0a:58:ba:15:03:6c:94:5c:a5:b0:e2: 43:e6:5c:1a:82:1b:4e:10:f4:b6:d0:74:e8:9b:51:c7: 09:64:20:10:7c:42:18:b4:06:22:5c:50:6d:83:0b:7a: cf:03:14:00:bc:0b:96:46:e9:01:e8:d7:af:ff:c2:11 Fingerprint (SHA-256): 8A:AD:3C:FD:63:07:46:74:79:BC:B0:91:21:68:FA:45:61:48:3E:6A:B1:03:F2:80:28:2A:1E:F8:16:CF:5A:91 Fingerprint (SHA1): 5E:AE:AB:AB:36:E9:7F:F5:97:2E:60:59:FA:03:01:23:28:C1:03:F2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #12895: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202108 (0x195811bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Mon Apr 25 20:57:44 2016 Not After : Sun Apr 25 20:57:44 2066 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:e8:57:8a:0c:02:15:86:29:29:e4:9d:6f:7f:a9:e9: 5a:bc:61:bf:7c:74:eb:46:72:81:7d:50:98:64:7b:cc: 11:7c:64:03:f5:c0:bf:b6:e2:3c:b3:58:87:de:90:81: 03:97:2d:84:34:d9:15:9a:9e:1d:9c:b9:a9:52:30:45: 55:c3:3f:f2:58:1a:c1:58:d8:f0:68:8b:a3:a4:cf:7c: 68:cb:68:97:31:ab:c6:db:d9:ff:7a:86:9f:28:ca:0d: 1b:97:27:34:06:d6:1e:56:cd:7b:55:a0:2b:5c:fb:bf: 5a:68:01:a8:d9:a9:55:74:7d:a0:01:5f:c7:ad:4a:19: 31:c4:ff:1c:7b:26:ff:bd:36:42:1c:51:48:fd:db:47: 7b:2f:15:5e:50:76:ed:57:fc:cd:93:aa:55:67:96:de: c7:43:c4:43:bf:00:0d:a5:2b:df:f9:54:0e:4e:94:a1: bf:b0:ce:93:c7:2e:f1:8d:df:b4:7d:b8:fb:bb:5c:56: 6f:c8:c4:ef:04:5a:09:a2:9c:0a:32:d4:2f:ba:8f:16: 19:70:96:fc:c4:1b:70:87:87:e1:a4:2e:9d:d7:8b:03: 8c:15:c3:5e:d4:91:99:ee:82:d2:1f:fa:ea:11:db:a7: b9:95:b6:50:c6:25:70:dd:2a:98:e4:27:3d:c1:d1:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:66:01:eb:c1:ad:e7:1e:93:53:9e:11:c5:1b:ec:36: db:8a:3a:46:8c:6d:ea:f0:73:40:3d:67:9c:51:8f:3b: b5:88:1f:01:ea:0d:df:97:21:55:d8:6a:87:b9:9d:c1: f7:c4:99:d2:64:88:ab:9d:20:e3:59:15:13:bf:c4:e1: 00:89:e6:5a:eb:9c:9d:5c:7a:ee:15:5d:b2:2a:0e:ef: fc:fa:f6:14:2c:1c:d3:de:26:9a:4e:1c:db:4c:ad:15: 92:89:17:4a:55:db:4a:79:1e:1c:55:34:9e:4c:63:19: 86:54:98:e1:28:0d:be:6e:21:bb:c6:61:a0:ab:9d:b9: 7e:e3:c7:e1:72:25:ee:c1:38:55:e4:f3:6a:64:2a:07: 8a:98:eb:7a:82:33:3d:06:f9:99:25:22:5a:3c:b6:f0: fa:22:63:67:4c:52:3e:30:48:ad:80:df:c4:b9:8c:22: d3:14:88:74:1d:ba:7d:de:b1:3c:8d:7f:3a:1e:3c:6c: fd:87:31:fe:73:34:92:9c:ee:fa:95:0b:33:6a:7f:d6: 07:89:22:53:27:34:d4:6c:9f:c3:7b:e4:73:a7:9a:bb: 79:ac:6f:9c:66:5f:80:a2:a6:11:56:c8:07:34:77:ec: 74:a6:be:5b:b2:3b:fc:af:5e:8f:29:2a:60:97:29:a6 Fingerprint (SHA-256): 67:6C:05:3A:A3:32:97:7A:4F:03:FE:5E:71:5E:E3:55:1D:35:BE:87:13:A7:60:BB:36:01:02:16:29:93:8A:AE Fingerprint (SHA1): C3:D0:CD:07:06:3A:79:61:CB:15:51:A5:DB:61:E8:C5:56:90:B3:C8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #12896: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202109 (0x195811bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Mon Apr 25 20:57:56 2016 Not After : Sun Apr 25 20:57:56 2066 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:2e:0c:df:22:34:5f:db:d5:05:4d:be:b7:18:a2:32: 81:00:f9:e5:51:a0:0f:76:49:7e:51:33:a7:78:55:7f: 6b:81:98:35:f3:62:57:ab:e0:78:d4:96:32:e5:65:e1: 5a:c1:50:5b:e9:6e:e7:3c:6a:62:23:13:88:0a:c6:99: 70:5b:7f:35:09:6f:da:4a:23:85:11:34:6e:93:fd:ee: f8:ca:8b:f1:93:9d:3d:10:f7:6c:93:64:f4:56:5f:18: 7d:61:a9:56:f6:b7:7b:33:4d:d1:7a:df:0a:da:aa:0a: a9:fd:2e:e0:df:c7:da:68:88:20:4e:e2:f2:76:9c:b4: 8b:48:5d:da:54:41:43:82:3a:79:e9:1a:c5:b2:a9:aa: 64:ef:3b:f0:57:aa:14:1e:39:37:af:fc:5d:a3:27:eb: d4:28:52:71:5d:54:5d:07:23:3e:37:f7:e5:2f:dc:90: 8a:a6:96:70:9b:fd:1c:45:aa:2d:e8:d5:7d:db:f0:67: 8b:b1:a9:63:bc:aa:f0:d8:65:bc:52:e5:fd:de:8a:98: 15:15:9c:6a:25:65:08:d7:7b:2d:01:c5:91:4a:4a:2f: 68:16:1d:52:34:bd:ac:f2:f2:83:37:7b:f6:47:b5:eb: 2a:43:46:13:f8:94:62:39:3b:e0:5f:0a:54:39:28:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:da:69:9c:0e:a5:d9:54:58:09:c8:88:9f:9e:f2:d7: 72:c5:87:e4:68:d6:ff:28:68:5b:46:bc:ea:96:23:21: 63:2f:8f:a3:72:63:37:38:9e:9f:91:45:f2:58:4f:5c: 08:ca:29:d2:96:70:cb:9f:b2:92:2c:59:18:5b:96:b2: 9f:cb:9c:69:39:68:b2:dc:ac:b9:40:be:89:75:23:71: 75:56:07:fa:5a:d9:b3:ba:4f:af:2d:50:ca:eb:73:50: b4:37:c3:8e:fc:c1:d5:89:6a:3d:8c:c8:33:8d:88:3f: 52:ff:cc:2c:dd:e2:78:b5:6c:b1:cc:e0:9c:0b:56:12: 8d:71:f8:f7:d1:38:53:87:16:aa:98:69:7a:ec:cd:6b: 80:67:39:42:cc:a3:ab:d7:8d:37:5b:71:2c:73:6b:bb: 7e:74:37:2f:08:3f:f3:48:fa:4c:8d:cd:b7:42:a2:aa: 02:ef:ea:df:34:58:ae:05:9b:76:8c:0c:fb:c9:55:25: db:06:bd:2d:ac:65:6d:c3:a2:61:b2:ae:f7:8d:60:8d: f0:a7:5e:64:f3:68:b6:90:8f:cb:a7:10:f6:91:5a:84: a3:9f:aa:10:39:c2:a5:01:66:3f:7d:a6:24:ba:33:a7: 88:34:68:70:df:4b:56:a6:82:a3:b5:b8:8f:27:82:94 Fingerprint (SHA-256): C3:95:4D:3A:DB:19:17:C0:71:7F:E7:FE:15:D8:5B:22:51:C1:7B:62:1E:48:AB:9C:26:56:8D:5B:0D:AD:A8:C6 Fingerprint (SHA1): 19:37:0F:52:B7:F1:A7:E2:27:E4:3D:8C:2C:09:2E:D3:48:2E:31:1B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #12897: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12898: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202124 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12899: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12900: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12901: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12902: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202125 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12903: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12904: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12905: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12906: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202126 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12907: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12908: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #12909: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12910: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425202127 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12911: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12912: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12913: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202124 (0x195811cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:59:51 2016 Not After : Sun Apr 25 20:59:51 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:42:5b:0b:ec:d1:99:ac:11:99:c7:48:46:c3:d8:6d: f8:19:78:e5:76:1d:29:45:6e:2d:39:d9:9a:7f:be:f3: c8:9a:eb:fe:ff:04:77:7d:bc:4f:8c:11:e8:70:1f:b0: f6:fb:f5:7f:f5:9d:bb:15:89:be:51:c0:ce:f3:1b:08: 8c:f5:b3:f7:82:04:de:a8:23:0a:9c:41:c8:36:4d:68: 84:3a:bc:9a:56:81:fd:b7:3f:94:a6:22:dc:d5:21:bd: bc:76:c4:0a:91:98:71:d6:7a:26:77:b8:f6:5f:0e:1f: 15:52:87:9b:66:b7:3d:13:dc:b9:73:86:56:05:0f:fe: 08:75:f2:a4:2f:c6:be:e6:d7:5c:66:6c:96:fe:fb:df: f9:f6:9c:97:22:2d:88:f2:0c:c1:b6:f4:41:af:d4:01: 98:81:3e:b4:f5:a3:dd:3b:03:f0:d3:f2:cb:34:6e:17: 35:f4:d4:e1:78:21:d2:a1:28:5c:9d:86:2d:1b:ea:ce: 78:70:53:c0:11:72:89:e3:5c:cd:6f:19:13:9e:02:35: 40:6b:3f:45:10:00:b8:a3:37:5f:41:3f:18:26:bf:fc: d7:a4:f8:62:12:88:b4:86:92:a3:12:78:97:68:6f:47: 38:5b:54:3a:d0:50:1b:0a:79:6a:6d:c4:4a:85:93:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:a2:f7:e7:7c:46:18:d9:c3:17:a8:27:81:a8:a9:bc: d2:e7:f4:b0:2c:90:d3:a6:8f:e6:34:54:5e:43:b9:d4: f2:fd:82:48:b2:9d:ef:53:25:39:de:3f:39:91:40:f9: f2:8c:4d:f5:81:80:cc:3d:44:61:ef:eb:31:a7:bb:79: 11:c8:cb:21:75:d9:1e:f7:3d:82:41:99:e7:a1:e1:22: f9:de:42:5d:7e:94:01:a0:f1:05:5b:8c:d9:ca:c0:5f: 7a:d9:73:e1:a4:00:7d:02:a5:72:bb:8f:b4:69:10:dc: 9a:f5:81:3f:ea:06:22:af:10:36:fe:a6:b5:34:4a:9a: a6:8c:a5:10:4b:66:34:71:50:00:a5:08:b1:20:4c:9d: 03:c6:26:8b:87:68:f9:55:99:53:3b:d6:c6:27:cc:4e: b9:20:28:9d:2f:72:e1:8d:c4:07:34:34:ae:b8:ec:3a: f0:5e:63:11:82:39:b9:d6:c4:e5:74:dd:dd:32:4d:54: 27:c3:41:26:39:07:b1:33:2f:b9:25:67:8a:00:be:b4: 51:ba:78:2d:65:c1:88:af:5b:3e:2a:74:7b:18:4c:db: ef:e6:9a:d9:c5:5e:9d:d7:f9:51:19:27:52:0c:e5:f8: 71:88:27:ab:79:c4:be:ea:05:d3:1e:29:3c:e7:ae:87 Fingerprint (SHA-256): 65:17:28:FC:7B:A4:8F:95:5D:CB:F4:2B:4E:39:19:F7:35:7E:AC:B7:84:F2:BB:D2:7A:48:14:93:5A:9B:70:C7 Fingerprint (SHA1): 85:D1:92:B9:AF:9A:30:ED:DB:59:2A:52:0A:71:2C:B7:79:E3:D4:FD Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12914: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12915: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202125 (0x195811cd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:00:21 2016 Not After : Sun Apr 25 21:00:21 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:c5:fd:76:b2:ce:78:94:5a:63:f8:70:fc:26:cf:89: 38:25:3e:49:66:88:dc:af:5c:3f:45:a2:ba:fb:b2:3f: 36:7a:57:20:af:c6:a6:b6:d5:3a:a2:8f:fb:ef:98:f0: 85:cc:34:7b:b1:56:89:a2:26:bf:a5:e4:ed:3f:3e:1e: a7:bb:d9:05:ce:a6:24:5c:60:d6:43:51:00:3a:0a:af: 39:b9:6e:79:89:2c:cc:e0:d1:c5:35:62:6f:d8:dc:eb: cf:b5:1d:c5:ed:9c:84:93:8d:7e:07:13:0b:39:d3:00: e1:5b:5a:ae:f4:99:7c:60:a1:e5:64:d4:27:5b:77:94: 8e:b2:be:fa:f8:87:9b:47:3f:81:a1:28:4f:70:6f:41: 3f:a5:2f:e2:cc:a6:00:71:36:b7:61:74:96:be:f2:19: b8:83:86:ba:24:15:cf:26:e4:1a:a2:fa:07:7c:a6:9e: 4d:1b:f7:06:d0:c2:6f:21:5e:0f:75:b9:84:4a:bc:91: ab:fb:88:b1:46:e0:8a:78:7f:a5:05:25:bd:ff:2d:ad: e2:fe:0f:a7:de:a9:d3:11:56:b9:72:ef:33:4b:47:e4: 0b:99:70:c0:5e:8b:34:9e:e7:2f:aa:e0:41:95:d7:10: ef:53:43:73:4a:3e:06:70:f4:9a:a1:69:79:7d:32:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:89:56:6b:c6:b4:11:53:72:7f:f5:3e:c2:61:a1:da: 8b:b2:01:8a:4e:d9:94:f5:06:da:a3:4d:fc:8b:ab:81: cc:e3:b5:d2:8d:3d:4f:08:75:02:bd:2c:57:ae:f5:24: 87:5a:e1:ff:c3:1b:4f:ca:b7:ea:99:9f:44:03:70:c4: 94:46:e5:c7:18:1e:70:bd:4f:1b:82:84:ff:31:d6:23: 98:ea:45:82:e1:d0:47:47:cb:27:16:37:c1:c5:2e:8a: 0f:bb:7c:41:25:91:d3:97:72:63:c0:9f:17:53:d0:6f: eb:ea:9f:6f:42:4f:b9:fd:ed:6c:74:37:df:fa:75:83: a3:1f:54:a9:7a:f0:a4:d1:fc:09:0b:8e:97:a7:36:89: 70:cb:6e:19:ef:88:a4:a2:29:e7:8a:d5:b3:fd:5f:75: 7e:47:09:d9:43:87:37:4d:96:fe:98:3b:2e:f7:82:ae: 2f:de:b0:d7:79:6b:99:fe:25:3f:9f:43:8e:6d:45:72: 04:e3:18:70:d1:eb:fc:a1:6b:42:33:f0:62:94:af:51: 0f:b3:10:a3:10:e9:11:db:c4:7e:2f:79:d5:db:3b:1e: 67:8d:f3:2e:e1:c0:46:74:aa:e2:27:72:fd:19:91:d8: bc:e7:86:ce:1c:ea:de:2c:e2:08:3b:22:db:a7:4c:fb Fingerprint (SHA-256): F4:A7:6E:1C:F2:DE:6C:F5:08:CA:90:34:99:0F:4F:E1:E1:AF:26:7C:BA:24:05:B0:A0:C9:21:AE:9B:A3:53:34 Fingerprint (SHA1): 2E:74:0D:7C:EB:CB:13:7E:F5:6B:16:43:19:D4:9E:1B:51:52:03:32 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12916: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12917: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202126 (0x195811ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:00:45 2016 Not After : Sun Apr 25 21:00:45 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:19:34:b1:b9:25:85:ca:90:84:97:60:8b:51:98:d2: 81:6b:91:b2:23:c5:e1:51:1a:54:98:29:47:50:de:bb: 7f:29:8c:b1:44:15:25:05:91:99:b1:3e:f8:70:9e:5f: 65:bb:b7:a5:d0:51:92:b3:93:a7:34:59:ad:0e:c8:13: e7:3b:ac:c6:e6:aa:95:6b:98:55:a9:2e:ac:6b:a8:bf: b0:c0:87:e7:0c:98:33:ef:0e:74:e6:cd:4b:82:e3:b4: f5:c9:75:09:94:11:08:6b:90:4f:df:c5:b1:af:d1:ed: 37:a7:9f:fa:2f:6b:02:44:85:48:99:78:7f:70:9c:35: 00:7d:5a:79:04:f8:a5:73:9a:ad:71:e6:14:c3:e6:bf: d6:7e:76:bc:2e:28:be:ea:99:e0:ee:79:c9:5a:5f:11: 1c:45:89:1e:3f:c1:fc:ae:d8:55:fc:c0:c0:cf:e2:f5: 41:0c:77:49:00:61:eb:a4:b6:e9:7f:b5:0f:22:4a:9e: e8:f5:d6:31:ce:97:fc:08:17:35:78:59:7a:cf:cb:d6: 01:1b:cf:b0:64:9c:98:fb:96:87:b7:f8:03:90:05:f3: 7e:09:92:98:09:e7:39:20:82:46:dd:45:9d:d8:54:6f: 78:cc:73:87:35:a7:46:7b:cd:55:a2:af:02:a1:3e:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:f0:b9:b7:cf:5c:c0:6e:6c:63:ca:48:96:a5:f8:f1: 27:3f:62:bc:1f:ef:a7:38:b5:db:14:11:6b:83:a4:b7: 50:b4:9a:c3:b8:a0:d9:d1:18:8c:ee:8e:b5:5e:47:61: 5c:52:67:dc:91:21:a5:eb:46:42:9c:24:72:61:7b:5d: ff:80:56:32:d1:ae:f6:a8:39:b0:20:cd:84:fb:7e:1e: d0:f4:fd:d0:8c:25:ce:67:01:54:0d:ab:36:98:1e:4f: ae:91:ae:f1:75:76:4c:98:90:20:85:9c:d3:ee:8f:f5: 51:61:01:4f:5d:82:7c:a2:6d:63:19:3e:87:7b:fd:49: d6:af:60:73:aa:a4:40:e2:57:70:57:99:e8:03:33:e3: 7e:17:bc:33:a1:30:5e:8a:79:15:37:05:52:ab:4a:0f: 29:54:0f:29:57:0e:f4:31:4c:1e:aa:12:4c:f5:ab:8c: 8c:ba:52:7c:0f:18:80:d3:5a:d0:30:34:c1:c4:87:d3: 84:64:67:7d:22:4f:18:db:1e:de:36:bd:1e:57:c3:f0: 69:be:9b:e9:5a:4d:b5:3a:ae:48:49:96:31:07:34:0f: 61:80:55:8a:cf:a9:f3:14:8c:fc:16:62:69:5d:aa:10: d7:df:42:ae:58:ac:fe:94:ce:21:82:67:2d:ec:91:35 Fingerprint (SHA-256): 27:57:8C:B1:33:C8:00:65:F0:89:3D:CB:81:0A:3D:BD:4E:DA:EE:F1:75:D1:F0:B8:B9:66:D5:D9:74:6C:1B:AA Fingerprint (SHA1): BE:02:C5:40:1F:2F:EA:FD:65:92:5E:5F:3C:29:5F:58:67:2A:D8:4A Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #12918: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12919: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12920: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #12921: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #12922: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202124 (0x195811cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 20:59:51 2016 Not After : Sun Apr 25 20:59:51 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:42:5b:0b:ec:d1:99:ac:11:99:c7:48:46:c3:d8:6d: f8:19:78:e5:76:1d:29:45:6e:2d:39:d9:9a:7f:be:f3: c8:9a:eb:fe:ff:04:77:7d:bc:4f:8c:11:e8:70:1f:b0: f6:fb:f5:7f:f5:9d:bb:15:89:be:51:c0:ce:f3:1b:08: 8c:f5:b3:f7:82:04:de:a8:23:0a:9c:41:c8:36:4d:68: 84:3a:bc:9a:56:81:fd:b7:3f:94:a6:22:dc:d5:21:bd: bc:76:c4:0a:91:98:71:d6:7a:26:77:b8:f6:5f:0e:1f: 15:52:87:9b:66:b7:3d:13:dc:b9:73:86:56:05:0f:fe: 08:75:f2:a4:2f:c6:be:e6:d7:5c:66:6c:96:fe:fb:df: f9:f6:9c:97:22:2d:88:f2:0c:c1:b6:f4:41:af:d4:01: 98:81:3e:b4:f5:a3:dd:3b:03:f0:d3:f2:cb:34:6e:17: 35:f4:d4:e1:78:21:d2:a1:28:5c:9d:86:2d:1b:ea:ce: 78:70:53:c0:11:72:89:e3:5c:cd:6f:19:13:9e:02:35: 40:6b:3f:45:10:00:b8:a3:37:5f:41:3f:18:26:bf:fc: d7:a4:f8:62:12:88:b4:86:92:a3:12:78:97:68:6f:47: 38:5b:54:3a:d0:50:1b:0a:79:6a:6d:c4:4a:85:93:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:a2:f7:e7:7c:46:18:d9:c3:17:a8:27:81:a8:a9:bc: d2:e7:f4:b0:2c:90:d3:a6:8f:e6:34:54:5e:43:b9:d4: f2:fd:82:48:b2:9d:ef:53:25:39:de:3f:39:91:40:f9: f2:8c:4d:f5:81:80:cc:3d:44:61:ef:eb:31:a7:bb:79: 11:c8:cb:21:75:d9:1e:f7:3d:82:41:99:e7:a1:e1:22: f9:de:42:5d:7e:94:01:a0:f1:05:5b:8c:d9:ca:c0:5f: 7a:d9:73:e1:a4:00:7d:02:a5:72:bb:8f:b4:69:10:dc: 9a:f5:81:3f:ea:06:22:af:10:36:fe:a6:b5:34:4a:9a: a6:8c:a5:10:4b:66:34:71:50:00:a5:08:b1:20:4c:9d: 03:c6:26:8b:87:68:f9:55:99:53:3b:d6:c6:27:cc:4e: b9:20:28:9d:2f:72:e1:8d:c4:07:34:34:ae:b8:ec:3a: f0:5e:63:11:82:39:b9:d6:c4:e5:74:dd:dd:32:4d:54: 27:c3:41:26:39:07:b1:33:2f:b9:25:67:8a:00:be:b4: 51:ba:78:2d:65:c1:88:af:5b:3e:2a:74:7b:18:4c:db: ef:e6:9a:d9:c5:5e:9d:d7:f9:51:19:27:52:0c:e5:f8: 71:88:27:ab:79:c4:be:ea:05:d3:1e:29:3c:e7:ae:87 Fingerprint (SHA-256): 65:17:28:FC:7B:A4:8F:95:5D:CB:F4:2B:4E:39:19:F7:35:7E:AC:B7:84:F2:BB:D2:7A:48:14:93:5A:9B:70:C7 Fingerprint (SHA1): 85:D1:92:B9:AF:9A:30:ED:DB:59:2A:52:0A:71:2C:B7:79:E3:D4:FD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12923: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12924: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202125 (0x195811cd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:00:21 2016 Not After : Sun Apr 25 21:00:21 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:c5:fd:76:b2:ce:78:94:5a:63:f8:70:fc:26:cf:89: 38:25:3e:49:66:88:dc:af:5c:3f:45:a2:ba:fb:b2:3f: 36:7a:57:20:af:c6:a6:b6:d5:3a:a2:8f:fb:ef:98:f0: 85:cc:34:7b:b1:56:89:a2:26:bf:a5:e4:ed:3f:3e:1e: a7:bb:d9:05:ce:a6:24:5c:60:d6:43:51:00:3a:0a:af: 39:b9:6e:79:89:2c:cc:e0:d1:c5:35:62:6f:d8:dc:eb: cf:b5:1d:c5:ed:9c:84:93:8d:7e:07:13:0b:39:d3:00: e1:5b:5a:ae:f4:99:7c:60:a1:e5:64:d4:27:5b:77:94: 8e:b2:be:fa:f8:87:9b:47:3f:81:a1:28:4f:70:6f:41: 3f:a5:2f:e2:cc:a6:00:71:36:b7:61:74:96:be:f2:19: b8:83:86:ba:24:15:cf:26:e4:1a:a2:fa:07:7c:a6:9e: 4d:1b:f7:06:d0:c2:6f:21:5e:0f:75:b9:84:4a:bc:91: ab:fb:88:b1:46:e0:8a:78:7f:a5:05:25:bd:ff:2d:ad: e2:fe:0f:a7:de:a9:d3:11:56:b9:72:ef:33:4b:47:e4: 0b:99:70:c0:5e:8b:34:9e:e7:2f:aa:e0:41:95:d7:10: ef:53:43:73:4a:3e:06:70:f4:9a:a1:69:79:7d:32:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:89:56:6b:c6:b4:11:53:72:7f:f5:3e:c2:61:a1:da: 8b:b2:01:8a:4e:d9:94:f5:06:da:a3:4d:fc:8b:ab:81: cc:e3:b5:d2:8d:3d:4f:08:75:02:bd:2c:57:ae:f5:24: 87:5a:e1:ff:c3:1b:4f:ca:b7:ea:99:9f:44:03:70:c4: 94:46:e5:c7:18:1e:70:bd:4f:1b:82:84:ff:31:d6:23: 98:ea:45:82:e1:d0:47:47:cb:27:16:37:c1:c5:2e:8a: 0f:bb:7c:41:25:91:d3:97:72:63:c0:9f:17:53:d0:6f: eb:ea:9f:6f:42:4f:b9:fd:ed:6c:74:37:df:fa:75:83: a3:1f:54:a9:7a:f0:a4:d1:fc:09:0b:8e:97:a7:36:89: 70:cb:6e:19:ef:88:a4:a2:29:e7:8a:d5:b3:fd:5f:75: 7e:47:09:d9:43:87:37:4d:96:fe:98:3b:2e:f7:82:ae: 2f:de:b0:d7:79:6b:99:fe:25:3f:9f:43:8e:6d:45:72: 04:e3:18:70:d1:eb:fc:a1:6b:42:33:f0:62:94:af:51: 0f:b3:10:a3:10:e9:11:db:c4:7e:2f:79:d5:db:3b:1e: 67:8d:f3:2e:e1:c0:46:74:aa:e2:27:72:fd:19:91:d8: bc:e7:86:ce:1c:ea:de:2c:e2:08:3b:22:db:a7:4c:fb Fingerprint (SHA-256): F4:A7:6E:1C:F2:DE:6C:F5:08:CA:90:34:99:0F:4F:E1:E1:AF:26:7C:BA:24:05:B0:A0:C9:21:AE:9B:A3:53:34 Fingerprint (SHA1): 2E:74:0D:7C:EB:CB:13:7E:F5:6B:16:43:19:D4:9E:1B:51:52:03:32 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12925: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12926: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202126 (0x195811ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:00:45 2016 Not After : Sun Apr 25 21:00:45 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:19:34:b1:b9:25:85:ca:90:84:97:60:8b:51:98:d2: 81:6b:91:b2:23:c5:e1:51:1a:54:98:29:47:50:de:bb: 7f:29:8c:b1:44:15:25:05:91:99:b1:3e:f8:70:9e:5f: 65:bb:b7:a5:d0:51:92:b3:93:a7:34:59:ad:0e:c8:13: e7:3b:ac:c6:e6:aa:95:6b:98:55:a9:2e:ac:6b:a8:bf: b0:c0:87:e7:0c:98:33:ef:0e:74:e6:cd:4b:82:e3:b4: f5:c9:75:09:94:11:08:6b:90:4f:df:c5:b1:af:d1:ed: 37:a7:9f:fa:2f:6b:02:44:85:48:99:78:7f:70:9c:35: 00:7d:5a:79:04:f8:a5:73:9a:ad:71:e6:14:c3:e6:bf: d6:7e:76:bc:2e:28:be:ea:99:e0:ee:79:c9:5a:5f:11: 1c:45:89:1e:3f:c1:fc:ae:d8:55:fc:c0:c0:cf:e2:f5: 41:0c:77:49:00:61:eb:a4:b6:e9:7f:b5:0f:22:4a:9e: e8:f5:d6:31:ce:97:fc:08:17:35:78:59:7a:cf:cb:d6: 01:1b:cf:b0:64:9c:98:fb:96:87:b7:f8:03:90:05:f3: 7e:09:92:98:09:e7:39:20:82:46:dd:45:9d:d8:54:6f: 78:cc:73:87:35:a7:46:7b:cd:55:a2:af:02:a1:3e:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:f0:b9:b7:cf:5c:c0:6e:6c:63:ca:48:96:a5:f8:f1: 27:3f:62:bc:1f:ef:a7:38:b5:db:14:11:6b:83:a4:b7: 50:b4:9a:c3:b8:a0:d9:d1:18:8c:ee:8e:b5:5e:47:61: 5c:52:67:dc:91:21:a5:eb:46:42:9c:24:72:61:7b:5d: ff:80:56:32:d1:ae:f6:a8:39:b0:20:cd:84:fb:7e:1e: d0:f4:fd:d0:8c:25:ce:67:01:54:0d:ab:36:98:1e:4f: ae:91:ae:f1:75:76:4c:98:90:20:85:9c:d3:ee:8f:f5: 51:61:01:4f:5d:82:7c:a2:6d:63:19:3e:87:7b:fd:49: d6:af:60:73:aa:a4:40:e2:57:70:57:99:e8:03:33:e3: 7e:17:bc:33:a1:30:5e:8a:79:15:37:05:52:ab:4a:0f: 29:54:0f:29:57:0e:f4:31:4c:1e:aa:12:4c:f5:ab:8c: 8c:ba:52:7c:0f:18:80:d3:5a:d0:30:34:c1:c4:87:d3: 84:64:67:7d:22:4f:18:db:1e:de:36:bd:1e:57:c3:f0: 69:be:9b:e9:5a:4d:b5:3a:ae:48:49:96:31:07:34:0f: 61:80:55:8a:cf:a9:f3:14:8c:fc:16:62:69:5d:aa:10: d7:df:42:ae:58:ac:fe:94:ce:21:82:67:2d:ec:91:35 Fingerprint (SHA-256): 27:57:8C:B1:33:C8:00:65:F0:89:3D:CB:81:0A:3D:BD:4E:DA:EE:F1:75:D1:F0:B8:B9:66:D5:D9:74:6C:1B:AA Fingerprint (SHA1): BE:02:C5:40:1F:2F:EA:FD:65:92:5E:5F:3C:29:5F:58:67:2A:D8:4A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #12927: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12928: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #12929: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202128 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12930: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #12931: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12932: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12933: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202129 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12934: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12935: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12936: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12937: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202130 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12938: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12939: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #12940: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12941: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425202131 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12942: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12943: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #12944: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12945: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425202132 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12946: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12947: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12948: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202128 (0x195811d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:01:15 2016 Not After : Sun Apr 25 21:01:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:e8:9c:a3:4e:12:b9:22:b6:c0:07:5f:d5:7c:7a:05: a9:ad:9c:da:64:b3:05:ef:4f:dd:a1:c5:17:0d:88:0e: 7d:b0:e2:ca:8c:cf:e3:7f:d3:f7:f5:7d:c9:14:f5:80: bf:04:75:7b:2f:22:88:5a:2d:e7:06:31:a5:e3:dc:a8: db:1d:34:8f:9b:0f:7a:12:9d:31:39:be:03:3d:c2:ea: 8f:ca:7a:8c:0a:18:b8:62:82:07:46:72:72:aa:e2:3b: 90:da:75:1b:58:0b:32:c5:5a:7e:5c:a4:6c:c6:7b:2d: 0a:e6:9f:d3:84:62:75:02:23:9c:8e:96:01:20:f3:3c: 0f:15:20:b4:24:66:06:e8:ae:68:c3:cc:31:2a:ed:9a: 47:5e:bc:2c:3b:79:bc:0b:96:4d:36:4b:c8:55:67:e2: 9e:94:57:f7:65:f4:3d:e6:b5:b4:1e:bd:79:3b:01:0b: f9:0d:df:7f:ae:52:e3:40:0f:6e:d2:d6:b1:5d:61:74: f7:f0:bb:b4:e0:1d:64:86:be:63:68:3b:3a:eb:50:94: 3e:26:59:59:39:dc:fa:8a:00:f2:fa:a7:92:5a:25:83: 7c:59:ba:64:0d:e6:66:36:ef:03:7e:37:07:90:3b:49: 15:12:00:cc:88:f7:00:42:f7:20:46:af:be:33:1b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:32:a8:fc:c3:c3:ba:79:f6:ea:74:ff:4c:74:26:3b: 69:99:70:6a:f1:58:7d:65:64:34:59:e5:dc:4c:0c:23: 5c:71:52:34:5d:0a:fb:e8:06:79:c0:dd:8b:7d:52:aa: 75:ce:8c:e2:b4:0d:da:2e:d0:37:96:a6:ff:e0:13:42: 28:f9:f0:d6:0f:60:48:70:fc:81:5c:3c:fd:82:d5:9f: 61:71:41:1d:e6:0e:1a:df:bb:b6:0a:f2:0e:87:8e:65: ca:a3:40:df:c8:d3:e1:2e:a2:1e:85:1f:d4:07:28:de: 14:e5:12:f4:5b:d7:3d:06:e0:fb:37:59:c2:fa:4f:ea: b1:e4:09:bc:d4:d3:3a:63:a7:28:ff:f1:b9:07:f3:51: 14:69:8c:46:5a:bd:05:e4:a0:56:39:80:53:a5:b1:14: cf:c8:d0:62:bd:d1:96:11:4a:fa:41:e2:9c:cb:b2:e0: 19:93:3c:ec:d8:95:20:e8:d9:de:82:61:4c:9d:ab:05: 00:60:1a:e7:8f:06:02:7b:6b:a4:bd:a8:58:52:6d:4d: 1d:a3:18:ed:cd:00:14:7b:3e:94:1f:d8:eb:ce:15:09: 00:ea:7e:f4:7c:f1:a2:85:d4:d6:60:cd:b1:5f:f9:d0: 21:1d:ce:8c:33:bf:29:e8:ed:bb:24:1d:42:6f:c9:01 Fingerprint (SHA-256): BE:3D:EF:95:BA:A7:68:4F:4A:59:A7:7D:0A:1E:23:06:6E:90:62:1E:7B:07:B0:63:EC:E1:07:F3:53:C2:5E:7C Fingerprint (SHA1): 5E:56:BC:2D:E2:C0:40:83:15:46:FF:6D:09:AD:9A:2C:3E:18:1B:2D Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12949: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12950: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202129 (0x195811d1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:01:22 2016 Not After : Sun Apr 25 21:01:22 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e5:0d:e0:90:16:b1:24:e6:3f:19:6d:f8:3e:b2:85: ae:48:fb:29:d1:d2:e8:65:6b:8d:3f:fc:79:91:4a:5f: d2:b8:33:e0:d0:52:e3:02:2a:b6:55:52:11:42:0c:55: 8a:2d:31:f6:d6:31:b2:8f:e0:80:65:3b:b4:f6:a0:95: 4f:f5:08:e8:04:6f:e7:45:d7:4e:d0:10:1b:d2:81:cd: e0:70:64:78:ab:55:86:c6:07:86:ab:e4:81:96:7b:d1: 01:73:97:87:e1:a3:7f:a7:07:83:37:46:d0:a4:23:fc: 5a:29:0e:84:d9:7f:b6:2d:c7:ad:84:5c:2f:cb:e1:ac: 3b:e7:4f:9d:89:0d:38:85:fa:17:52:6e:c4:ea:37:64: 90:3b:fd:25:46:fa:9f:2f:87:f3:1d:8f:88:51:5e:38: fe:2f:08:f6:0b:6f:ee:68:8f:bc:bb:f2:7b:19:10:be: 57:82:1b:da:3d:fb:cb:92:2c:1a:3f:4a:c3:72:7f:9c: 7e:a4:05:b4:08:9a:18:62:22:e8:8b:d2:36:93:4e:d8: 92:bc:ad:c5:d8:45:3b:28:8b:2c:f7:cb:73:3d:00:fd: 40:b5:00:25:1a:ba:f8:ba:2a:72:1e:48:99:de:0e:05: ca:33:6a:b1:60:05:61:f2:0f:0f:4f:41:9a:0c:44:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:2d:c6:c4:be:56:a6:a3:de:42:8e:78:f2:0b:7c:85: 35:a6:8d:27:28:e1:07:19:a8:c4:e6:a7:df:04:63:c6: c6:8d:3b:3b:8a:77:ea:ac:f7:df:d5:b5:4c:e1:33:87: 8f:ab:cd:b6:20:02:b8:03:33:2e:f3:6f:a5:56:0a:2b: ec:24:c5:4d:9d:d4:46:e7:f7:67:bb:0b:a1:78:5f:89: cd:6f:e8:02:50:90:f8:67:c3:0a:46:36:bd:f0:9f:11: 51:dd:8c:86:72:23:44:76:6c:f7:ef:25:cd:36:60:25: 1c:b3:7c:e9:0f:c0:44:3d:4d:22:f6:2b:59:e6:8e:5c: 5a:81:89:66:2a:fe:b0:22:14:31:e3:36:1f:1d:c5:12: ad:f2:7c:e0:d2:2b:48:46:48:34:f1:94:d0:a9:fd:95: 20:c2:81:a7:1e:b0:d4:e1:29:11:72:f7:e9:6d:97:5e: 41:b8:af:cc:5c:e0:35:19:29:4a:26:1e:38:8d:7f:ec: 73:22:9c:6c:7c:12:22:40:c1:41:2f:2b:9e:18:d1:ab: a1:cb:0c:24:05:55:90:3b:ac:3a:1a:88:46:df:e7:90: 81:96:b0:d8:3d:7b:6f:4e:ca:f9:5f:f0:7a:64:d5:4e: f5:c1:b1:20:de:22:1b:00:26:7d:ed:7a:7f:5a:9f:15 Fingerprint (SHA-256): 71:6C:2A:52:16:EA:72:BF:6E:BE:D3:9D:64:81:47:CC:94:28:E8:F4:93:BE:BD:C3:50:EB:8F:F7:44:1D:05:39 Fingerprint (SHA1): D1:50:1A:BE:51:10:D3:5D:B2:1D:13:F7:77:0D:95:A0:A8:08:B4:C9 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12951: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12952: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202130 (0x195811d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:01:51 2016 Not After : Sun Apr 25 21:01:51 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:55:a5:b2:34:c9:79:ec:39:ed:49:cb:e0:04:d4:e6: 33:e2:d2:e4:9d:25:af:67:67:ab:cf:66:40:47:d3:c8: ba:0b:b3:a9:b2:e8:85:81:20:f8:e5:a8:e7:0a:1b:ee: 39:36:06:9b:14:6b:1c:c9:8c:b1:b3:ab:21:90:c9:e5: 27:5a:0e:ae:5f:64:e0:79:82:d3:14:4a:3c:7b:13:a2: e7:f9:38:03:02:e1:85:d9:0d:b7:f1:df:f0:76:c2:ca: 06:43:11:96:75:da:ed:66:ab:36:25:8b:d2:ba:e1:cc: 97:4b:55:20:d9:01:9c:95:15:b3:15:f0:6e:98:3c:5e: f9:0f:59:ff:d5:4d:3a:80:a2:14:15:c4:96:da:58:3f: 6d:95:48:84:74:de:92:d2:09:ac:5d:5b:46:a2:ea:fa: 18:a1:34:39:03:f2:ad:cc:78:35:9d:db:9b:ad:62:e8: 16:0f:df:51:9f:f9:4e:f4:74:a4:8d:2d:8a:8a:eb:fd: 48:14:75:a3:26:9b:be:36:c6:91:36:f8:d4:8c:f0:62: 18:c4:b5:78:13:ae:06:90:62:67:07:e5:30:7a:e5:90: a4:4f:44:ba:a1:1c:2d:6b:ac:fd:93:f9:68:b7:40:e4: bd:6c:95:92:65:de:8a:b2:92:c3:86:0a:95:1a:65:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:c3:55:64:9d:da:b3:be:48:47:c3:5b:8a:61:e9:d5: d9:de:e9:5a:04:89:55:cf:14:19:15:5d:42:31:8e:bc: f9:bb:6b:27:7a:ad:3c:76:de:4e:e1:dd:bb:fc:b3:0f: b0:03:29:fe:b6:5a:26:12:bf:02:b1:9e:21:e5:ef:90: 04:a6:92:31:db:36:08:df:42:d4:70:25:44:c1:53:12: fc:17:a7:d0:22:b1:53:9f:ed:c4:ea:c3:ed:09:88:eb: 08:b5:80:bb:9d:1d:fa:1b:e7:23:71:09:7e:73:27:05: f1:b8:f5:48:71:83:ee:5f:fa:52:b1:b0:00:d1:31:fe: e7:d0:cb:61:9b:57:32:60:be:a2:d5:1d:06:a4:ac:0f: af:de:0f:a3:0e:fd:2c:a4:00:4c:6e:75:bb:68:a7:43: f9:e1:fa:3d:61:35:f6:7b:90:0b:a9:6f:ed:c9:32:ba: 47:2e:37:e2:a5:84:87:3e:ad:2e:22:9c:f2:bb:52:6c: ab:15:30:0e:82:0e:b1:95:bd:e5:3d:bc:a5:35:f3:e6: 36:62:ea:e3:a0:16:c2:e3:2e:0f:64:f5:48:14:b6:66: 6f:0b:20:a6:c4:f7:4b:bb:65:53:92:d0:c8:16:81:ce: 5d:95:5e:66:11:2d:09:47:5e:f3:73:c2:e6:8b:73:47 Fingerprint (SHA-256): A9:11:7B:CD:7F:00:D5:09:0B:84:88:96:0C:DB:70:38:B8:95:3B:7D:05:F3:8C:00:0C:08:86:4C:45:92:99:E6 Fingerprint (SHA1): 3A:E2:EF:78:38:C0:26:D9:9B:A9:C2:92:03:BB:59:BE:2D:81:09:50 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #12953: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12954: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #12955: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #12956: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #12957: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202128 (0x195811d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:01:15 2016 Not After : Sun Apr 25 21:01:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:e8:9c:a3:4e:12:b9:22:b6:c0:07:5f:d5:7c:7a:05: a9:ad:9c:da:64:b3:05:ef:4f:dd:a1:c5:17:0d:88:0e: 7d:b0:e2:ca:8c:cf:e3:7f:d3:f7:f5:7d:c9:14:f5:80: bf:04:75:7b:2f:22:88:5a:2d:e7:06:31:a5:e3:dc:a8: db:1d:34:8f:9b:0f:7a:12:9d:31:39:be:03:3d:c2:ea: 8f:ca:7a:8c:0a:18:b8:62:82:07:46:72:72:aa:e2:3b: 90:da:75:1b:58:0b:32:c5:5a:7e:5c:a4:6c:c6:7b:2d: 0a:e6:9f:d3:84:62:75:02:23:9c:8e:96:01:20:f3:3c: 0f:15:20:b4:24:66:06:e8:ae:68:c3:cc:31:2a:ed:9a: 47:5e:bc:2c:3b:79:bc:0b:96:4d:36:4b:c8:55:67:e2: 9e:94:57:f7:65:f4:3d:e6:b5:b4:1e:bd:79:3b:01:0b: f9:0d:df:7f:ae:52:e3:40:0f:6e:d2:d6:b1:5d:61:74: f7:f0:bb:b4:e0:1d:64:86:be:63:68:3b:3a:eb:50:94: 3e:26:59:59:39:dc:fa:8a:00:f2:fa:a7:92:5a:25:83: 7c:59:ba:64:0d:e6:66:36:ef:03:7e:37:07:90:3b:49: 15:12:00:cc:88:f7:00:42:f7:20:46:af:be:33:1b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:32:a8:fc:c3:c3:ba:79:f6:ea:74:ff:4c:74:26:3b: 69:99:70:6a:f1:58:7d:65:64:34:59:e5:dc:4c:0c:23: 5c:71:52:34:5d:0a:fb:e8:06:79:c0:dd:8b:7d:52:aa: 75:ce:8c:e2:b4:0d:da:2e:d0:37:96:a6:ff:e0:13:42: 28:f9:f0:d6:0f:60:48:70:fc:81:5c:3c:fd:82:d5:9f: 61:71:41:1d:e6:0e:1a:df:bb:b6:0a:f2:0e:87:8e:65: ca:a3:40:df:c8:d3:e1:2e:a2:1e:85:1f:d4:07:28:de: 14:e5:12:f4:5b:d7:3d:06:e0:fb:37:59:c2:fa:4f:ea: b1:e4:09:bc:d4:d3:3a:63:a7:28:ff:f1:b9:07:f3:51: 14:69:8c:46:5a:bd:05:e4:a0:56:39:80:53:a5:b1:14: cf:c8:d0:62:bd:d1:96:11:4a:fa:41:e2:9c:cb:b2:e0: 19:93:3c:ec:d8:95:20:e8:d9:de:82:61:4c:9d:ab:05: 00:60:1a:e7:8f:06:02:7b:6b:a4:bd:a8:58:52:6d:4d: 1d:a3:18:ed:cd:00:14:7b:3e:94:1f:d8:eb:ce:15:09: 00:ea:7e:f4:7c:f1:a2:85:d4:d6:60:cd:b1:5f:f9:d0: 21:1d:ce:8c:33:bf:29:e8:ed:bb:24:1d:42:6f:c9:01 Fingerprint (SHA-256): BE:3D:EF:95:BA:A7:68:4F:4A:59:A7:7D:0A:1E:23:06:6E:90:62:1E:7B:07:B0:63:EC:E1:07:F3:53:C2:5E:7C Fingerprint (SHA1): 5E:56:BC:2D:E2:C0:40:83:15:46:FF:6D:09:AD:9A:2C:3E:18:1B:2D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12958: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12959: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202129 (0x195811d1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:01:22 2016 Not After : Sun Apr 25 21:01:22 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e5:0d:e0:90:16:b1:24:e6:3f:19:6d:f8:3e:b2:85: ae:48:fb:29:d1:d2:e8:65:6b:8d:3f:fc:79:91:4a:5f: d2:b8:33:e0:d0:52:e3:02:2a:b6:55:52:11:42:0c:55: 8a:2d:31:f6:d6:31:b2:8f:e0:80:65:3b:b4:f6:a0:95: 4f:f5:08:e8:04:6f:e7:45:d7:4e:d0:10:1b:d2:81:cd: e0:70:64:78:ab:55:86:c6:07:86:ab:e4:81:96:7b:d1: 01:73:97:87:e1:a3:7f:a7:07:83:37:46:d0:a4:23:fc: 5a:29:0e:84:d9:7f:b6:2d:c7:ad:84:5c:2f:cb:e1:ac: 3b:e7:4f:9d:89:0d:38:85:fa:17:52:6e:c4:ea:37:64: 90:3b:fd:25:46:fa:9f:2f:87:f3:1d:8f:88:51:5e:38: fe:2f:08:f6:0b:6f:ee:68:8f:bc:bb:f2:7b:19:10:be: 57:82:1b:da:3d:fb:cb:92:2c:1a:3f:4a:c3:72:7f:9c: 7e:a4:05:b4:08:9a:18:62:22:e8:8b:d2:36:93:4e:d8: 92:bc:ad:c5:d8:45:3b:28:8b:2c:f7:cb:73:3d:00:fd: 40:b5:00:25:1a:ba:f8:ba:2a:72:1e:48:99:de:0e:05: ca:33:6a:b1:60:05:61:f2:0f:0f:4f:41:9a:0c:44:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:2d:c6:c4:be:56:a6:a3:de:42:8e:78:f2:0b:7c:85: 35:a6:8d:27:28:e1:07:19:a8:c4:e6:a7:df:04:63:c6: c6:8d:3b:3b:8a:77:ea:ac:f7:df:d5:b5:4c:e1:33:87: 8f:ab:cd:b6:20:02:b8:03:33:2e:f3:6f:a5:56:0a:2b: ec:24:c5:4d:9d:d4:46:e7:f7:67:bb:0b:a1:78:5f:89: cd:6f:e8:02:50:90:f8:67:c3:0a:46:36:bd:f0:9f:11: 51:dd:8c:86:72:23:44:76:6c:f7:ef:25:cd:36:60:25: 1c:b3:7c:e9:0f:c0:44:3d:4d:22:f6:2b:59:e6:8e:5c: 5a:81:89:66:2a:fe:b0:22:14:31:e3:36:1f:1d:c5:12: ad:f2:7c:e0:d2:2b:48:46:48:34:f1:94:d0:a9:fd:95: 20:c2:81:a7:1e:b0:d4:e1:29:11:72:f7:e9:6d:97:5e: 41:b8:af:cc:5c:e0:35:19:29:4a:26:1e:38:8d:7f:ec: 73:22:9c:6c:7c:12:22:40:c1:41:2f:2b:9e:18:d1:ab: a1:cb:0c:24:05:55:90:3b:ac:3a:1a:88:46:df:e7:90: 81:96:b0:d8:3d:7b:6f:4e:ca:f9:5f:f0:7a:64:d5:4e: f5:c1:b1:20:de:22:1b:00:26:7d:ed:7a:7f:5a:9f:15 Fingerprint (SHA-256): 71:6C:2A:52:16:EA:72:BF:6E:BE:D3:9D:64:81:47:CC:94:28:E8:F4:93:BE:BD:C3:50:EB:8F:F7:44:1D:05:39 Fingerprint (SHA1): D1:50:1A:BE:51:10:D3:5D:B2:1D:13:F7:77:0D:95:A0:A8:08:B4:C9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12960: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12961: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202130 (0x195811d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:01:51 2016 Not After : Sun Apr 25 21:01:51 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:55:a5:b2:34:c9:79:ec:39:ed:49:cb:e0:04:d4:e6: 33:e2:d2:e4:9d:25:af:67:67:ab:cf:66:40:47:d3:c8: ba:0b:b3:a9:b2:e8:85:81:20:f8:e5:a8:e7:0a:1b:ee: 39:36:06:9b:14:6b:1c:c9:8c:b1:b3:ab:21:90:c9:e5: 27:5a:0e:ae:5f:64:e0:79:82:d3:14:4a:3c:7b:13:a2: e7:f9:38:03:02:e1:85:d9:0d:b7:f1:df:f0:76:c2:ca: 06:43:11:96:75:da:ed:66:ab:36:25:8b:d2:ba:e1:cc: 97:4b:55:20:d9:01:9c:95:15:b3:15:f0:6e:98:3c:5e: f9:0f:59:ff:d5:4d:3a:80:a2:14:15:c4:96:da:58:3f: 6d:95:48:84:74:de:92:d2:09:ac:5d:5b:46:a2:ea:fa: 18:a1:34:39:03:f2:ad:cc:78:35:9d:db:9b:ad:62:e8: 16:0f:df:51:9f:f9:4e:f4:74:a4:8d:2d:8a:8a:eb:fd: 48:14:75:a3:26:9b:be:36:c6:91:36:f8:d4:8c:f0:62: 18:c4:b5:78:13:ae:06:90:62:67:07:e5:30:7a:e5:90: a4:4f:44:ba:a1:1c:2d:6b:ac:fd:93:f9:68:b7:40:e4: bd:6c:95:92:65:de:8a:b2:92:c3:86:0a:95:1a:65:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:c3:55:64:9d:da:b3:be:48:47:c3:5b:8a:61:e9:d5: d9:de:e9:5a:04:89:55:cf:14:19:15:5d:42:31:8e:bc: f9:bb:6b:27:7a:ad:3c:76:de:4e:e1:dd:bb:fc:b3:0f: b0:03:29:fe:b6:5a:26:12:bf:02:b1:9e:21:e5:ef:90: 04:a6:92:31:db:36:08:df:42:d4:70:25:44:c1:53:12: fc:17:a7:d0:22:b1:53:9f:ed:c4:ea:c3:ed:09:88:eb: 08:b5:80:bb:9d:1d:fa:1b:e7:23:71:09:7e:73:27:05: f1:b8:f5:48:71:83:ee:5f:fa:52:b1:b0:00:d1:31:fe: e7:d0:cb:61:9b:57:32:60:be:a2:d5:1d:06:a4:ac:0f: af:de:0f:a3:0e:fd:2c:a4:00:4c:6e:75:bb:68:a7:43: f9:e1:fa:3d:61:35:f6:7b:90:0b:a9:6f:ed:c9:32:ba: 47:2e:37:e2:a5:84:87:3e:ad:2e:22:9c:f2:bb:52:6c: ab:15:30:0e:82:0e:b1:95:bd:e5:3d:bc:a5:35:f3:e6: 36:62:ea:e3:a0:16:c2:e3:2e:0f:64:f5:48:14:b6:66: 6f:0b:20:a6:c4:f7:4b:bb:65:53:92:d0:c8:16:81:ce: 5d:95:5e:66:11:2d:09:47:5e:f3:73:c2:e6:8b:73:47 Fingerprint (SHA-256): A9:11:7B:CD:7F:00:D5:09:0B:84:88:96:0C:DB:70:38:B8:95:3B:7D:05:F3:8C:00:0C:08:86:4C:45:92:99:E6 Fingerprint (SHA1): 3A:E2:EF:78:38:C0:26:D9:9B:A9:C2:92:03:BB:59:BE:2D:81:09:50 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #12962: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #12963: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202128 (0x195811d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:01:15 2016 Not After : Sun Apr 25 21:01:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:e8:9c:a3:4e:12:b9:22:b6:c0:07:5f:d5:7c:7a:05: a9:ad:9c:da:64:b3:05:ef:4f:dd:a1:c5:17:0d:88:0e: 7d:b0:e2:ca:8c:cf:e3:7f:d3:f7:f5:7d:c9:14:f5:80: bf:04:75:7b:2f:22:88:5a:2d:e7:06:31:a5:e3:dc:a8: db:1d:34:8f:9b:0f:7a:12:9d:31:39:be:03:3d:c2:ea: 8f:ca:7a:8c:0a:18:b8:62:82:07:46:72:72:aa:e2:3b: 90:da:75:1b:58:0b:32:c5:5a:7e:5c:a4:6c:c6:7b:2d: 0a:e6:9f:d3:84:62:75:02:23:9c:8e:96:01:20:f3:3c: 0f:15:20:b4:24:66:06:e8:ae:68:c3:cc:31:2a:ed:9a: 47:5e:bc:2c:3b:79:bc:0b:96:4d:36:4b:c8:55:67:e2: 9e:94:57:f7:65:f4:3d:e6:b5:b4:1e:bd:79:3b:01:0b: f9:0d:df:7f:ae:52:e3:40:0f:6e:d2:d6:b1:5d:61:74: f7:f0:bb:b4:e0:1d:64:86:be:63:68:3b:3a:eb:50:94: 3e:26:59:59:39:dc:fa:8a:00:f2:fa:a7:92:5a:25:83: 7c:59:ba:64:0d:e6:66:36:ef:03:7e:37:07:90:3b:49: 15:12:00:cc:88:f7:00:42:f7:20:46:af:be:33:1b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:32:a8:fc:c3:c3:ba:79:f6:ea:74:ff:4c:74:26:3b: 69:99:70:6a:f1:58:7d:65:64:34:59:e5:dc:4c:0c:23: 5c:71:52:34:5d:0a:fb:e8:06:79:c0:dd:8b:7d:52:aa: 75:ce:8c:e2:b4:0d:da:2e:d0:37:96:a6:ff:e0:13:42: 28:f9:f0:d6:0f:60:48:70:fc:81:5c:3c:fd:82:d5:9f: 61:71:41:1d:e6:0e:1a:df:bb:b6:0a:f2:0e:87:8e:65: ca:a3:40:df:c8:d3:e1:2e:a2:1e:85:1f:d4:07:28:de: 14:e5:12:f4:5b:d7:3d:06:e0:fb:37:59:c2:fa:4f:ea: b1:e4:09:bc:d4:d3:3a:63:a7:28:ff:f1:b9:07:f3:51: 14:69:8c:46:5a:bd:05:e4:a0:56:39:80:53:a5:b1:14: cf:c8:d0:62:bd:d1:96:11:4a:fa:41:e2:9c:cb:b2:e0: 19:93:3c:ec:d8:95:20:e8:d9:de:82:61:4c:9d:ab:05: 00:60:1a:e7:8f:06:02:7b:6b:a4:bd:a8:58:52:6d:4d: 1d:a3:18:ed:cd:00:14:7b:3e:94:1f:d8:eb:ce:15:09: 00:ea:7e:f4:7c:f1:a2:85:d4:d6:60:cd:b1:5f:f9:d0: 21:1d:ce:8c:33:bf:29:e8:ed:bb:24:1d:42:6f:c9:01 Fingerprint (SHA-256): BE:3D:EF:95:BA:A7:68:4F:4A:59:A7:7D:0A:1E:23:06:6E:90:62:1E:7B:07:B0:63:EC:E1:07:F3:53:C2:5E:7C Fingerprint (SHA1): 5E:56:BC:2D:E2:C0:40:83:15:46:FF:6D:09:AD:9A:2C:3E:18:1B:2D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12964: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202128 (0x195811d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:01:15 2016 Not After : Sun Apr 25 21:01:15 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:e8:9c:a3:4e:12:b9:22:b6:c0:07:5f:d5:7c:7a:05: a9:ad:9c:da:64:b3:05:ef:4f:dd:a1:c5:17:0d:88:0e: 7d:b0:e2:ca:8c:cf:e3:7f:d3:f7:f5:7d:c9:14:f5:80: bf:04:75:7b:2f:22:88:5a:2d:e7:06:31:a5:e3:dc:a8: db:1d:34:8f:9b:0f:7a:12:9d:31:39:be:03:3d:c2:ea: 8f:ca:7a:8c:0a:18:b8:62:82:07:46:72:72:aa:e2:3b: 90:da:75:1b:58:0b:32:c5:5a:7e:5c:a4:6c:c6:7b:2d: 0a:e6:9f:d3:84:62:75:02:23:9c:8e:96:01:20:f3:3c: 0f:15:20:b4:24:66:06:e8:ae:68:c3:cc:31:2a:ed:9a: 47:5e:bc:2c:3b:79:bc:0b:96:4d:36:4b:c8:55:67:e2: 9e:94:57:f7:65:f4:3d:e6:b5:b4:1e:bd:79:3b:01:0b: f9:0d:df:7f:ae:52:e3:40:0f:6e:d2:d6:b1:5d:61:74: f7:f0:bb:b4:e0:1d:64:86:be:63:68:3b:3a:eb:50:94: 3e:26:59:59:39:dc:fa:8a:00:f2:fa:a7:92:5a:25:83: 7c:59:ba:64:0d:e6:66:36:ef:03:7e:37:07:90:3b:49: 15:12:00:cc:88:f7:00:42:f7:20:46:af:be:33:1b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:32:a8:fc:c3:c3:ba:79:f6:ea:74:ff:4c:74:26:3b: 69:99:70:6a:f1:58:7d:65:64:34:59:e5:dc:4c:0c:23: 5c:71:52:34:5d:0a:fb:e8:06:79:c0:dd:8b:7d:52:aa: 75:ce:8c:e2:b4:0d:da:2e:d0:37:96:a6:ff:e0:13:42: 28:f9:f0:d6:0f:60:48:70:fc:81:5c:3c:fd:82:d5:9f: 61:71:41:1d:e6:0e:1a:df:bb:b6:0a:f2:0e:87:8e:65: ca:a3:40:df:c8:d3:e1:2e:a2:1e:85:1f:d4:07:28:de: 14:e5:12:f4:5b:d7:3d:06:e0:fb:37:59:c2:fa:4f:ea: b1:e4:09:bc:d4:d3:3a:63:a7:28:ff:f1:b9:07:f3:51: 14:69:8c:46:5a:bd:05:e4:a0:56:39:80:53:a5:b1:14: cf:c8:d0:62:bd:d1:96:11:4a:fa:41:e2:9c:cb:b2:e0: 19:93:3c:ec:d8:95:20:e8:d9:de:82:61:4c:9d:ab:05: 00:60:1a:e7:8f:06:02:7b:6b:a4:bd:a8:58:52:6d:4d: 1d:a3:18:ed:cd:00:14:7b:3e:94:1f:d8:eb:ce:15:09: 00:ea:7e:f4:7c:f1:a2:85:d4:d6:60:cd:b1:5f:f9:d0: 21:1d:ce:8c:33:bf:29:e8:ed:bb:24:1d:42:6f:c9:01 Fingerprint (SHA-256): BE:3D:EF:95:BA:A7:68:4F:4A:59:A7:7D:0A:1E:23:06:6E:90:62:1E:7B:07:B0:63:EC:E1:07:F3:53:C2:5E:7C Fingerprint (SHA1): 5E:56:BC:2D:E2:C0:40:83:15:46:FF:6D:09:AD:9A:2C:3E:18:1B:2D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #12965: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202129 (0x195811d1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:01:22 2016 Not After : Sun Apr 25 21:01:22 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e5:0d:e0:90:16:b1:24:e6:3f:19:6d:f8:3e:b2:85: ae:48:fb:29:d1:d2:e8:65:6b:8d:3f:fc:79:91:4a:5f: d2:b8:33:e0:d0:52:e3:02:2a:b6:55:52:11:42:0c:55: 8a:2d:31:f6:d6:31:b2:8f:e0:80:65:3b:b4:f6:a0:95: 4f:f5:08:e8:04:6f:e7:45:d7:4e:d0:10:1b:d2:81:cd: e0:70:64:78:ab:55:86:c6:07:86:ab:e4:81:96:7b:d1: 01:73:97:87:e1:a3:7f:a7:07:83:37:46:d0:a4:23:fc: 5a:29:0e:84:d9:7f:b6:2d:c7:ad:84:5c:2f:cb:e1:ac: 3b:e7:4f:9d:89:0d:38:85:fa:17:52:6e:c4:ea:37:64: 90:3b:fd:25:46:fa:9f:2f:87:f3:1d:8f:88:51:5e:38: fe:2f:08:f6:0b:6f:ee:68:8f:bc:bb:f2:7b:19:10:be: 57:82:1b:da:3d:fb:cb:92:2c:1a:3f:4a:c3:72:7f:9c: 7e:a4:05:b4:08:9a:18:62:22:e8:8b:d2:36:93:4e:d8: 92:bc:ad:c5:d8:45:3b:28:8b:2c:f7:cb:73:3d:00:fd: 40:b5:00:25:1a:ba:f8:ba:2a:72:1e:48:99:de:0e:05: ca:33:6a:b1:60:05:61:f2:0f:0f:4f:41:9a:0c:44:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:2d:c6:c4:be:56:a6:a3:de:42:8e:78:f2:0b:7c:85: 35:a6:8d:27:28:e1:07:19:a8:c4:e6:a7:df:04:63:c6: c6:8d:3b:3b:8a:77:ea:ac:f7:df:d5:b5:4c:e1:33:87: 8f:ab:cd:b6:20:02:b8:03:33:2e:f3:6f:a5:56:0a:2b: ec:24:c5:4d:9d:d4:46:e7:f7:67:bb:0b:a1:78:5f:89: cd:6f:e8:02:50:90:f8:67:c3:0a:46:36:bd:f0:9f:11: 51:dd:8c:86:72:23:44:76:6c:f7:ef:25:cd:36:60:25: 1c:b3:7c:e9:0f:c0:44:3d:4d:22:f6:2b:59:e6:8e:5c: 5a:81:89:66:2a:fe:b0:22:14:31:e3:36:1f:1d:c5:12: ad:f2:7c:e0:d2:2b:48:46:48:34:f1:94:d0:a9:fd:95: 20:c2:81:a7:1e:b0:d4:e1:29:11:72:f7:e9:6d:97:5e: 41:b8:af:cc:5c:e0:35:19:29:4a:26:1e:38:8d:7f:ec: 73:22:9c:6c:7c:12:22:40:c1:41:2f:2b:9e:18:d1:ab: a1:cb:0c:24:05:55:90:3b:ac:3a:1a:88:46:df:e7:90: 81:96:b0:d8:3d:7b:6f:4e:ca:f9:5f:f0:7a:64:d5:4e: f5:c1:b1:20:de:22:1b:00:26:7d:ed:7a:7f:5a:9f:15 Fingerprint (SHA-256): 71:6C:2A:52:16:EA:72:BF:6E:BE:D3:9D:64:81:47:CC:94:28:E8:F4:93:BE:BD:C3:50:EB:8F:F7:44:1D:05:39 Fingerprint (SHA1): D1:50:1A:BE:51:10:D3:5D:B2:1D:13:F7:77:0D:95:A0:A8:08:B4:C9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12966: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202129 (0x195811d1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:01:22 2016 Not After : Sun Apr 25 21:01:22 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e5:0d:e0:90:16:b1:24:e6:3f:19:6d:f8:3e:b2:85: ae:48:fb:29:d1:d2:e8:65:6b:8d:3f:fc:79:91:4a:5f: d2:b8:33:e0:d0:52:e3:02:2a:b6:55:52:11:42:0c:55: 8a:2d:31:f6:d6:31:b2:8f:e0:80:65:3b:b4:f6:a0:95: 4f:f5:08:e8:04:6f:e7:45:d7:4e:d0:10:1b:d2:81:cd: e0:70:64:78:ab:55:86:c6:07:86:ab:e4:81:96:7b:d1: 01:73:97:87:e1:a3:7f:a7:07:83:37:46:d0:a4:23:fc: 5a:29:0e:84:d9:7f:b6:2d:c7:ad:84:5c:2f:cb:e1:ac: 3b:e7:4f:9d:89:0d:38:85:fa:17:52:6e:c4:ea:37:64: 90:3b:fd:25:46:fa:9f:2f:87:f3:1d:8f:88:51:5e:38: fe:2f:08:f6:0b:6f:ee:68:8f:bc:bb:f2:7b:19:10:be: 57:82:1b:da:3d:fb:cb:92:2c:1a:3f:4a:c3:72:7f:9c: 7e:a4:05:b4:08:9a:18:62:22:e8:8b:d2:36:93:4e:d8: 92:bc:ad:c5:d8:45:3b:28:8b:2c:f7:cb:73:3d:00:fd: 40:b5:00:25:1a:ba:f8:ba:2a:72:1e:48:99:de:0e:05: ca:33:6a:b1:60:05:61:f2:0f:0f:4f:41:9a:0c:44:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:2d:c6:c4:be:56:a6:a3:de:42:8e:78:f2:0b:7c:85: 35:a6:8d:27:28:e1:07:19:a8:c4:e6:a7:df:04:63:c6: c6:8d:3b:3b:8a:77:ea:ac:f7:df:d5:b5:4c:e1:33:87: 8f:ab:cd:b6:20:02:b8:03:33:2e:f3:6f:a5:56:0a:2b: ec:24:c5:4d:9d:d4:46:e7:f7:67:bb:0b:a1:78:5f:89: cd:6f:e8:02:50:90:f8:67:c3:0a:46:36:bd:f0:9f:11: 51:dd:8c:86:72:23:44:76:6c:f7:ef:25:cd:36:60:25: 1c:b3:7c:e9:0f:c0:44:3d:4d:22:f6:2b:59:e6:8e:5c: 5a:81:89:66:2a:fe:b0:22:14:31:e3:36:1f:1d:c5:12: ad:f2:7c:e0:d2:2b:48:46:48:34:f1:94:d0:a9:fd:95: 20:c2:81:a7:1e:b0:d4:e1:29:11:72:f7:e9:6d:97:5e: 41:b8:af:cc:5c:e0:35:19:29:4a:26:1e:38:8d:7f:ec: 73:22:9c:6c:7c:12:22:40:c1:41:2f:2b:9e:18:d1:ab: a1:cb:0c:24:05:55:90:3b:ac:3a:1a:88:46:df:e7:90: 81:96:b0:d8:3d:7b:6f:4e:ca:f9:5f:f0:7a:64:d5:4e: f5:c1:b1:20:de:22:1b:00:26:7d:ed:7a:7f:5a:9f:15 Fingerprint (SHA-256): 71:6C:2A:52:16:EA:72:BF:6E:BE:D3:9D:64:81:47:CC:94:28:E8:F4:93:BE:BD:C3:50:EB:8F:F7:44:1D:05:39 Fingerprint (SHA1): D1:50:1A:BE:51:10:D3:5D:B2:1D:13:F7:77:0D:95:A0:A8:08:B4:C9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #12967: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202130 (0x195811d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:01:51 2016 Not After : Sun Apr 25 21:01:51 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:55:a5:b2:34:c9:79:ec:39:ed:49:cb:e0:04:d4:e6: 33:e2:d2:e4:9d:25:af:67:67:ab:cf:66:40:47:d3:c8: ba:0b:b3:a9:b2:e8:85:81:20:f8:e5:a8:e7:0a:1b:ee: 39:36:06:9b:14:6b:1c:c9:8c:b1:b3:ab:21:90:c9:e5: 27:5a:0e:ae:5f:64:e0:79:82:d3:14:4a:3c:7b:13:a2: e7:f9:38:03:02:e1:85:d9:0d:b7:f1:df:f0:76:c2:ca: 06:43:11:96:75:da:ed:66:ab:36:25:8b:d2:ba:e1:cc: 97:4b:55:20:d9:01:9c:95:15:b3:15:f0:6e:98:3c:5e: f9:0f:59:ff:d5:4d:3a:80:a2:14:15:c4:96:da:58:3f: 6d:95:48:84:74:de:92:d2:09:ac:5d:5b:46:a2:ea:fa: 18:a1:34:39:03:f2:ad:cc:78:35:9d:db:9b:ad:62:e8: 16:0f:df:51:9f:f9:4e:f4:74:a4:8d:2d:8a:8a:eb:fd: 48:14:75:a3:26:9b:be:36:c6:91:36:f8:d4:8c:f0:62: 18:c4:b5:78:13:ae:06:90:62:67:07:e5:30:7a:e5:90: a4:4f:44:ba:a1:1c:2d:6b:ac:fd:93:f9:68:b7:40:e4: bd:6c:95:92:65:de:8a:b2:92:c3:86:0a:95:1a:65:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:c3:55:64:9d:da:b3:be:48:47:c3:5b:8a:61:e9:d5: d9:de:e9:5a:04:89:55:cf:14:19:15:5d:42:31:8e:bc: f9:bb:6b:27:7a:ad:3c:76:de:4e:e1:dd:bb:fc:b3:0f: b0:03:29:fe:b6:5a:26:12:bf:02:b1:9e:21:e5:ef:90: 04:a6:92:31:db:36:08:df:42:d4:70:25:44:c1:53:12: fc:17:a7:d0:22:b1:53:9f:ed:c4:ea:c3:ed:09:88:eb: 08:b5:80:bb:9d:1d:fa:1b:e7:23:71:09:7e:73:27:05: f1:b8:f5:48:71:83:ee:5f:fa:52:b1:b0:00:d1:31:fe: e7:d0:cb:61:9b:57:32:60:be:a2:d5:1d:06:a4:ac:0f: af:de:0f:a3:0e:fd:2c:a4:00:4c:6e:75:bb:68:a7:43: f9:e1:fa:3d:61:35:f6:7b:90:0b:a9:6f:ed:c9:32:ba: 47:2e:37:e2:a5:84:87:3e:ad:2e:22:9c:f2:bb:52:6c: ab:15:30:0e:82:0e:b1:95:bd:e5:3d:bc:a5:35:f3:e6: 36:62:ea:e3:a0:16:c2:e3:2e:0f:64:f5:48:14:b6:66: 6f:0b:20:a6:c4:f7:4b:bb:65:53:92:d0:c8:16:81:ce: 5d:95:5e:66:11:2d:09:47:5e:f3:73:c2:e6:8b:73:47 Fingerprint (SHA-256): A9:11:7B:CD:7F:00:D5:09:0B:84:88:96:0C:DB:70:38:B8:95:3B:7D:05:F3:8C:00:0C:08:86:4C:45:92:99:E6 Fingerprint (SHA1): 3A:E2:EF:78:38:C0:26:D9:9B:A9:C2:92:03:BB:59:BE:2D:81:09:50 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #12968: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202130 (0x195811d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:01:51 2016 Not After : Sun Apr 25 21:01:51 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:55:a5:b2:34:c9:79:ec:39:ed:49:cb:e0:04:d4:e6: 33:e2:d2:e4:9d:25:af:67:67:ab:cf:66:40:47:d3:c8: ba:0b:b3:a9:b2:e8:85:81:20:f8:e5:a8:e7:0a:1b:ee: 39:36:06:9b:14:6b:1c:c9:8c:b1:b3:ab:21:90:c9:e5: 27:5a:0e:ae:5f:64:e0:79:82:d3:14:4a:3c:7b:13:a2: e7:f9:38:03:02:e1:85:d9:0d:b7:f1:df:f0:76:c2:ca: 06:43:11:96:75:da:ed:66:ab:36:25:8b:d2:ba:e1:cc: 97:4b:55:20:d9:01:9c:95:15:b3:15:f0:6e:98:3c:5e: f9:0f:59:ff:d5:4d:3a:80:a2:14:15:c4:96:da:58:3f: 6d:95:48:84:74:de:92:d2:09:ac:5d:5b:46:a2:ea:fa: 18:a1:34:39:03:f2:ad:cc:78:35:9d:db:9b:ad:62:e8: 16:0f:df:51:9f:f9:4e:f4:74:a4:8d:2d:8a:8a:eb:fd: 48:14:75:a3:26:9b:be:36:c6:91:36:f8:d4:8c:f0:62: 18:c4:b5:78:13:ae:06:90:62:67:07:e5:30:7a:e5:90: a4:4f:44:ba:a1:1c:2d:6b:ac:fd:93:f9:68:b7:40:e4: bd:6c:95:92:65:de:8a:b2:92:c3:86:0a:95:1a:65:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:c3:55:64:9d:da:b3:be:48:47:c3:5b:8a:61:e9:d5: d9:de:e9:5a:04:89:55:cf:14:19:15:5d:42:31:8e:bc: f9:bb:6b:27:7a:ad:3c:76:de:4e:e1:dd:bb:fc:b3:0f: b0:03:29:fe:b6:5a:26:12:bf:02:b1:9e:21:e5:ef:90: 04:a6:92:31:db:36:08:df:42:d4:70:25:44:c1:53:12: fc:17:a7:d0:22:b1:53:9f:ed:c4:ea:c3:ed:09:88:eb: 08:b5:80:bb:9d:1d:fa:1b:e7:23:71:09:7e:73:27:05: f1:b8:f5:48:71:83:ee:5f:fa:52:b1:b0:00:d1:31:fe: e7:d0:cb:61:9b:57:32:60:be:a2:d5:1d:06:a4:ac:0f: af:de:0f:a3:0e:fd:2c:a4:00:4c:6e:75:bb:68:a7:43: f9:e1:fa:3d:61:35:f6:7b:90:0b:a9:6f:ed:c9:32:ba: 47:2e:37:e2:a5:84:87:3e:ad:2e:22:9c:f2:bb:52:6c: ab:15:30:0e:82:0e:b1:95:bd:e5:3d:bc:a5:35:f3:e6: 36:62:ea:e3:a0:16:c2:e3:2e:0f:64:f5:48:14:b6:66: 6f:0b:20:a6:c4:f7:4b:bb:65:53:92:d0:c8:16:81:ce: 5d:95:5e:66:11:2d:09:47:5e:f3:73:c2:e6:8b:73:47 Fingerprint (SHA-256): A9:11:7B:CD:7F:00:D5:09:0B:84:88:96:0C:DB:70:38:B8:95:3B:7D:05:F3:8C:00:0C:08:86:4C:45:92:99:E6 Fingerprint (SHA1): 3A:E2:EF:78:38:C0:26:D9:9B:A9:C2:92:03:BB:59:BE:2D:81:09:50 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #12969: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #12970: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202133 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #12971: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #12972: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #12973: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12974: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425202134 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12975: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12976: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #12977: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12978: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202135 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #12979: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12980: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #12981: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #12982: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 425202136 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12983: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12984: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #12985: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12986: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 425202137 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12987: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12988: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #12989: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12990: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 425202138 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12991: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12992: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #12993: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #12994: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 425202139 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #12995: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #12996: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #12997: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #12998: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #12999: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #13000: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #13001: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202133 (0x195811d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:02:37 2016 Not After : Sun Apr 25 21:02:37 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:15:7f:fd:15:a4:13:00:75:f3:52:e9:8f:21:95:9c: 54:de:44:83:1d:3c:12:cb:c0:98:8f:39:20:97:8f:cf: aa:f4:40:aa:14:11:bf:76:cc:1e:fd:e5:db:e1:f9:34: 8e:de:be:48:f9:aa:11:0d:84:5b:7c:3c:7d:95:b8:fe: 52:3f:27:d2:22:c5:69:9b:f0:44:e1:d4:99:de:88:b4: 82:f8:4e:e7:81:7d:6c:64:7f:3b:5b:31:db:eb:52:ba: c8:52:4a:3d:9e:95:b1:13:35:0d:d1:53:93:be:ea:3d: a5:34:dc:c7:b8:92:95:20:0d:a4:f1:3d:fa:75:f4:e7: 9f:33:a9:dd:2e:b2:d4:69:92:9f:62:95:6a:db:ec:31: 89:9b:47:45:76:d8:e3:39:ed:aa:5c:36:d9:9b:2b:56: 93:83:df:dc:18:69:7d:3d:a1:2b:6f:5f:e7:b2:eb:47: 1d:7f:11:fe:a5:04:f0:13:a5:80:ab:58:98:af:ef:32: 27:29:ac:46:89:58:0f:f0:7b:46:23:64:37:77:16:00: e5:47:c8:c7:f3:e3:7b:a6:a9:e1:df:bf:80:14:f2:1c: f3:cb:da:d7:54:c2:d1:b2:d1:af:7c:76:fc:2d:a5:6a: e0:31:72:1a:41:8f:1d:da:a0:8c:9f:86:8e:7d:aa:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:1e:73:92:4a:28:23:1d:8f:1d:63:e4:84:99:f2:a5: d9:00:cb:cd:5b:14:4f:3c:1f:45:8f:3d:4a:b8:d3:f7: 73:be:63:e7:7f:db:ab:cb:2e:c9:77:7a:ce:06:15:3b: 96:60:43:0e:a8:7d:54:a1:9f:25:8c:d5:3b:28:2f:8a: 42:fd:50:ce:c1:cf:03:47:35:77:34:8f:04:fe:4d:fb: bc:5c:a7:b3:74:b5:96:98:1c:c9:e9:67:84:09:1e:ca: 18:64:21:03:b7:f4:db:92:18:6e:ab:6b:3c:9f:aa:97: 83:df:9b:39:c9:13:36:a0:ed:85:28:5f:96:27:c8:bd: fd:1d:e2:35:94:3b:0b:d0:bb:35:86:2c:1e:70:00:0f: a9:a9:35:58:79:26:e8:e8:a9:76:50:25:0f:af:07:34: 3e:0d:cd:f4:3f:a1:25:98:c8:52:ad:97:b2:8d:9e:49: cb:e1:8e:59:0d:ba:e1:de:61:91:0f:20:ff:92:39:34: 1d:8c:9e:24:39:b9:27:3b:af:5d:3f:c7:1e:3e:f7:40: 9d:9e:95:47:b5:4f:14:24:13:0d:25:b2:22:4b:52:22: fa:bc:f7:be:38:96:a6:56:80:d4:fa:43:da:bf:6e:2a: 96:ab:8d:a4:3e:96:10:ea:17:94:05:0e:b7:33:01:1f Fingerprint (SHA-256): 85:35:6D:F9:EF:9B:24:54:7F:7E:B6:7C:4E:D4:9A:78:1E:C6:2E:B3:2D:1C:A6:A5:B4:8A:55:5D:69:85:5A:19 Fingerprint (SHA1): C4:90:B7:F9:0D:9C:AF:4C:A9:40:72:AB:71:C2:2D:AF:F3:7B:75:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13002: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13003: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13004: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13005: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202133 (0x195811d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:02:37 2016 Not After : Sun Apr 25 21:02:37 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:15:7f:fd:15:a4:13:00:75:f3:52:e9:8f:21:95:9c: 54:de:44:83:1d:3c:12:cb:c0:98:8f:39:20:97:8f:cf: aa:f4:40:aa:14:11:bf:76:cc:1e:fd:e5:db:e1:f9:34: 8e:de:be:48:f9:aa:11:0d:84:5b:7c:3c:7d:95:b8:fe: 52:3f:27:d2:22:c5:69:9b:f0:44:e1:d4:99:de:88:b4: 82:f8:4e:e7:81:7d:6c:64:7f:3b:5b:31:db:eb:52:ba: c8:52:4a:3d:9e:95:b1:13:35:0d:d1:53:93:be:ea:3d: a5:34:dc:c7:b8:92:95:20:0d:a4:f1:3d:fa:75:f4:e7: 9f:33:a9:dd:2e:b2:d4:69:92:9f:62:95:6a:db:ec:31: 89:9b:47:45:76:d8:e3:39:ed:aa:5c:36:d9:9b:2b:56: 93:83:df:dc:18:69:7d:3d:a1:2b:6f:5f:e7:b2:eb:47: 1d:7f:11:fe:a5:04:f0:13:a5:80:ab:58:98:af:ef:32: 27:29:ac:46:89:58:0f:f0:7b:46:23:64:37:77:16:00: e5:47:c8:c7:f3:e3:7b:a6:a9:e1:df:bf:80:14:f2:1c: f3:cb:da:d7:54:c2:d1:b2:d1:af:7c:76:fc:2d:a5:6a: e0:31:72:1a:41:8f:1d:da:a0:8c:9f:86:8e:7d:aa:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:1e:73:92:4a:28:23:1d:8f:1d:63:e4:84:99:f2:a5: d9:00:cb:cd:5b:14:4f:3c:1f:45:8f:3d:4a:b8:d3:f7: 73:be:63:e7:7f:db:ab:cb:2e:c9:77:7a:ce:06:15:3b: 96:60:43:0e:a8:7d:54:a1:9f:25:8c:d5:3b:28:2f:8a: 42:fd:50:ce:c1:cf:03:47:35:77:34:8f:04:fe:4d:fb: bc:5c:a7:b3:74:b5:96:98:1c:c9:e9:67:84:09:1e:ca: 18:64:21:03:b7:f4:db:92:18:6e:ab:6b:3c:9f:aa:97: 83:df:9b:39:c9:13:36:a0:ed:85:28:5f:96:27:c8:bd: fd:1d:e2:35:94:3b:0b:d0:bb:35:86:2c:1e:70:00:0f: a9:a9:35:58:79:26:e8:e8:a9:76:50:25:0f:af:07:34: 3e:0d:cd:f4:3f:a1:25:98:c8:52:ad:97:b2:8d:9e:49: cb:e1:8e:59:0d:ba:e1:de:61:91:0f:20:ff:92:39:34: 1d:8c:9e:24:39:b9:27:3b:af:5d:3f:c7:1e:3e:f7:40: 9d:9e:95:47:b5:4f:14:24:13:0d:25:b2:22:4b:52:22: fa:bc:f7:be:38:96:a6:56:80:d4:fa:43:da:bf:6e:2a: 96:ab:8d:a4:3e:96:10:ea:17:94:05:0e:b7:33:01:1f Fingerprint (SHA-256): 85:35:6D:F9:EF:9B:24:54:7F:7E:B6:7C:4E:D4:9A:78:1E:C6:2E:B3:2D:1C:A6:A5:B4:8A:55:5D:69:85:5A:19 Fingerprint (SHA1): C4:90:B7:F9:0D:9C:AF:4C:A9:40:72:AB:71:C2:2D:AF:F3:7B:75:B6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13006: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13007: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #13008: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202140 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13009: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #13010: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13011: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13012: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425202141 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #13013: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13014: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #13015: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13016: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 425202142 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13017: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13018: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #13019: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13020: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 425202143 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13021: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13022: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13023: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13024: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 425202144 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13025: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13026: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #13027: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13028: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 425202145 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13029: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13030: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #13031: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13032: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 425202146 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13033: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13034: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #13035: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13036: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 425202147 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13037: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13038: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #13039: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13040: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 425202148 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #13041: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13042: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #13043: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13044: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 425202149 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13045: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13046: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #13047: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13048: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 425202150 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13049: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13050: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #13051: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13052: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 425202151 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13053: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13054: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #13055: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13056: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 425202152 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13057: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13058: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #13059: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13060: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 425202153 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13061: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13062: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #13063: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13064: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 425202154 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13065: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13066: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #13067: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13068: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 425202155 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13069: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13070: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #13071: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13072: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 425202156 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13073: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13074: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #13075: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13076: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 425202157 --extCP --extIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #13077: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13078: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #13079: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13080: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 425202158 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13081: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13082: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #13083: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13084: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 425202159 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13085: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13086: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #13087: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13088: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 425202160 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13089: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13090: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #13091: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13092: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 425202161 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13093: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13094: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #13095: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13096: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 425202162 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13097: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13098: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #13099: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13100: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 425202163 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13101: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13102: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #13103: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13104: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 425202164 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13105: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13106: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #13107: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13108: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 425202165 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13109: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13110: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #13111: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13112: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 425202166 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13113: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13114: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #13115: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13116: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 425202167 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13117: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13118: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #13119: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13120: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 425202168 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13121: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13122: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #13123: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13124: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 425202169 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13125: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13126: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13127: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13128: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13129: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13130: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13131: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13132: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13133: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13134: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13135: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13136: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13137: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13138: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13139: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13140: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13141: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13142: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13143: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13144: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13145: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #13146: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #13147: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #13148: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #13149: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202140 (0x195811dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:03:53 2016 Not After : Sun Apr 25 21:03:53 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b2:9c:0c:e9:35:16:c7:9f:02:84:78:b2:7c:ab:1b: 8e:5f:c5:d5:87:59:43:86:9e:5a:b9:7e:af:6e:24:7f: 39:cb:5d:ed:5a:97:89:8d:c2:e5:4f:ad:d4:44:b9:c7: 54:ad:16:c1:ad:71:1c:99:3f:33:01:ba:7d:e0:a1:34: ef:31:8f:95:81:b8:28:ce:a4:f8:d3:8c:57:a1:2d:3c: 21:f7:4c:80:40:36:e1:26:a8:d2:46:73:69:7e:0f:b3: 4f:2c:8c:33:fc:8d:5b:2f:f3:04:c6:80:0b:f7:b5:33: 0e:15:63:d1:9b:58:58:7f:f5:39:00:6a:71:aa:ed:70: a7:2d:46:0b:95:48:71:b9:ae:8c:1a:dd:0f:c5:62:80: b9:64:cd:d3:95:68:2f:85:33:11:b2:e9:a6:67:cc:a1: 83:8a:11:8a:d5:f0:e3:06:af:92:c5:43:25:35:a1:e4: 11:9e:5a:d7:88:d3:ab:7a:97:fa:8e:59:d3:9f:54:1f: c7:3d:1b:ff:5e:ab:7b:c5:22:74:28:36:b7:d0:7e:95: ac:8c:68:49:31:2a:c6:86:6a:fb:5b:64:d9:93:48:9e: 93:32:36:fe:53:ad:a0:1b:8e:ed:eb:95:a5:23:f2:7e: b1:13:68:94:97:99:81:07:88:c3:48:1a:82:74:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:75:89:a2:fc:89:33:03:06:31:2a:fb:a0:55:07: 6a:df:e8:89:7f:c0:01:d4:44:40:12:3c:54:6d:a3:6c: ce:0b:7c:b3:32:f1:3e:2c:67:ad:d2:db:1d:fa:19:3a: 41:b4:3f:17:ac:0a:2d:95:de:0c:c8:f9:2c:9b:4f:a7: 70:de:79:87:51:fd:2f:41:5e:31:b8:cd:04:fa:09:92: 21:d1:a2:cb:76:e8:53:41:f4:1f:f0:ba:aa:0c:1d:92: 15:44:20:7b:a4:d7:2f:fc:3c:f5:58:2e:c1:7b:6c:df: b9:e0:3f:5c:1d:da:04:05:76:69:e5:12:9b:d3:1b:ab: 08:02:ea:67:7e:d5:83:b1:43:47:d6:b4:3b:c7:4d:b4: 1e:11:0e:dd:99:0c:55:97:fd:07:bf:ac:0c:99:b2:23: fb:9b:9f:a3:2e:f7:e8:ac:e5:f6:0d:de:4e:b6:19:2f: 5b:84:57:94:0c:ac:6f:f5:3b:92:b2:8d:6e:67:c4:0f: f7:8b:3c:54:f6:dd:ab:00:ed:02:fd:66:cb:49:c3:e3: 5f:c7:11:ea:3b:3f:8e:5f:3f:ad:d7:b3:08:4e:e1:af: 1e:50:fc:b4:ae:02:50:01:36:9d:ba:f7:c3:eb:94:c8: 09:ec:08:d9:c1:27:ce:cc:6a:b9:04:35:ef:64:d1:3a Fingerprint (SHA-256): 0E:0C:65:6A:16:B5:7B:54:AC:D5:F0:7A:79:29:0C:F5:4C:1C:8A:1A:A2:7C:00:54:2C:58:FE:24:51:E1:D8:19 Fingerprint (SHA1): 32:BB:B5:E7:D9:0B:34:6A:4B:18:C1:23:A9:43:9D:2C:92:AF:66:34 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #13150: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13151: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13152: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202170 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13153: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13154: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #13155: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13156: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 425202171 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13157: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13158: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #13159: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13160: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 425202172 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13161: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13162: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #13163: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13164: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 425202173 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13165: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13166: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #13167: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13168: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 425202174 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13169: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13170: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #13171: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13172: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 425202175 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13173: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13174: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #13175: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13176: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 425202176 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13177: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13178: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13179: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202170 (0x195811fa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:10:02 2016 Not After : Sun Apr 25 21:10:02 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:56:5d:c1:77:6b:23:55:8e:b2:fe:98:0a:0a:67:4e: 26:24:31:0e:73:cc:82:8e:e2:4d:27:2b:68:b3:e7:81: dd:00:73:b7:af:0e:6b:76:72:8b:49:8d:bc:ba:d5:b6: 24:e6:a4:d3:66:44:28:47:78:ce:c5:3d:e2:29:d5:d8: 54:87:4a:05:6a:57:4c:a7:58:ac:7a:e1:05:22:be:2d: 88:98:36:66:0e:37:06:f1:47:1f:58:5c:98:8a:72:6d: fa:1a:db:e9:7b:34:b3:01:3d:75:e7:91:61:86:80:99: d2:5b:68:fe:38:4f:5e:bc:d1:78:fe:47:86:2d:94:2f: ec:7d:e9:0e:88:01:0c:93:8e:34:94:32:c8:b3:d5:40: 3b:9d:87:e2:96:8e:70:68:81:9d:4b:6d:75:03:7c:38: 84:0b:91:d6:87:1f:a6:01:fc:20:e0:96:b2:8a:ed:60: 9c:8c:ed:b5:59:4a:26:de:f1:6a:06:17:07:8f:df:8d: c7:66:fa:df:df:8f:12:4f:14:6c:a7:a6:c9:a2:a9:9f: f8:46:7d:67:7e:d2:bd:46:da:e8:02:be:c9:2e:93:d2: e0:01:cd:ff:82:92:3f:53:3b:82:af:eb:c0:23:18:3a: 99:67:56:f4:ed:83:0b:0d:94:83:f3:de:aa:76:d8:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:35:3f:37:76:12:b4:d4:58:39:67:65:c2:cc:a7:51: 49:3c:16:ef:0b:97:3f:9d:a4:87:ef:34:0b:5d:f2:5b: 5f:de:8b:48:5f:6b:92:c3:8d:1e:1f:7e:01:3a:19:b0: f7:17:fe:29:e1:e4:50:ab:05:ea:9a:03:b7:0c:85:ce: 3e:21:e3:33:b3:6d:38:71:cb:99:b7:95:34:d7:ce:7c: 9b:c6:47:5e:2d:a9:78:4e:fe:20:1b:8f:cc:29:4b:52: fd:6c:67:2f:27:9f:1b:75:4b:59:00:77:b9:dc:07:f3: 3f:b5:e2:08:60:28:4e:6a:9d:54:03:2d:a3:a5:7b:f5: b9:b5:cf:af:6c:2a:2f:3e:bd:de:c8:d2:37:60:d6:9d: fd:cb:c8:bb:a7:ad:35:98:51:e5:e4:73:e5:b6:8d:8f: 06:c0:bc:2b:ec:ce:eb:c8:ae:a4:77:4f:8b:68:f4:f1: e2:9c:44:1a:d3:0e:c0:76:80:d6:e7:d6:30:0e:54:07: 18:dd:93:8c:3b:0e:92:87:9d:aa:66:95:bc:d1:5c:b0: 6b:ab:c0:7e:ea:0d:66:ea:08:de:b7:b6:a7:4c:4f:f8: c7:74:89:ab:de:bc:c2:6c:9e:a3:be:f9:6b:3f:2c:88: dd:06:4d:fc:bd:d1:35:3d:15:5a:ea:f7:90:d9:36:d9 Fingerprint (SHA-256): 6D:29:3D:E0:B3:1B:3A:91:E2:32:03:49:84:EF:A7:6E:A9:BC:99:E2:46:74:39:89:65:A8:81:53:F7:37:42:62 Fingerprint (SHA1): FC:64:AD:0E:7D:79:C4:64:88:2B:86:CD:C0:B5:8A:3F:29:73:A4:65 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #13180: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13181: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13182: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #13183: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202170 (0x195811fa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:10:02 2016 Not After : Sun Apr 25 21:10:02 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:56:5d:c1:77:6b:23:55:8e:b2:fe:98:0a:0a:67:4e: 26:24:31:0e:73:cc:82:8e:e2:4d:27:2b:68:b3:e7:81: dd:00:73:b7:af:0e:6b:76:72:8b:49:8d:bc:ba:d5:b6: 24:e6:a4:d3:66:44:28:47:78:ce:c5:3d:e2:29:d5:d8: 54:87:4a:05:6a:57:4c:a7:58:ac:7a:e1:05:22:be:2d: 88:98:36:66:0e:37:06:f1:47:1f:58:5c:98:8a:72:6d: fa:1a:db:e9:7b:34:b3:01:3d:75:e7:91:61:86:80:99: d2:5b:68:fe:38:4f:5e:bc:d1:78:fe:47:86:2d:94:2f: ec:7d:e9:0e:88:01:0c:93:8e:34:94:32:c8:b3:d5:40: 3b:9d:87:e2:96:8e:70:68:81:9d:4b:6d:75:03:7c:38: 84:0b:91:d6:87:1f:a6:01:fc:20:e0:96:b2:8a:ed:60: 9c:8c:ed:b5:59:4a:26:de:f1:6a:06:17:07:8f:df:8d: c7:66:fa:df:df:8f:12:4f:14:6c:a7:a6:c9:a2:a9:9f: f8:46:7d:67:7e:d2:bd:46:da:e8:02:be:c9:2e:93:d2: e0:01:cd:ff:82:92:3f:53:3b:82:af:eb:c0:23:18:3a: 99:67:56:f4:ed:83:0b:0d:94:83:f3:de:aa:76:d8:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:35:3f:37:76:12:b4:d4:58:39:67:65:c2:cc:a7:51: 49:3c:16:ef:0b:97:3f:9d:a4:87:ef:34:0b:5d:f2:5b: 5f:de:8b:48:5f:6b:92:c3:8d:1e:1f:7e:01:3a:19:b0: f7:17:fe:29:e1:e4:50:ab:05:ea:9a:03:b7:0c:85:ce: 3e:21:e3:33:b3:6d:38:71:cb:99:b7:95:34:d7:ce:7c: 9b:c6:47:5e:2d:a9:78:4e:fe:20:1b:8f:cc:29:4b:52: fd:6c:67:2f:27:9f:1b:75:4b:59:00:77:b9:dc:07:f3: 3f:b5:e2:08:60:28:4e:6a:9d:54:03:2d:a3:a5:7b:f5: b9:b5:cf:af:6c:2a:2f:3e:bd:de:c8:d2:37:60:d6:9d: fd:cb:c8:bb:a7:ad:35:98:51:e5:e4:73:e5:b6:8d:8f: 06:c0:bc:2b:ec:ce:eb:c8:ae:a4:77:4f:8b:68:f4:f1: e2:9c:44:1a:d3:0e:c0:76:80:d6:e7:d6:30:0e:54:07: 18:dd:93:8c:3b:0e:92:87:9d:aa:66:95:bc:d1:5c:b0: 6b:ab:c0:7e:ea:0d:66:ea:08:de:b7:b6:a7:4c:4f:f8: c7:74:89:ab:de:bc:c2:6c:9e:a3:be:f9:6b:3f:2c:88: dd:06:4d:fc:bd:d1:35:3d:15:5a:ea:f7:90:d9:36:d9 Fingerprint (SHA-256): 6D:29:3D:E0:B3:1B:3A:91:E2:32:03:49:84:EF:A7:6E:A9:BC:99:E2:46:74:39:89:65:A8:81:53:F7:37:42:62 Fingerprint (SHA1): FC:64:AD:0E:7D:79:C4:64:88:2B:86:CD:C0:B5:8A:3F:29:73:A4:65 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #13184: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13185: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13186: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13187: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202177 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13188: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13189: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13190: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13191: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202178 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #13192: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13193: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13194: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13195: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202179 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13196: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13197: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #13198: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13199: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425202180 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13200: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13201: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13202: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #13203: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #13204: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #13205: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202177 (0x19581201) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:11:55 2016 Not After : Sun Apr 25 21:11:55 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:08:bd:c5:6d:b4:a6:33:de:44:2e:9f:53:ce:cc:1d: 62:62:a8:dc:c0:ae:c6:50:34:44:c9:c0:e3:e1:d0:9d: 68:4d:12:a2:e1:10:cb:d6:7e:dd:b8:49:87:31:0d:e9: 16:08:c2:3b:55:73:5c:eb:0f:e6:45:d4:a6:69:cb:44: 54:61:cb:db:d5:7f:30:e3:e0:46:1e:7f:67:f7:69:05: f8:6a:e4:1c:5a:f1:98:1a:0c:32:dd:2e:03:7b:bc:e1: 19:9e:72:74:e2:da:9f:78:74:75:ef:e4:f3:6b:4e:40: 89:5f:8b:49:23:f2:72:db:c9:2d:27:92:10:1d:1b:96: 79:e2:cf:65:ec:43:31:e9:9e:46:e5:a3:52:ee:86:ce: 4b:25:3f:7e:2f:1f:40:44:93:fc:39:e9:1e:51:5e:17: 5b:c4:9d:28:33:9f:a9:c4:09:78:3a:75:25:d8:d2:a1: 5f:c2:5f:02:9e:25:d2:fe:19:ca:76:30:40:1a:a7:66: 23:da:2e:71:c6:f3:db:15:d2:86:df:91:90:78:05:55: 67:2a:42:0d:7e:7e:b0:f9:53:69:b0:9e:41:47:48:f0: d4:86:e6:14:69:df:03:5e:9d:19:f4:82:b8:db:9b:68: 70:25:61:2c:29:90:8b:c0:fd:96:f6:12:7c:60:42:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:b9:02:2a:05:f7:09:fe:eb:5d:49:b8:fc:5e:7b:aa: f4:5d:bc:17:c1:4b:83:93:a1:7a:4a:5e:a5:26:44:3c: 12:a7:56:15:78:08:ea:8a:7f:a4:3d:a6:cf:05:9b:e5: f2:49:af:63:cc:fb:a8:50:25:70:3e:d5:7c:35:c4:5e: 54:e4:ab:e3:4f:e0:b1:18:ec:a6:b8:43:ab:3c:b3:87: 28:b3:52:ed:80:db:23:71:df:28:7e:c2:e7:61:95:8f: 02:a6:bd:7c:47:aa:52:69:04:54:01:0b:e1:f5:a8:3b: 67:f2:d8:db:6e:61:4a:a6:67:fe:dd:de:87:8a:19:bf: 11:1a:3c:d8:8b:09:60:3d:65:af:28:4e:0b:84:98:9e: 52:1a:79:5a:7b:be:ed:bb:c5:0f:51:83:de:80:3d:09: 54:5b:d1:f2:7e:58:8f:5b:e6:bf:8c:57:6e:81:cb:d2: a8:72:86:04:ff:37:43:41:37:60:b3:15:1e:cc:08:e7: 06:38:a8:85:b5:6b:05:cc:8d:ce:38:dc:17:f3:20:44: b2:6f:21:55:1c:fb:97:d8:50:f3:04:75:b5:ee:d7:88: e8:7e:34:52:f6:5b:e3:1e:86:43:1c:88:70:18:b5:71: 06:80:c7:44:df:53:92:64:29:54:62:07:b5:f9:0e:b8 Fingerprint (SHA-256): 48:19:55:79:2E:05:2C:F1:65:59:8B:51:15:3A:15:BB:30:30:99:4C:31:48:CA:CE:2A:86:57:2B:EB:C4:DF:39 Fingerprint (SHA1): D8:9A:3F:F8:32:6C:CE:7C:12:8D:F0:A0:3C:D4:99:BD:A6:40:7B:F2 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13206: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13207: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13208: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202178 (0x19581202) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:12:11 2016 Not After : Sun Apr 25 21:12:11 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:4a:bd:7f:b5:53:70:51:a2:af:f2:04:4a:7e:09:3c: 8d:6c:9c:94:29:6e:3e:0c:04:14:8d:ae:6d:23:be:35: 6b:ab:5f:ed:52:c8:ae:b3:63:cc:02:08:36:f2:4a:47: b5:7c:76:6c:22:f5:22:b3:87:73:06:1c:7c:72:f7:1e: f6:1c:29:29:46:12:d8:d6:dc:65:2f:ed:34:13:96:77: 12:16:68:2f:95:07:87:44:78:2a:f4:b2:e8:70:b4:ff: 71:9a:a3:b4:4f:39:97:70:42:ca:88:e4:f9:ab:c4:4e: 6c:58:0c:aa:b3:1b:22:7a:e0:6f:91:77:ce:36:6c:61: 85:d4:bd:0a:27:93:b8:7f:a6:cc:62:22:86:8b:5b:58: 85:7c:6f:66:ef:e8:44:79:1b:26:df:5e:09:e0:a0:79: 1f:c8:d6:62:ee:3b:0d:ea:ff:f8:f3:ea:e3:2d:2f:20: 18:fd:d4:bc:18:3d:66:22:b6:6a:e2:e1:49:81:02:88: 95:68:e0:f4:a0:2e:53:d9:1a:7a:0a:d0:19:60:32:3d: 5a:ee:ab:95:44:e4:79:e5:ee:40:bb:9c:30:f4:37:8b: 96:f9:66:e0:89:8e:ed:4e:7a:64:bd:f1:88:bf:c2:ea: 7c:72:48:4f:d0:af:5f:dc:91:b5:e9:94:c8:ff:3f:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:2f:b4:50:79:2b:23:54:df:ac:bd:7f:f8:ac:ae:15: ba:3f:54:03:f2:7e:55:6b:22:cd:76:6d:ad:5d:24:33: 91:5f:31:7c:99:26:7a:f0:57:87:fc:84:30:98:0b:d6: e3:da:36:be:84:36:8a:93:bb:d4:a5:53:da:db:16:cc: c9:e5:28:67:d2:f6:ac:78:28:1c:8a:7c:95:34:71:2c: ac:94:72:8a:01:0e:b9:71:72:e4:77:b1:df:86:ea:8c: c4:f2:3e:79:79:ae:67:fe:97:a3:75:87:9a:b7:fc:14: 08:dc:51:0e:f0:e8:c1:f7:a1:d3:b5:ac:fa:e8:e4:88: 68:01:4d:e5:31:28:2d:e8:5f:71:d0:10:52:95:3a:61: 21:72:08:e9:27:33:11:bd:be:6a:56:14:e5:e1:01:0a: 01:d0:dd:78:66:37:77:cb:b7:ef:a6:89:1f:01:01:34: 03:12:98:47:88:65:ec:32:cd:bc:22:6c:47:62:bd:5f: 32:52:b1:74:b8:de:f4:05:5d:a7:ac:f1:2c:11:8b:e0: 65:3b:47:1b:a7:50:2a:e6:63:4c:a7:e6:2d:2b:6e:4b: 73:ff:81:dd:c6:39:f6:c8:f8:3a:46:e8:f9:53:b6:7a: 2d:a3:52:34:78:ae:2a:4c:ce:c0:ee:a1:ad:81:05:16 Fingerprint (SHA-256): 05:F4:D5:15:63:C4:03:0E:51:E2:31:E9:1D:5F:E5:EC:D5:FE:57:78:66:62:A3:40:80:13:3A:ED:B8:27:BD:1F Fingerprint (SHA1): 8F:8C:0C:CF:50:72:63:17:72:DE:9D:2D:D6:A0:50:B2:54:BD:6B:A4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13209: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13210: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202179 (0x19581203) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:12:26 2016 Not After : Sun Apr 25 21:12:26 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:f3:b1:0a:80:09:7f:8c:b3:5a:31:14:ce:32:39:2b: d8:ca:0d:5b:57:38:66:99:64:9b:01:f0:f0:1c:d9:32: 6c:1b:e6:04:f9:7b:3b:40:15:23:f5:67:13:95:47:1b: 39:23:b1:7e:62:7c:14:24:28:57:89:4b:76:24:9d:09: 68:51:c3:fa:92:6a:f0:cf:a7:be:36:7b:f3:ff:bb:de: 6a:37:ef:e9:bd:9e:db:44:ac:8c:cf:4c:35:18:2c:60: ae:55:04:b2:fd:99:e7:ba:be:10:97:31:3e:3a:3c:6d: 39:4e:49:cc:08:3b:cc:ed:4b:8b:32:b5:a1:7a:5c:e3: 06:77:30:cc:80:92:04:b9:83:21:ea:8a:bb:c4:28:11: a9:4e:99:d2:69:a1:2a:35:3e:99:74:bb:53:7f:42:ad: 53:d9:9c:77:ea:cb:1f:f2:14:1b:3a:3e:df:16:31:3b: c8:7b:61:49:09:3f:2f:9c:4c:00:71:ab:0c:59:61:de: ae:cb:33:73:e5:4b:ad:b5:0f:0a:1b:2f:ac:c3:29:12: d2:64:ac:63:5f:fd:7e:62:56:7c:a0:18:53:bf:e3:ca: 94:ef:11:79:aa:e3:2f:d6:f6:4d:df:64:56:30:f0:63: fe:bd:81:33:b5:5b:9b:b7:c2:e5:55:ee:28:1b:c3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:4a:74:ae:f3:89:a6:91:7a:d4:0b:24:79:28:03:c3: c0:22:62:63:00:3c:a5:83:65:a8:60:a6:0b:cb:41:ee: 03:3e:a9:05:19:01:ae:42:2a:a8:27:03:61:00:6d:21: 91:db:11:2c:f2:77:b5:5c:38:a7:03:7f:d5:34:1d:f0: 86:46:db:7f:bd:4e:a6:99:be:a0:be:4d:46:3b:78:5c: 82:a7:68:3c:de:93:7b:71:51:90:74:f3:46:7d:c0:3f: 29:01:7e:5b:28:11:11:62:49:29:4f:d4:e7:e4:0e:e4: da:c1:1d:11:fd:0d:eb:52:4e:5c:98:bc:29:b0:08:98: 80:74:8d:87:60:e2:0d:1f:73:4d:99:69:a9:6f:ae:3b: c4:b0:98:3b:e1:1b:d7:61:31:fb:06:d1:c1:56:31:52: 6d:a2:b4:d6:51:8f:4e:63:74:21:21:33:db:af:b3:6c: 76:c7:8e:21:e6:c9:2b:3b:c2:5e:39:6f:49:67:4d:a4: 08:56:87:7d:34:ec:9d:e8:2a:7f:88:12:eb:f4:7e:87: 18:8b:9f:3e:3d:e3:d2:cc:58:1f:f8:a6:36:c2:14:bb: ab:a6:f7:75:bf:5d:89:30:7a:14:4d:32:36:95:a5:5f: 8e:07:a5:19:87:84:a5:21:94:a7:73:5e:89:22:c2:99 Fingerprint (SHA-256): 2D:21:79:28:B7:97:F8:DC:63:AD:32:01:53:A9:B0:05:AC:CD:75:80:11:DD:97:37:AA:08:6F:B3:C4:1D:90:57 Fingerprint (SHA1): FA:E0:54:77:6F:2B:58:5C:AA:85:92:36:C3:B9:D2:B4:3F:C9:49:A4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #13211: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13212: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202181 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13213: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13214: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13215: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13216: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202182 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13217: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13218: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13219: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13220: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202183 --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #13221: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13222: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #13223: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13224: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 425202184 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13225: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13226: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #13227: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13228: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 425202185 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13229: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13230: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13231: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #13232: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #13233: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #13234: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #13235: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202181 (0x19581205) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:13:08 2016 Not After : Sun Apr 25 21:13:08 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:5e:98:e0:fd:26:b2:70:ab:3b:bf:09:9e:c4:34:fc: a3:7e:0c:ed:19:ce:6f:73:90:15:6f:4e:79:38:e5:98: fc:a2:f5:ed:14:19:52:e9:15:b8:74:3a:a4:28:00:02: a6:32:aa:2e:33:53:ba:e9:d4:f1:b1:27:13:c9:3c:54: b0:77:41:1f:88:5d:d3:d9:85:9b:2e:11:32:7a:44:4b: 11:8b:da:c4:17:19:56:60:56:74:17:35:e1:82:85:1e: 30:02:35:cf:0c:f1:f3:ac:b0:35:b8:e2:6c:f7:b9:ce: 7e:19:3b:7d:93:e6:20:27:18:be:fa:a7:6b:94:ff:d5: ed:c5:3f:6d:82:35:3b:2f:2a:9c:8c:d7:8d:e5:41:79: e7:46:ac:c0:bd:82:38:0d:34:c9:7a:c0:52:a7:91:0a: d9:92:4d:43:9e:c4:dd:10:23:74:0b:16:30:65:33:4c: a1:df:81:7b:ef:97:0c:79:d8:20:f2:58:7e:b3:3c:55: 89:fa:bd:69:c1:b1:bf:05:f8:f5:22:e3:99:c5:dc:7b: 08:7e:ba:39:ee:fb:75:f7:ad:21:2f:69:70:ab:8f:79: 4b:b0:ae:ce:0b:48:43:c5:8c:6e:99:c9:58:9e:50:27: 68:ef:44:e1:2f:ee:60:43:52:42:3e:cd:33:8d:7d:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:77:bc:60:74:aa:e9:30:da:ee:6c:47:fa:f7:29:33: ee:e6:83:7d:48:86:8a:a1:4f:2c:be:6f:4e:b5:5c:30: 19:56:e0:43:d6:e1:21:e7:f2:eb:c5:15:15:32:7a:52: 94:20:78:8c:bc:55:a0:dd:b8:18:87:53:b5:b0:e6:88: 7c:45:9d:c1:c7:a3:1d:25:e2:61:de:a0:ba:e7:79:f9: c9:bd:94:25:ac:e0:d1:94:9b:93:ac:1c:89:fb:6f:53: fc:eb:86:89:25:36:9d:1e:36:46:84:f6:b0:a0:7c:03: 4b:ba:2f:69:75:63:c4:f8:74:9a:0f:9b:06:68:3f:cd: da:de:f6:c6:dd:00:c6:39:cb:4f:3d:8a:48:ab:1f:59: 8a:fc:1a:61:bd:4d:7a:63:80:d9:76:8b:79:2a:47:70: e5:03:6a:c8:81:23:ef:ea:84:69:ee:26:e7:1e:ca:e6: 06:13:a9:2c:74:bb:f0:4e:9c:7f:55:10:3a:e6:84:7e: 02:92:0e:fa:b2:9c:1d:e3:3c:40:be:97:be:cb:03:9d: c4:ed:db:40:b9:e7:34:18:04:cd:be:46:28:64:ef:d3: 08:90:6c:59:0d:25:c4:73:ce:75:fb:80:12:e0:5a:fb: 8b:76:e3:e9:c6:a8:d4:4b:9b:f4:cb:03:32:cc:cd:73 Fingerprint (SHA-256): BF:65:04:75:CA:71:84:72:CC:1E:EA:4F:D8:D9:9D:26:0D:09:5C:23:0D:D4:E7:17:29:5E:1C:AD:A2:57:C9:44 Fingerprint (SHA1): CD:31:BA:03:6D:C2:19:9C:8B:87:C4:92:13:69:96:6E:C2:6B:CD:32 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13236: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13237: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202182 (0x19581206) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:13:17 2016 Not After : Sun Apr 25 21:13:17 2021 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:ae:26:9d:71:56:81:80:83:06:e7:15:23:cf:db:b5: af:74:07:62:22:50:92:e4:84:0f:68:2d:42:3d:b1:e6: ef:09:05:56:f8:2c:9f:0c:87:e1:d5:ea:c7:c5:47:f4: bb:b2:b8:6d:f0:17:37:a8:58:c4:68:6f:66:c1:1b:f9: 65:9a:cc:5d:b1:5d:9b:af:af:a1:30:b4:a9:90:5a:d6: be:21:86:db:8a:73:e8:61:76:6e:b9:b1:42:0b:05:4e: 66:ff:d9:61:ac:e4:61:1c:b5:f4:fd:02:9a:e6:49:2d: 35:dc:e7:d7:db:06:3b:ed:30:05:f3:48:05:2f:c4:bf: bc:73:02:e2:71:2d:f4:3c:e9:cc:44:78:35:8f:4e:5a: ff:0c:bb:a1:9e:1e:58:83:bf:6a:1d:6c:6c:b8:99:c1: 87:80:47:b7:e0:a0:3a:de:2a:65:3e:7b:fd:14:8c:31: ff:be:71:78:c6:3d:a9:e2:b3:74:8e:4d:19:d7:94:97: 3b:8b:f9:61:c8:3c:e1:81:1f:73:43:c1:f9:85:65:54: 62:13:98:a1:fd:50:55:85:c1:4d:72:22:fc:fa:08:f6: 87:97:d0:52:96:af:fc:25:f7:d2:42:ad:42:a3:87:18: 60:b0:bb:a5:01:35:e5:a8:cc:6f:ee:79:7c:1b:5b:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:9f:84:5e:37:0c:8b:d5:c6:82:45:3b:a1:5c:32:61: 3e:bb:b7:4e:ae:69:79:93:d3:f4:36:48:e7:25:66:ce: ab:3f:72:6a:1e:dd:23:2f:e3:66:54:a2:4c:45:4f:f2: ea:9a:05:ad:d4:6e:9a:f8:a8:0a:5a:4c:b1:11:92:4a: a9:58:1b:ce:9c:cf:84:2b:74:d6:ad:60:c3:96:90:ac: 4a:ee:df:c3:90:d5:34:bc:7b:b8:f9:3f:f0:6c:0d:0d: 9d:c6:3b:b5:b5:a1:a6:d1:dd:34:5f:05:e1:62:29:99: f1:6a:63:4e:ce:26:86:58:d1:06:32:43:b4:34:c5:ae: 50:43:69:bb:93:b3:b9:72:d3:1e:d4:c7:6a:b4:e1:ab: af:6b:60:2e:98:0c:da:0e:e9:12:1c:85:d1:84:f0:30: ff:26:09:ad:34:f3:50:59:bf:a8:96:5a:7d:61:60:31: 55:ce:39:86:9a:9d:ac:36:df:5d:45:d4:57:26:cf:f9: f4:bd:fc:21:06:c3:61:37:c4:09:47:12:03:c8:c4:ee: cb:f6:5f:98:ed:a5:54:d2:b7:97:d1:28:56:15:9d:02: bf:9e:1a:64:37:95:20:a5:ac:80:db:c6:e6:6b:36:bd: 7c:32:f1:81:f5:30:e6:8e:5f:e5:d6:7c:06:9f:9c:ba Fingerprint (SHA-256): 3B:63:8D:0B:72:22:8D:99:6A:CF:4C:A8:8E:A9:80:4E:0E:5A:1E:A9:20:FA:B9:A2:ED:04:02:39:71:2D:35:8B Fingerprint (SHA1): DA:DF:EC:6D:A3:E6:D2:14:61:D0:24:CD:E7:F9:35:A8:E3:17:99:E3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13238: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13239: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13240: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202183 (0x19581207) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:13:23 2016 Not After : Sun Apr 25 21:13:23 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:ca:77:10:a1:d5:b4:8c:4a:e6:65:5b:75:cd:e7:28: 60:c2:b6:25:a0:a4:4a:80:a7:60:d5:c5:15:cc:51:0a: ae:c2:d8:de:a8:f4:db:d8:b3:16:09:d1:da:fd:2a:92: bf:3d:6c:2b:af:42:c2:d4:87:2a:0b:fb:d2:4a:57:d2: a6:c0:b9:7c:6f:5e:07:79:17:76:5d:70:ec:1b:f6:1a: 15:81:35:68:50:91:50:4d:b6:0a:45:cf:9b:9d:8a:f6: c7:be:63:ee:8d:1a:b5:d5:38:8c:fc:1a:14:5f:a5:49: e7:c1:16:cb:d1:3d:a6:b4:73:22:22:f3:5a:ac:43:5b: d6:a8:3d:d5:79:c8:54:32:ae:7f:70:e1:0c:c0:2c:c4: 99:b1:f8:99:f6:ce:84:8f:f7:e6:35:f0:d2:63:7b:f6: 64:6e:8a:81:5b:19:10:60:6b:5f:86:4a:50:47:ae:71: 7c:15:84:85:b7:75:fc:c6:7d:6a:35:db:fa:3f:5b:5e: d4:1c:f3:7e:e8:86:58:75:b8:40:62:38:60:45:8a:76: e4:93:10:0b:fd:e7:5b:37:cb:8e:23:bc:df:e8:b4:d5: a4:44:23:6b:9e:67:8a:19:c1:cd:73:61:a3:8e:7f:73: df:2a:8f:b6:22:a9:05:6e:41:07:3d:29:22:3c:7a:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:c1:ea:d3:9e:06:ac:ae:62:03:42:42:73:0d:d5:c8: 69:ab:71:9d:b7:c8:47:fc:57:b3:bf:a2:c8:0a:21:ca: 2d:4f:ef:93:0c:6e:24:cf:59:34:b9:06:82:e3:aa:f1: 91:56:be:8e:77:62:0c:bc:c7:8a:24:61:5c:e4:bf:ae: 3e:55:2a:36:81:b0:32:31:80:f7:c7:29:42:d9:78:e1: 5b:12:32:59:16:fc:4f:07:44:8f:93:87:69:36:dd:7e: a0:a8:98:66:ea:02:7d:12:cb:45:0f:49:10:7b:00:0c: 0d:19:3f:8c:44:08:b4:a5:4d:62:92:c7:96:fb:72:4b: 4f:2e:95:ae:17:34:81:27:c8:9c:24:ac:b9:72:99:2b: 5a:15:82:3d:50:c3:a5:9f:f2:6f:36:66:0b:fe:1e:d1: 70:ad:87:eb:f9:d1:fb:b9:ec:43:eb:23:1e:82:d1:8e: 74:d9:25:18:c3:72:fc:22:ed:96:59:7c:83:76:85:ca: fa:f5:03:79:66:82:13:86:7a:f8:74:2a:49:a5:a3:5c: d0:89:de:4b:4a:ed:a1:af:07:cd:df:89:df:3d:90:9b: 0e:77:28:33:1f:44:2f:4e:4c:af:c0:4e:cb:ed:61:51: 0d:60:2c:c6:db:3c:b8:f9:a2:43:e5:f9:fe:cf:a4:a5 Fingerprint (SHA-256): B9:81:83:A2:F4:FE:0C:1A:15:EC:61:78:4F:40:5F:26:37:D1:24:95:CC:E1:85:EF:F2:80:57:D8:A7:0F:91:26 Fingerprint (SHA1): D9:1C:68:E2:75:58:A8:0C:58:BB:DE:05:06:96:F7:86:FD:B9:F3:8F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #13241: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13242: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202186 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13243: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13244: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13245: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13246: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202187 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13247: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13248: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13249: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13250: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202188 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA1Root-425201965.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13251: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13252: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #13253: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13254: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 425202189 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13255: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13256: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #13257: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202186 (0x1958120a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:14:01 2016 Not After : Sun Apr 25 21:14:01 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:e1:4b:9b:78:31:3e:aa:01:fc:b0:a5:b5:4f:7b:9f: 04:39:04:a8:79:f3:39:c3:0f:92:48:f6:23:43:67:0d: 40:ec:d4:70:dd:97:e8:4f:8d:c7:ca:10:c3:65:29:8c: a1:f5:86:87:d7:76:18:1a:78:81:15:83:82:6f:6c:97: 57:c3:13:9b:6d:5d:12:ac:07:ec:b3:b7:99:ea:03:52: 8a:b5:a6:5c:29:ff:18:85:ac:5b:08:65:9e:4e:0f:e2: 49:49:85:2f:b6:02:ca:6e:51:62:a7:44:f8:f5:e4:94: 7f:bc:bf:3d:fb:9a:c3:85:b3:f6:a2:29:80:78:56:aa: 81:89:cb:bf:9a:5f:85:82:02:3c:62:81:27:a8:3b:f4: 1d:06:37:0c:b6:39:87:19:0e:16:05:b1:49:44:de:a9: 4c:8d:80:e5:a8:0d:3a:09:2a:a6:11:65:f5:8e:a9:c5: ca:89:1c:97:cb:ab:a4:f2:b9:29:22:e4:1c:41:55:8c: 5d:88:4e:6d:63:a0:17:bc:41:4b:4e:a8:6e:04:6a:64: 04:51:b7:01:a6:c1:e1:0a:25:56:df:fb:59:ee:b2:d8: bf:59:f9:24:a4:6f:8b:65:ca:ed:47:d0:27:81:ed:d2: 78:d2:90:ad:d7:a7:1c:d2:a9:2a:c7:11:4a:a8:47:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:de:0d:d1:c6:26:c2:d0:1d:3d:09:29:92:e6:ef:23: 0c:ec:4d:55:13:fc:46:c9:ee:d5:e1:1d:c5:71:2b:32: f6:09:43:08:76:fd:49:5f:15:65:d1:b8:0e:2b:a3:e6: 8e:5b:6b:60:35:6a:45:ab:f4:4f:50:89:22:a7:91:d4: c8:9f:ef:13:3b:18:9a:ae:2f:10:73:40:7b:f7:bd:76: dd:78:48:de:cc:70:4a:bb:2a:6a:b7:4d:d6:60:81:df: 89:a9:92:be:5e:17:92:95:e1:73:d5:c4:98:15:7b:f3: a9:81:d9:15:cd:c9:f0:94:d1:3f:08:fc:e0:95:a4:ab: 3d:43:6c:46:5f:05:51:0f:cc:3b:c1:ce:54:25:cd:18: 2c:19:d8:a9:65:ca:a8:ee:84:b3:8c:dd:e7:4d:af:7b: c4:ef:83:c1:5a:07:3f:85:5a:54:b9:d7:f1:dc:f6:89: 8f:5d:e3:3c:7e:83:7b:12:a5:6d:0f:af:3b:95:81:d3: 29:21:4a:24:76:81:59:e6:cc:22:60:5f:93:11:45:5a: 63:76:58:34:7d:7b:df:18:85:10:5a:03:92:6d:94:41: a8:95:91:9c:f7:14:fa:c5:b4:7c:03:27:2e:3f:93:36: 4d:bc:ca:f7:c8:5a:91:05:d3:0e:84:55:33:21:11:ba Fingerprint (SHA-256): A9:6A:B7:D3:9E:18:31:AC:6D:EE:7A:43:DA:7C:D8:59:1C:AA:FB:DD:4C:F6:43:71:DE:36:F6:48:38:CB:9B:4D Fingerprint (SHA1): 33:78:38:86:9A:12:27:E7:68:79:B6:C0:8A:8D:E6:50:E0:B3:1D:CB Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13258: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #13259: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202190 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13260: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #13261: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #13262: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202191 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13263: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #13264: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #13265: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13266: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425202192 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13267: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13268: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425202193 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13269: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13270: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #13271: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13272: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13273: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425202194 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425201966.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13274: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13275: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13276: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13277: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425202195 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13278: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13279: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #13280: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202190 (0x1958120e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 21:14:36 2016 Not After : Sun Apr 25 21:14:36 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:ec:36:1a:29:01:94:27:d4:de:50:70:86:f7:66:9e: 4a:a2:22:9e:ee:49:e5:33:20:e8:cd:f3:73:f5:f4:ca: 46:ef:e6:aa:a4:e5:5a:5c:b6:71:33:ee:b9:cf:79:27: 67:8e:f0:92:f3:71:e6:d3:da:62:cd:c1:e4:ec:07:76: 04:06:18:8b:4b:29:aa:72:58:55:05:dc:78:47:02:b6: 84:99:a9:16:58:db:ce:b8:cb:35:1f:80:43:ce:de:36: 3e:83:cc:1d:f9:1a:ed:2b:2f:11:5e:75:c7:1c:02:68: 68:c5:92:33:0f:bc:a4:18:24:fa:0f:73:3d:74:b7:a1: d9:cb:bd:0a:17:24:68:06:80:d5:a8:2a:97:96:e2:7e: 19:17:47:11:9f:1a:b7:d3:f6:59:35:9f:9f:bf:b8:21: 85:21:d3:07:90:3f:27:5a:5e:57:c5:23:fb:d5:34:ac: 48:28:2c:8c:18:5c:67:10:ca:f6:ee:29:e0:46:68:9b: 4b:bd:40:7f:b4:f0:74:8e:3c:67:54:c4:b5:ca:59:43: 88:6e:72:38:31:5a:9e:d3:16:5b:e6:9a:e4:ab:5c:96: 3a:ad:f8:2c:e0:04:64:dc:b6:7a:a1:99:b5:a8:ca:84: 7f:3f:19:9a:a6:6d:ac:cd:41:4a:51:ed:2c:d5:d7:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:dc:a1:e6:bf:70:09:3d:40:5f:42:28:43:5c:ce:50: 78:fa:c3:41:24:54:47:ae:dc:62:fb:2a:5c:c7:08:d9: 8f:2f:f9:72:15:f7:7d:2f:16:56:f4:f1:a6:52:60:2a: f5:83:b7:2e:12:7b:67:c2:de:d7:96:20:82:3d:cf:82: 5c:cf:e3:10:41:0e:84:c3:11:4f:9e:0f:c6:5a:23:3b: 5a:0c:50:7b:b3:61:de:9e:f3:aa:89:b9:89:4c:80:52: e7:e7:5e:be:b6:85:c6:78:d2:3a:97:07:da:61:cb:0b: 82:73:75:50:0d:32:94:1f:53:c1:25:34:f7:72:39:0f: 78:42:74:df:af:37:9c:ef:9b:2c:38:da:e6:de:7f:c1: ee:e9:70:d3:f1:87:fe:5c:cc:39:36:80:fa:ea:d1:2e: fd:7c:4b:63:34:e7:6b:08:fb:81:e8:d2:a1:00:6a:13: 96:56:89:91:55:7c:4f:e1:c4:66:15:17:00:e7:51:13: 28:de:9b:99:ec:a4:a6:ad:e3:b4:9e:b0:d4:f3:fe:b3: 81:ce:db:fc:fa:c9:ae:69:10:d8:4b:30:ab:f2:ee:9c: 19:8e:fa:1a:75:0a:14:8f:b8:89:6e:92:23:d4:5a:a5: ce:ff:31:df:31:4f:f1:e5:d3:e5:97:18:36:7c:aa:74 Fingerprint (SHA-256): EC:31:52:49:3E:74:55:AD:96:F1:CD:93:D0:1D:91:A3:90:2A:A1:E8:62:58:D4:C2:23:CB:8F:9D:A1:70:61:B2 Fingerprint (SHA1): 99:93:3C:9C:37:FF:81:2F:BC:7E:C3:96:0F:EF:60:92:7E:A3:01:24 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13281: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202191 (0x1958120f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 21:14:44 2016 Not After : Sun Apr 25 21:14:44 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:40:c2:21:e6:70:d4:0d:47:e4:90:ff:46:0d:fc:71: f5:58:1b:c2:73:50:30:dd:e2:2e:fa:9c:ed:ff:5e:85: 56:03:99:4d:76:ce:6a:bf:e9:e2:fa:b2:8f:cd:4e:fa: b1:c2:87:ac:b5:a2:8b:72:fc:92:a8:62:9e:99:aa:0d: dd:b8:4f:28:2e:35:68:d2:3e:bd:6c:cc:a2:83:b9:b8: 49:f9:87:4d:36:96:0d:72:6d:22:28:91:0e:c0:f1:0d: 51:95:ad:96:bf:b6:fd:68:c6:17:d2:b6:47:31:ae:d6: 47:75:f7:3b:24:3b:ec:74:c4:91:9c:c6:a8:3d:d5:c3: 33:4a:ae:00:fb:db:57:18:93:8c:9f:8e:1e:82:b5:a4: b2:10:88:14:1c:90:c0:df:3e:71:00:11:aa:a2:68:8e: 01:54:2c:3c:09:bb:00:27:ec:eb:15:32:bc:0e:f0:4c: b6:19:07:d9:ad:e2:85:2a:7d:27:b4:f1:05:7e:c1:19: 50:17:70:51:dd:a4:19:f9:da:f8:14:0c:c2:d4:c5:a4: f0:aa:56:a1:65:a8:fe:2c:8c:4d:0a:ea:17:f4:b5:06: 93:de:96:9a:67:10:8b:d8:27:1e:36:20:55:17:93:76: 78:c4:ec:ea:fe:1f:b4:9a:73:48:e0:5c:27:7e:e2:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:48:91:e8:74:66:12:11:23:0a:1e:88:53:11:d7:60: ec:f1:54:60:82:c6:2c:9b:46:b5:ff:2d:6a:5e:e8:18: 94:33:ea:e1:b1:92:33:c3:4d:a1:ae:93:9d:6f:25:38: 72:32:d6:ef:8a:68:30:2c:67:9b:f3:b9:fe:96:83:4b: 47:ae:2f:f4:f2:be:7f:ee:87:d3:ab:b7:fa:b7:8f:89: 6e:05:da:5e:1a:31:c3:a8:fa:6e:77:6d:06:c8:43:43: cc:f7:98:c5:ab:97:72:55:a5:59:f6:bd:c4:53:f7:b6: db:c3:a9:0b:68:97:a5:8d:13:78:76:9f:9b:57:70:ed: 63:b5:9b:81:bd:f4:2b:28:16:b2:f8:de:a3:66:40:5f: c0:a9:31:54:db:ea:db:55:14:b3:2f:91:95:e7:9a:37: ae:a4:3c:f5:b9:f4:7c:22:31:03:12:ff:5e:c1:d8:10: 4c:a4:8e:f3:33:f2:f3:a4:59:e1:94:73:8c:78:49:b0: f0:24:d0:ad:68:ea:1b:e5:9b:3d:2a:da:45:3e:d1:09: 6f:73:33:a1:6e:6b:06:4e:7e:cd:42:f0:76:c2:3d:02: 3b:b7:13:3f:fd:cc:c9:b3:48:2c:df:c1:88:e1:a5:b6: 4e:6d:a4:3c:37:dc:af:3d:f6:b8:e5:13:c0:21:ed:e7 Fingerprint (SHA-256): E1:62:E3:1B:8E:68:62:70:56:CD:AE:A6:36:F6:CD:48:9A:72:44:F7:83:C7:00:6A:7A:D7:DE:49:A1:AD:AD:A8 Fingerprint (SHA1): 3E:B7:0F:C1:3F:AF:6C:02:B3:7D:F0:EB:38:40:82:DF:3C:3B:37:3B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13282: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202191 (0x1958120f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 21:14:44 2016 Not After : Sun Apr 25 21:14:44 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:40:c2:21:e6:70:d4:0d:47:e4:90:ff:46:0d:fc:71: f5:58:1b:c2:73:50:30:dd:e2:2e:fa:9c:ed:ff:5e:85: 56:03:99:4d:76:ce:6a:bf:e9:e2:fa:b2:8f:cd:4e:fa: b1:c2:87:ac:b5:a2:8b:72:fc:92:a8:62:9e:99:aa:0d: dd:b8:4f:28:2e:35:68:d2:3e:bd:6c:cc:a2:83:b9:b8: 49:f9:87:4d:36:96:0d:72:6d:22:28:91:0e:c0:f1:0d: 51:95:ad:96:bf:b6:fd:68:c6:17:d2:b6:47:31:ae:d6: 47:75:f7:3b:24:3b:ec:74:c4:91:9c:c6:a8:3d:d5:c3: 33:4a:ae:00:fb:db:57:18:93:8c:9f:8e:1e:82:b5:a4: b2:10:88:14:1c:90:c0:df:3e:71:00:11:aa:a2:68:8e: 01:54:2c:3c:09:bb:00:27:ec:eb:15:32:bc:0e:f0:4c: b6:19:07:d9:ad:e2:85:2a:7d:27:b4:f1:05:7e:c1:19: 50:17:70:51:dd:a4:19:f9:da:f8:14:0c:c2:d4:c5:a4: f0:aa:56:a1:65:a8:fe:2c:8c:4d:0a:ea:17:f4:b5:06: 93:de:96:9a:67:10:8b:d8:27:1e:36:20:55:17:93:76: 78:c4:ec:ea:fe:1f:b4:9a:73:48:e0:5c:27:7e:e2:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:48:91:e8:74:66:12:11:23:0a:1e:88:53:11:d7:60: ec:f1:54:60:82:c6:2c:9b:46:b5:ff:2d:6a:5e:e8:18: 94:33:ea:e1:b1:92:33:c3:4d:a1:ae:93:9d:6f:25:38: 72:32:d6:ef:8a:68:30:2c:67:9b:f3:b9:fe:96:83:4b: 47:ae:2f:f4:f2:be:7f:ee:87:d3:ab:b7:fa:b7:8f:89: 6e:05:da:5e:1a:31:c3:a8:fa:6e:77:6d:06:c8:43:43: cc:f7:98:c5:ab:97:72:55:a5:59:f6:bd:c4:53:f7:b6: db:c3:a9:0b:68:97:a5:8d:13:78:76:9f:9b:57:70:ed: 63:b5:9b:81:bd:f4:2b:28:16:b2:f8:de:a3:66:40:5f: c0:a9:31:54:db:ea:db:55:14:b3:2f:91:95:e7:9a:37: ae:a4:3c:f5:b9:f4:7c:22:31:03:12:ff:5e:c1:d8:10: 4c:a4:8e:f3:33:f2:f3:a4:59:e1:94:73:8c:78:49:b0: f0:24:d0:ad:68:ea:1b:e5:9b:3d:2a:da:45:3e:d1:09: 6f:73:33:a1:6e:6b:06:4e:7e:cd:42:f0:76:c2:3d:02: 3b:b7:13:3f:fd:cc:c9:b3:48:2c:df:c1:88:e1:a5:b6: 4e:6d:a4:3c:37:dc:af:3d:f6:b8:e5:13:c0:21:ed:e7 Fingerprint (SHA-256): E1:62:E3:1B:8E:68:62:70:56:CD:AE:A6:36:F6:CD:48:9A:72:44:F7:83:C7:00:6A:7A:D7:DE:49:A1:AD:AD:A8 Fingerprint (SHA1): 3E:B7:0F:C1:3F:AF:6C:02:B3:7D:F0:EB:38:40:82:DF:3C:3B:37:3B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13283: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #13284: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202196 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13285: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #13286: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #13287: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202197 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13288: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #13289: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #13290: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13291: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 425202198 -7 Bridge@Army < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13292: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13293: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 425202199 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13294: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13295: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #13296: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13297: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13298: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425202200 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-Bridge-425201967.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13299: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13300: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13301: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13302: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425202201 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13303: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13304: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13305: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13306: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425202202 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-BridgeNavy-425201968.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13307: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13308: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #13309: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13310: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425202203 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13311: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13312: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #13313: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202196 (0x19581214) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 21:15:35 2016 Not After : Sun Apr 25 21:15:35 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:2c:41:00:93:5a:51:d3:20:fb:c1:51:1d:28:49:7d: 91:a9:77:c3:df:e9:dd:c6:ee:7b:3c:7a:ef:a0:d9:e9: 47:34:df:31:30:c9:cd:14:3c:c4:ce:22:41:73:04:7f: 3c:f7:a3:48:d9:35:0c:e3:94:b2:fd:14:a4:2b:02:92: 9e:af:40:14:b0:95:f2:40:5d:2a:03:40:63:19:8c:4f: 99:32:f9:ef:8c:0d:f4:16:21:ab:77:b5:f7:75:d6:33: ef:de:d4:72:c8:03:a0:99:da:bc:71:18:fa:95:13:6a: 32:3f:52:1a:3a:3a:a8:6e:68:b1:01:55:70:78:67:b2: c8:66:05:aa:3e:94:46:fc:dd:6c:00:ec:c2:90:18:8a: 5d:18:ae:0b:3b:fa:de:5c:15:fd:9a:e0:35:51:55:1f: 90:31:64:45:1d:f1:78:b8:fa:bd:63:65:f9:1d:e5:ee: 9b:31:50:b2:2a:7d:62:be:3b:eb:a6:cc:e4:43:87:34: 38:2b:47:46:d1:d3:7c:4f:60:81:bb:98:07:cf:31:5b: 3d:c2:e4:a6:dc:21:34:e0:82:eb:81:94:6a:6b:ce:1f: 2c:27:88:de:72:d5:b2:b4:39:bd:5c:20:96:b1:4f:de: 0e:e2:42:03:42:68:7d:18:91:5b:da:13:44:25:4b:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:1b:fd:c1:64:a8:02:84:9f:a3:37:28:67:c5:f9:3d: a2:98:ce:5e:2f:9b:15:60:58:f7:78:6c:f4:d3:20:d4: 93:78:60:e0:39:12:79:4b:6a:49:93:08:6a:7e:10:d6: 99:84:de:3c:25:f2:9b:c5:fe:41:d0:ae:94:a7:f1:b7: 40:d1:06:c3:68:fb:d9:99:9e:d9:3a:66:04:57:4c:48: db:e2:79:b3:26:6f:e0:ce:00:8e:1c:51:a3:5b:6c:5a: 6a:4c:63:68:33:03:1e:b5:4f:1f:4a:2b:78:97:66:69: 33:6e:90:5e:21:42:f4:c8:22:b1:cc:6b:b5:c4:8c:20: 61:7e:39:fb:7e:1f:d7:17:b0:95:87:47:b6:84:79:d4: 38:9f:76:6a:9d:96:c9:f4:0a:ed:81:0d:97:21:ea:2c: 47:97:6a:44:af:21:b0:db:eb:a7:94:e7:ff:c2:7e:10: 1f:55:2f:5e:04:4a:93:e0:89:c3:90:c3:1f:64:dd:14: 5e:c7:c7:74:f9:54:4b:da:df:0e:7d:42:ba:e7:13:94: fc:e4:ae:32:4c:35:52:64:8b:39:1a:3f:92:a3:56:c1: cd:ba:af:f5:4f:7a:ae:a2:95:dd:e2:79:54:12:b3:81: 83:48:1f:55:61:02:fc:56:b4:8c:74:dc:5b:26:aa:b3 Fingerprint (SHA-256): 55:7E:7B:4A:87:9B:57:33:1A:DC:9E:20:B7:92:B1:70:72:01:6A:F2:77:B2:A3:BA:F0:C1:D1:43:A0:65:7D:92 Fingerprint (SHA1): 99:DB:E6:8C:AA:B8:F1:76:3D:90:44:A5:D3:5D:CA:BF:44:77:24:5E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13314: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202197 (0x19581215) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 21:15:44 2016 Not After : Sun Apr 25 21:15:44 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:01:7b:06:4e:09:ca:10:84:ee:03:7c:a0:b3:43:4f: 80:0e:5c:65:7c:e3:89:83:a5:95:fc:6a:df:ab:e0:57: 02:64:04:84:84:a7:24:91:12:7e:08:58:29:3d:8a:cc: 59:ce:14:54:67:b5:dc:78:6b:f9:d1:40:cf:5b:d9:f7: 83:fc:77:86:68:05:3b:64:bc:a0:a1:f2:cc:76:e5:97: 6d:28:78:ca:62:c9:b3:a9:3b:e6:60:de:8f:69:dd:2b: 85:66:0c:c5:9b:69:73:f6:58:2c:96:14:bf:1f:57:30: 14:4b:74:2d:40:26:35:f5:27:0c:19:8c:d5:d9:26:58: 56:db:21:b8:c2:29:d5:3b:dc:1c:34:9b:a1:34:48:16: 03:8f:ae:fb:70:b6:28:0b:e8:e4:2d:06:12:ca:f5:2c: 6e:61:7e:d5:1e:c6:df:b5:3b:35:1d:89:83:73:3a:51: d2:18:1b:f3:4b:fc:67:51:87:f9:2c:5f:1c:1c:3d:e6: b3:81:76:9a:96:cf:73:6f:e7:de:dc:0f:e4:16:8b:56: 88:01:b8:be:e4:63:fb:91:fb:6e:fa:83:10:de:dd:da: 5e:80:9b:7c:99:fc:32:03:65:96:a8:71:cd:ef:ca:dd: b2:61:db:03:3e:8e:9a:38:8f:62:66:84:38:5e:29:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:8e:f3:1a:04:92:a4:d0:f0:c7:88:49:d4:7c:6f:c1: ea:54:58:c4:c5:86:17:fd:86:eb:82:8d:86:e7:94:cf: d8:4d:9e:46:7c:82:12:70:84:c7:c4:75:6c:c0:a0:2a: 4f:a4:8d:4b:cc:3f:7b:8b:11:7e:cd:1c:4c:ae:9c:a8: e5:31:36:08:7b:9d:07:2c:b4:67:a8:18:75:8f:e5:1f: 33:02:20:8e:fb:7f:1d:ef:37:9d:83:32:97:f9:07:a9: 51:27:4a:d8:dc:4c:26:41:91:80:bf:03:79:33:dd:5d: ed:17:d4:c0:18:82:10:a9:58:63:20:b8:da:a9:30:9e: 3e:3a:2a:c6:83:4c:5a:34:70:5e:f6:4d:01:da:29:8f: 4b:c2:82:ab:dc:eb:23:5a:bf:08:96:ac:e8:3d:0d:22: 92:d4:21:eb:eb:0e:3c:39:9f:83:1b:49:97:d0:eb:c1: 6f:4e:4a:cc:c3:b0:d4:73:56:7e:2b:a5:6a:aa:fe:84: 6d:32:a6:a6:85:33:8c:8d:c5:06:68:a0:7e:32:c1:98: e4:f9:24:2f:42:23:51:6f:cd:92:39:65:86:95:03:d7: 9e:eb:97:04:43:25:ef:a7:5a:6e:96:62:df:6c:14:8d: f9:01:ea:1b:81:f9:98:45:9d:88:a0:25:bd:06:d5:5f Fingerprint (SHA-256): 9B:58:22:7C:4B:B3:A1:99:5E:DC:53:64:A7:CB:17:F4:35:6F:A1:AF:DE:92:6B:C7:E0:E1:5E:44:0D:44:81:F3 Fingerprint (SHA1): 06:DA:F6:5F:94:D4:08:2D:91:F4:A6:1C:B8:E8:5F:C5:00:E2:05:8D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13315: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202197 (0x19581215) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 21:15:44 2016 Not After : Sun Apr 25 21:15:44 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:01:7b:06:4e:09:ca:10:84:ee:03:7c:a0:b3:43:4f: 80:0e:5c:65:7c:e3:89:83:a5:95:fc:6a:df:ab:e0:57: 02:64:04:84:84:a7:24:91:12:7e:08:58:29:3d:8a:cc: 59:ce:14:54:67:b5:dc:78:6b:f9:d1:40:cf:5b:d9:f7: 83:fc:77:86:68:05:3b:64:bc:a0:a1:f2:cc:76:e5:97: 6d:28:78:ca:62:c9:b3:a9:3b:e6:60:de:8f:69:dd:2b: 85:66:0c:c5:9b:69:73:f6:58:2c:96:14:bf:1f:57:30: 14:4b:74:2d:40:26:35:f5:27:0c:19:8c:d5:d9:26:58: 56:db:21:b8:c2:29:d5:3b:dc:1c:34:9b:a1:34:48:16: 03:8f:ae:fb:70:b6:28:0b:e8:e4:2d:06:12:ca:f5:2c: 6e:61:7e:d5:1e:c6:df:b5:3b:35:1d:89:83:73:3a:51: d2:18:1b:f3:4b:fc:67:51:87:f9:2c:5f:1c:1c:3d:e6: b3:81:76:9a:96:cf:73:6f:e7:de:dc:0f:e4:16:8b:56: 88:01:b8:be:e4:63:fb:91:fb:6e:fa:83:10:de:dd:da: 5e:80:9b:7c:99:fc:32:03:65:96:a8:71:cd:ef:ca:dd: b2:61:db:03:3e:8e:9a:38:8f:62:66:84:38:5e:29:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:8e:f3:1a:04:92:a4:d0:f0:c7:88:49:d4:7c:6f:c1: ea:54:58:c4:c5:86:17:fd:86:eb:82:8d:86:e7:94:cf: d8:4d:9e:46:7c:82:12:70:84:c7:c4:75:6c:c0:a0:2a: 4f:a4:8d:4b:cc:3f:7b:8b:11:7e:cd:1c:4c:ae:9c:a8: e5:31:36:08:7b:9d:07:2c:b4:67:a8:18:75:8f:e5:1f: 33:02:20:8e:fb:7f:1d:ef:37:9d:83:32:97:f9:07:a9: 51:27:4a:d8:dc:4c:26:41:91:80:bf:03:79:33:dd:5d: ed:17:d4:c0:18:82:10:a9:58:63:20:b8:da:a9:30:9e: 3e:3a:2a:c6:83:4c:5a:34:70:5e:f6:4d:01:da:29:8f: 4b:c2:82:ab:dc:eb:23:5a:bf:08:96:ac:e8:3d:0d:22: 92:d4:21:eb:eb:0e:3c:39:9f:83:1b:49:97:d0:eb:c1: 6f:4e:4a:cc:c3:b0:d4:73:56:7e:2b:a5:6a:aa:fe:84: 6d:32:a6:a6:85:33:8c:8d:c5:06:68:a0:7e:32:c1:98: e4:f9:24:2f:42:23:51:6f:cd:92:39:65:86:95:03:d7: 9e:eb:97:04:43:25:ef:a7:5a:6e:96:62:df:6c:14:8d: f9:01:ea:1b:81:f9:98:45:9d:88:a0:25:bd:06:d5:5f Fingerprint (SHA-256): 9B:58:22:7C:4B:B3:A1:99:5E:DC:53:64:A7:CB:17:F4:35:6F:A1:AF:DE:92:6B:C7:E0:E1:5E:44:0D:44:81:F3 Fingerprint (SHA1): 06:DA:F6:5F:94:D4:08:2D:91:F4:A6:1C:B8:E8:5F:C5:00:E2:05:8D Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13316: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #13317: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202196 (0x19581214) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 21:15:35 2016 Not After : Sun Apr 25 21:15:35 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:2c:41:00:93:5a:51:d3:20:fb:c1:51:1d:28:49:7d: 91:a9:77:c3:df:e9:dd:c6:ee:7b:3c:7a:ef:a0:d9:e9: 47:34:df:31:30:c9:cd:14:3c:c4:ce:22:41:73:04:7f: 3c:f7:a3:48:d9:35:0c:e3:94:b2:fd:14:a4:2b:02:92: 9e:af:40:14:b0:95:f2:40:5d:2a:03:40:63:19:8c:4f: 99:32:f9:ef:8c:0d:f4:16:21:ab:77:b5:f7:75:d6:33: ef:de:d4:72:c8:03:a0:99:da:bc:71:18:fa:95:13:6a: 32:3f:52:1a:3a:3a:a8:6e:68:b1:01:55:70:78:67:b2: c8:66:05:aa:3e:94:46:fc:dd:6c:00:ec:c2:90:18:8a: 5d:18:ae:0b:3b:fa:de:5c:15:fd:9a:e0:35:51:55:1f: 90:31:64:45:1d:f1:78:b8:fa:bd:63:65:f9:1d:e5:ee: 9b:31:50:b2:2a:7d:62:be:3b:eb:a6:cc:e4:43:87:34: 38:2b:47:46:d1:d3:7c:4f:60:81:bb:98:07:cf:31:5b: 3d:c2:e4:a6:dc:21:34:e0:82:eb:81:94:6a:6b:ce:1f: 2c:27:88:de:72:d5:b2:b4:39:bd:5c:20:96:b1:4f:de: 0e:e2:42:03:42:68:7d:18:91:5b:da:13:44:25:4b:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:1b:fd:c1:64:a8:02:84:9f:a3:37:28:67:c5:f9:3d: a2:98:ce:5e:2f:9b:15:60:58:f7:78:6c:f4:d3:20:d4: 93:78:60:e0:39:12:79:4b:6a:49:93:08:6a:7e:10:d6: 99:84:de:3c:25:f2:9b:c5:fe:41:d0:ae:94:a7:f1:b7: 40:d1:06:c3:68:fb:d9:99:9e:d9:3a:66:04:57:4c:48: db:e2:79:b3:26:6f:e0:ce:00:8e:1c:51:a3:5b:6c:5a: 6a:4c:63:68:33:03:1e:b5:4f:1f:4a:2b:78:97:66:69: 33:6e:90:5e:21:42:f4:c8:22:b1:cc:6b:b5:c4:8c:20: 61:7e:39:fb:7e:1f:d7:17:b0:95:87:47:b6:84:79:d4: 38:9f:76:6a:9d:96:c9:f4:0a:ed:81:0d:97:21:ea:2c: 47:97:6a:44:af:21:b0:db:eb:a7:94:e7:ff:c2:7e:10: 1f:55:2f:5e:04:4a:93:e0:89:c3:90:c3:1f:64:dd:14: 5e:c7:c7:74:f9:54:4b:da:df:0e:7d:42:ba:e7:13:94: fc:e4:ae:32:4c:35:52:64:8b:39:1a:3f:92:a3:56:c1: cd:ba:af:f5:4f:7a:ae:a2:95:dd:e2:79:54:12:b3:81: 83:48:1f:55:61:02:fc:56:b4:8c:74:dc:5b:26:aa:b3 Fingerprint (SHA-256): 55:7E:7B:4A:87:9B:57:33:1A:DC:9E:20:B7:92:B1:70:72:01:6A:F2:77:B2:A3:BA:F0:C1:D1:43:A0:65:7D:92 Fingerprint (SHA1): 99:DB:E6:8C:AA:B8:F1:76:3D:90:44:A5:D3:5D:CA:BF:44:77:24:5E Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13318: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202197 (0x19581215) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 21:15:44 2016 Not After : Sun Apr 25 21:15:44 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:01:7b:06:4e:09:ca:10:84:ee:03:7c:a0:b3:43:4f: 80:0e:5c:65:7c:e3:89:83:a5:95:fc:6a:df:ab:e0:57: 02:64:04:84:84:a7:24:91:12:7e:08:58:29:3d:8a:cc: 59:ce:14:54:67:b5:dc:78:6b:f9:d1:40:cf:5b:d9:f7: 83:fc:77:86:68:05:3b:64:bc:a0:a1:f2:cc:76:e5:97: 6d:28:78:ca:62:c9:b3:a9:3b:e6:60:de:8f:69:dd:2b: 85:66:0c:c5:9b:69:73:f6:58:2c:96:14:bf:1f:57:30: 14:4b:74:2d:40:26:35:f5:27:0c:19:8c:d5:d9:26:58: 56:db:21:b8:c2:29:d5:3b:dc:1c:34:9b:a1:34:48:16: 03:8f:ae:fb:70:b6:28:0b:e8:e4:2d:06:12:ca:f5:2c: 6e:61:7e:d5:1e:c6:df:b5:3b:35:1d:89:83:73:3a:51: d2:18:1b:f3:4b:fc:67:51:87:f9:2c:5f:1c:1c:3d:e6: b3:81:76:9a:96:cf:73:6f:e7:de:dc:0f:e4:16:8b:56: 88:01:b8:be:e4:63:fb:91:fb:6e:fa:83:10:de:dd:da: 5e:80:9b:7c:99:fc:32:03:65:96:a8:71:cd:ef:ca:dd: b2:61:db:03:3e:8e:9a:38:8f:62:66:84:38:5e:29:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:8e:f3:1a:04:92:a4:d0:f0:c7:88:49:d4:7c:6f:c1: ea:54:58:c4:c5:86:17:fd:86:eb:82:8d:86:e7:94:cf: d8:4d:9e:46:7c:82:12:70:84:c7:c4:75:6c:c0:a0:2a: 4f:a4:8d:4b:cc:3f:7b:8b:11:7e:cd:1c:4c:ae:9c:a8: e5:31:36:08:7b:9d:07:2c:b4:67:a8:18:75:8f:e5:1f: 33:02:20:8e:fb:7f:1d:ef:37:9d:83:32:97:f9:07:a9: 51:27:4a:d8:dc:4c:26:41:91:80:bf:03:79:33:dd:5d: ed:17:d4:c0:18:82:10:a9:58:63:20:b8:da:a9:30:9e: 3e:3a:2a:c6:83:4c:5a:34:70:5e:f6:4d:01:da:29:8f: 4b:c2:82:ab:dc:eb:23:5a:bf:08:96:ac:e8:3d:0d:22: 92:d4:21:eb:eb:0e:3c:39:9f:83:1b:49:97:d0:eb:c1: 6f:4e:4a:cc:c3:b0:d4:73:56:7e:2b:a5:6a:aa:fe:84: 6d:32:a6:a6:85:33:8c:8d:c5:06:68:a0:7e:32:c1:98: e4:f9:24:2f:42:23:51:6f:cd:92:39:65:86:95:03:d7: 9e:eb:97:04:43:25:ef:a7:5a:6e:96:62:df:6c:14:8d: f9:01:ea:1b:81:f9:98:45:9d:88:a0:25:bd:06:d5:5f Fingerprint (SHA-256): 9B:58:22:7C:4B:B3:A1:99:5E:DC:53:64:A7:CB:17:F4:35:6F:A1:AF:DE:92:6B:C7:E0:E1:5E:44:0D:44:81:F3 Fingerprint (SHA1): 06:DA:F6:5F:94:D4:08:2D:91:F4:A6:1C:B8:E8:5F:C5:00:E2:05:8D Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13319: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202197 (0x19581215) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 21:15:44 2016 Not After : Sun Apr 25 21:15:44 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:01:7b:06:4e:09:ca:10:84:ee:03:7c:a0:b3:43:4f: 80:0e:5c:65:7c:e3:89:83:a5:95:fc:6a:df:ab:e0:57: 02:64:04:84:84:a7:24:91:12:7e:08:58:29:3d:8a:cc: 59:ce:14:54:67:b5:dc:78:6b:f9:d1:40:cf:5b:d9:f7: 83:fc:77:86:68:05:3b:64:bc:a0:a1:f2:cc:76:e5:97: 6d:28:78:ca:62:c9:b3:a9:3b:e6:60:de:8f:69:dd:2b: 85:66:0c:c5:9b:69:73:f6:58:2c:96:14:bf:1f:57:30: 14:4b:74:2d:40:26:35:f5:27:0c:19:8c:d5:d9:26:58: 56:db:21:b8:c2:29:d5:3b:dc:1c:34:9b:a1:34:48:16: 03:8f:ae:fb:70:b6:28:0b:e8:e4:2d:06:12:ca:f5:2c: 6e:61:7e:d5:1e:c6:df:b5:3b:35:1d:89:83:73:3a:51: d2:18:1b:f3:4b:fc:67:51:87:f9:2c:5f:1c:1c:3d:e6: b3:81:76:9a:96:cf:73:6f:e7:de:dc:0f:e4:16:8b:56: 88:01:b8:be:e4:63:fb:91:fb:6e:fa:83:10:de:dd:da: 5e:80:9b:7c:99:fc:32:03:65:96:a8:71:cd:ef:ca:dd: b2:61:db:03:3e:8e:9a:38:8f:62:66:84:38:5e:29:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:8e:f3:1a:04:92:a4:d0:f0:c7:88:49:d4:7c:6f:c1: ea:54:58:c4:c5:86:17:fd:86:eb:82:8d:86:e7:94:cf: d8:4d:9e:46:7c:82:12:70:84:c7:c4:75:6c:c0:a0:2a: 4f:a4:8d:4b:cc:3f:7b:8b:11:7e:cd:1c:4c:ae:9c:a8: e5:31:36:08:7b:9d:07:2c:b4:67:a8:18:75:8f:e5:1f: 33:02:20:8e:fb:7f:1d:ef:37:9d:83:32:97:f9:07:a9: 51:27:4a:d8:dc:4c:26:41:91:80:bf:03:79:33:dd:5d: ed:17:d4:c0:18:82:10:a9:58:63:20:b8:da:a9:30:9e: 3e:3a:2a:c6:83:4c:5a:34:70:5e:f6:4d:01:da:29:8f: 4b:c2:82:ab:dc:eb:23:5a:bf:08:96:ac:e8:3d:0d:22: 92:d4:21:eb:eb:0e:3c:39:9f:83:1b:49:97:d0:eb:c1: 6f:4e:4a:cc:c3:b0:d4:73:56:7e:2b:a5:6a:aa:fe:84: 6d:32:a6:a6:85:33:8c:8d:c5:06:68:a0:7e:32:c1:98: e4:f9:24:2f:42:23:51:6f:cd:92:39:65:86:95:03:d7: 9e:eb:97:04:43:25:ef:a7:5a:6e:96:62:df:6c:14:8d: f9:01:ea:1b:81:f9:98:45:9d:88:a0:25:bd:06:d5:5f Fingerprint (SHA-256): 9B:58:22:7C:4B:B3:A1:99:5E:DC:53:64:A7:CB:17:F4:35:6F:A1:AF:DE:92:6B:C7:E0:E1:5E:44:0D:44:81:F3 Fingerprint (SHA1): 06:DA:F6:5F:94:D4:08:2D:91:F4:A6:1C:B8:E8:5F:C5:00:E2:05:8D Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #13320: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #13321: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202204 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13322: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #13323: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #13324: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202205 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13325: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #13326: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #13327: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13328: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 425202206 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13329: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13330: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #13331: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13332: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 425202207 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13333: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13334: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #13335: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13336: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 425202208 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #13337: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13338: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 425202209 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #13339: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13340: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #13341: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13342: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13343: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 425202210 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13344: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13345: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13346: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13347: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 425202211 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13348: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13349: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13350: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13351: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425202212 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13352: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13353: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #13354: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13355: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425202213 --extCP < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #13356: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13357: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13358: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202204 (0x1958121c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Mon Apr 25 21:17:09 2016 Not After : Sun Apr 25 21:17:09 2066 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:22:9b:d5:11:fd:ce:e5:5d:e3:92:b3:41:e5:9f:95: 96:46:3c:e3:9e:30:1e:e3:3d:58:cb:3f:00:f3:c8:c1: d1:91:7f:7a:bc:bc:eb:ed:5b:be:30:07:3d:ef:48:91: d3:7b:5e:34:e1:1a:67:38:8d:09:99:7a:7a:47:b4:36: 9f:71:c7:af:2c:6a:84:77:aa:03:40:a9:be:8b:62:87: 1f:6c:13:78:be:07:96:62:f6:a6:32:e7:c7:a9:94:76: ec:6a:13:98:88:b1:f0:eb:92:b9:ac:49:35:22:51:41: 69:d0:f1:c1:c3:bc:12:c0:59:87:26:51:5b:87:46:84: 99:53:72:d7:fb:45:71:78:45:10:3a:64:0f:50:d3:8a: 7e:b4:b5:91:49:a1:b6:e1:99:b9:44:61:a3:3b:f7:00: 8e:33:65:e4:c4:77:94:ae:ef:7d:d6:89:e9:9b:94:6f: f5:c9:76:73:f1:95:bd:f2:1e:91:aa:4a:af:db:b3:39: 0c:60:13:b3:d4:60:a0:a0:79:5e:cb:75:df:32:ff:dc: d1:25:a9:8f:5e:a5:d7:0d:bf:c7:eb:52:fd:c2:79:21: 43:7c:cf:79:e6:7a:08:d7:b5:51:f6:ac:a2:f8:d0:1d: 99:65:5a:fa:81:f0:06:65:91:3b:96:62:7c:9f:8f:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:27:7b:a0:9e:42:6e:2f:73:af:98:b3:49:7d:5a:ce: 65:b2:df:3e:e9:bd:bb:26:2d:61:c5:80:f8:01:33:53: b3:77:1b:1b:3d:1a:97:01:68:03:aa:32:6b:76:17:57: 15:de:09:cb:0c:55:d8:04:05:a9:f9:ea:5a:43:4f:0c: 8c:e2:16:ac:87:52:69:0a:e5:25:05:cf:0a:a8:6a:d4: d9:1f:74:cd:6c:26:80:5a:0b:43:8f:24:25:5b:e4:8a: 6d:07:77:c2:8e:aa:77:f0:52:10:94:ca:84:60:c9:9d: e9:51:6e:a1:9c:09:cf:f2:e7:31:50:50:7e:dd:83:dc: bf:ce:b6:4a:10:c2:6b:a7:f9:dd:9f:72:61:41:fd:2b: 9d:b6:6a:d3:bf:35:ff:f4:2d:e0:82:3e:b7:fd:43:10: 4a:77:ab:2e:ce:15:8b:6a:4d:e5:ab:68:53:e8:ef:24: 3f:44:40:e4:8f:96:e2:5e:41:e7:f8:70:7b:81:8b:43: da:02:f6:a7:72:82:03:e1:b9:45:a1:49:23:e6:37:9b: 54:f8:96:0b:a3:1e:cb:9b:45:86:7b:35:6c:a9:e0:29: 8d:a1:4e:9b:c8:e6:2f:10:2a:6a:ea:93:c0:41:65:9a: 0b:35:a8:e6:d4:60:a3:93:1c:80:bb:1c:8b:6f:aa:ab Fingerprint (SHA-256): 3E:B9:01:90:8E:9C:7E:65:38:F2:48:C3:2F:F0:70:64:D6:00:55:2A:9C:F4:6E:41:53:F9:A6:9D:36:22:BE:F2 Fingerprint (SHA1): 0E:99:64:6B:46:28:21:18:D0:4E:C6:08:CF:81:71:3D:A1:A1:C8:6A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #13359: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13360: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13361: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13362: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13363: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13364: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13365: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13366: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13367: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202205 (0x1958121d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Mon Apr 25 21:17:19 2016 Not After : Sun Apr 25 21:17:19 2066 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:9e:c8:a5:4b:68:9a:c3:60:59:f4:e9:c1:e7:9d:35: dd:7a:fc:d4:9e:a5:0a:f0:14:b7:28:8c:c4:db:8a:80: c7:b1:62:72:a0:d5:cc:5d:dc:78:fe:ea:7f:61:32:b2: 08:c0:6d:47:c3:a8:6e:e2:88:5b:e4:0d:4b:a0:0c:dd: bc:d5:4e:c8:c7:40:66:28:c5:c6:30:e3:3d:03:c0:58: cc:08:f2:b5:f3:f7:d5:93:d4:cd:41:68:76:9a:df:6a: 86:92:62:51:48:8e:36:57:62:3e:6b:31:d4:d0:dc:92: d8:67:3d:ea:41:74:29:a9:a7:df:c4:e3:56:df:bd:1f: 65:4d:0b:49:50:c2:82:3e:22:a5:fb:a6:43:eb:50:fd: ac:c6:32:cc:14:a3:1a:c4:5e:85:be:e0:3d:cc:10:c0: 74:76:48:2e:e2:1c:72:6f:39:bc:44:17:e3:a1:0f:6a: db:1d:d3:07:96:02:98:b0:6f:dd:5f:9d:cf:2f:93:d1: fa:c2:64:a5:f3:7a:39:34:0b:60:4f:ed:b2:c4:68:13: f4:db:f0:62:19:13:08:71:29:d2:c1:95:5a:08:fd:20: 81:79:e6:6e:9d:3c:12:35:be:7f:f6:cc:48:fc:62:12: b2:16:fc:33:00:98:63:06:e5:68:ea:1d:ec:57:8a:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:ec:2d:99:6b:c7:d6:3d:fd:a5:2c:a9:c4:10:53:b3: c6:61:c2:d8:c8:43:96:e6:fa:b3:8b:b2:d5:bc:ae:2d: f4:56:1e:d8:66:40:6c:d6:aa:79:28:3b:a3:0d:97:67: 3a:4a:e3:d0:2b:dd:80:d3:2f:62:a4:43:a6:fe:20:16: 31:24:be:4b:7e:d7:f6:49:db:aa:c0:9a:d3:b6:3b:f5: dd:b4:32:22:11:e4:36:7d:70:3d:db:db:48:8c:b6:64: 14:60:44:da:dd:c6:15:ac:52:d6:b7:20:b5:36:59:61: 7e:56:e5:f2:09:3e:34:21:38:c9:69:73:c3:dc:94:5f: 99:94:2e:0e:5f:02:28:55:2d:11:de:93:d9:37:5d:c7: b0:73:49:e2:53:33:b8:fb:44:3f:b2:a0:c7:6f:96:10: 50:77:c4:0b:4e:a6:cc:29:1f:8f:86:bd:cc:a1:bf:2a: ac:78:18:0b:46:6b:80:32:7f:07:0a:df:19:28:92:ef: 82:cb:a3:bb:71:5e:7c:13:a7:96:7f:05:7b:11:19:7d: c9:4f:42:96:56:74:a0:58:5e:c4:68:4c:e9:65:b4:40: f1:3b:9b:b2:b7:22:eb:36:7f:a4:f6:b2:46:b8:65:78: 13:e4:99:ea:26:5c:56:ff:8b:09:5b:c2:a4:98:59:40 Fingerprint (SHA-256): D7:3C:11:19:59:E1:56:25:52:AE:E2:50:4F:C8:91:CB:97:9D:9C:28:D7:C6:3B:2E:73:B9:3A:2A:0D:45:2E:06 Fingerprint (SHA1): 5A:04:A4:6D:4E:82:AF:37:F2:A7:21:0F:F8:A9:96:C1:D8:29:45:5E Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #13368: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13369: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13370: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13371: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13372: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #13373: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13374: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #13375: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #13376: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #13377: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #13378: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #13379: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #13380: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #13381: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #13382: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Feb 20 16:25:05 2013 Not After : Tue Feb 20 16:25:05 2063 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:58:78:2a:a3:8a:14:49:b6:2d:13:eb:e2:b0:e5:6a: 02:ff:7f:a3:29:87:eb:50:34:c0:2e:26:92:a0:ce:75: 28:86:62:62:88:0a:c5:a0:35:37:f4:f9:cc:a2:07:9c: 90:8b:0f:6b:c6:3b:b8:cb:6c:ad:bd:08:0a:3c:0d:be: 92:b6:be:72:ee:c3:53:10:04:bc:4d:c9:12:2c:3d:c8: e8:66:01:fe:13:d3:94:ad:4a:be:ea:52:44:bb:c1:e2: 7b:c8:50:57:7b:ea:a0:eb:24:ba:7f:89:b8:12:57:a1: cd:e0:5c:01:37:a7:27:85:b4:97:fd:99:56:85:40:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:fc:34:78:a1:c1:07:50:6c:48:42:c8:dd:fa:8c:59: d8:af:3d:4c:87:b8:54:93:20:63:e1:16:18:a7:fa:aa: b3:92:c4:1a:a6:e6:b8:9c:db:c0:c2:88:d3:c4:9d:c8: 8b:26:b0:d0:6e:e8:be:8a:a5:83:e6:88:b7:0c:9a:d2: b7:0f:fd:32:77:a9:84:6d:9c:84:6f:b1:2e:49:20:eb: be:5d:5d:e6:a7:0a:f2:b5:5e:8e:fc:62:b2:30:43:b9: 4b:05:b4:79:e8:cb:63:43:f9:6e:ca:42:1c:7e:ec:bd: 37:84:8f:b7:bd:1f:d5:b3:dd:fe:01:98:78:37:45:65 Fingerprint (SHA-256): E0:53:A5:70:5A:29:33:E1:E2:BB:1C:6E:CC:90:1C:74:EF:78:9B:7C:B9:C0:EB:47:23:E5:9D:3E:99:EF:41:65 Fingerprint (SHA1): 1A:47:38:A7:FC:C0:BC:A3:03:B4:7E:9A:24:73:96:37:A9:AB:66:40 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #13383: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.114412.1.1 /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=paypal.com,OU=PayPal Production,O="PayPal, Inc.",L =San Jose,ST=California,C=US" Certificate 2 Subject: "CN=DigiCert SHA2 High Assurance Server CA,OU=www.digi cert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #13384: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.1.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #13385: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13386: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202214 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13387: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13388: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13389: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13390: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 425202215 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13391: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13392: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13393: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13394: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 425202216 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13395: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13396: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13397: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13398: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 425202217 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13399: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13400: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #13401: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13402: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 425202218 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13403: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13404: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #13405: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13406: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 425202219 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13407: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13408: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #13409: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13410: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 425202220 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13411: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13412: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #13413: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13414: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 425202221 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13415: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13416: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #13417: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13418: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 425202222 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13419: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13420: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13421: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202214 (0x19581226) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:19:46 2016 Not After : Sun Apr 25 21:19:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6f:24:41:c6:7d:26:f9:51:4a:62:c2:37:50:f1:a0:8c: 2b:35:4f:7f:c3:c7:e9:4c:df:ef:86:e3:8d:47:fd:ec: fa:3c:67:14:87:08:86:3c:91:ab:09:64:10:93:10:e4: c6:a2:52:d1:5a:47:33:c7:95:3e:c7:be:1d:85:7e:dc: ad:69:0d:db:67:bd:c7:84:77:42:a9:b5:99:e5:a4:d6: 2d:aa:00:8a:eb:bf:21:d6:78:fc:f8:4b:6c:21:39:bc: 13:39:58:b1:f9:b0:fe:ac:2f:a2:d0:70:50:19:b8:40: 91:4e:cf:92:1c:48:a0:6e:a9:ca:4f:1b:83:27:78:62: 03:0f:0f:51:f0:99:4d:82:11:b7:86:31:12:87:e5:30: d9:d4:86:3b:38:ad:2c:bd:95:64:c1:47:fc:7d:8c:d8: 04:26:42:76:ca:1a:36:d9:67:cf:ba:38:8c:49:e6:87: a4:49:aa:04:1e:fb:e0:68:23:5d:6c:10:9b:b5:e1:48: 32:7a:04:20:5c:ee:e1:76:cf:d2:7b:1b:a2:79:1d:10: 75:58:af:f7:59:07:c8:93:d4:f4:a2:92:28:71:62:e3: ba:5e:41:fc:9c:61:51:96:25:01:6b:08:5c:4a:bd:e5: 08:65:81:7e:a3:95:c2:7b:8d:02:d6:87:b2:15:cc:88 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:23:ce:cb:6c:c1:1b:41:ba:95:ca:f4:cc: 71:90:83:e5:9f:ad:3e:84:fe:5d:95:48:31:59:50:3e: 02:1c:49:8d:86:cb:eb:54:24:6c:c3:25:32:0f:08:c6: d7:63:49:5e:d5:39:e1:bb:5d:7d:8b:6b:d1:02 Fingerprint (SHA-256): 19:3F:BF:33:AC:52:34:88:EE:2C:23:42:B1:FD:9F:D8:77:FC:75:1E:3F:87:1C:2D:3C:77:5B:E0:C0:AA:1C:A7 Fingerprint (SHA1): 75:CE:4E:23:E6:EA:46:49:9E:D4:78:1C:61:9E:1B:BE:54:17:D9:94 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13422: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202214 (0x19581226) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:19:46 2016 Not After : Sun Apr 25 21:19:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6f:24:41:c6:7d:26:f9:51:4a:62:c2:37:50:f1:a0:8c: 2b:35:4f:7f:c3:c7:e9:4c:df:ef:86:e3:8d:47:fd:ec: fa:3c:67:14:87:08:86:3c:91:ab:09:64:10:93:10:e4: c6:a2:52:d1:5a:47:33:c7:95:3e:c7:be:1d:85:7e:dc: ad:69:0d:db:67:bd:c7:84:77:42:a9:b5:99:e5:a4:d6: 2d:aa:00:8a:eb:bf:21:d6:78:fc:f8:4b:6c:21:39:bc: 13:39:58:b1:f9:b0:fe:ac:2f:a2:d0:70:50:19:b8:40: 91:4e:cf:92:1c:48:a0:6e:a9:ca:4f:1b:83:27:78:62: 03:0f:0f:51:f0:99:4d:82:11:b7:86:31:12:87:e5:30: d9:d4:86:3b:38:ad:2c:bd:95:64:c1:47:fc:7d:8c:d8: 04:26:42:76:ca:1a:36:d9:67:cf:ba:38:8c:49:e6:87: a4:49:aa:04:1e:fb:e0:68:23:5d:6c:10:9b:b5:e1:48: 32:7a:04:20:5c:ee:e1:76:cf:d2:7b:1b:a2:79:1d:10: 75:58:af:f7:59:07:c8:93:d4:f4:a2:92:28:71:62:e3: ba:5e:41:fc:9c:61:51:96:25:01:6b:08:5c:4a:bd:e5: 08:65:81:7e:a3:95:c2:7b:8d:02:d6:87:b2:15:cc:88 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:23:ce:cb:6c:c1:1b:41:ba:95:ca:f4:cc: 71:90:83:e5:9f:ad:3e:84:fe:5d:95:48:31:59:50:3e: 02:1c:49:8d:86:cb:eb:54:24:6c:c3:25:32:0f:08:c6: d7:63:49:5e:d5:39:e1:bb:5d:7d:8b:6b:d1:02 Fingerprint (SHA-256): 19:3F:BF:33:AC:52:34:88:EE:2C:23:42:B1:FD:9F:D8:77:FC:75:1E:3F:87:1C:2D:3C:77:5B:E0:C0:AA:1C:A7 Fingerprint (SHA1): 75:CE:4E:23:E6:EA:46:49:9E:D4:78:1C:61:9E:1B:BE:54:17:D9:94 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #13423: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202214 (0x19581226) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:19:46 2016 Not After : Sun Apr 25 21:19:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6f:24:41:c6:7d:26:f9:51:4a:62:c2:37:50:f1:a0:8c: 2b:35:4f:7f:c3:c7:e9:4c:df:ef:86:e3:8d:47:fd:ec: fa:3c:67:14:87:08:86:3c:91:ab:09:64:10:93:10:e4: c6:a2:52:d1:5a:47:33:c7:95:3e:c7:be:1d:85:7e:dc: ad:69:0d:db:67:bd:c7:84:77:42:a9:b5:99:e5:a4:d6: 2d:aa:00:8a:eb:bf:21:d6:78:fc:f8:4b:6c:21:39:bc: 13:39:58:b1:f9:b0:fe:ac:2f:a2:d0:70:50:19:b8:40: 91:4e:cf:92:1c:48:a0:6e:a9:ca:4f:1b:83:27:78:62: 03:0f:0f:51:f0:99:4d:82:11:b7:86:31:12:87:e5:30: d9:d4:86:3b:38:ad:2c:bd:95:64:c1:47:fc:7d:8c:d8: 04:26:42:76:ca:1a:36:d9:67:cf:ba:38:8c:49:e6:87: a4:49:aa:04:1e:fb:e0:68:23:5d:6c:10:9b:b5:e1:48: 32:7a:04:20:5c:ee:e1:76:cf:d2:7b:1b:a2:79:1d:10: 75:58:af:f7:59:07:c8:93:d4:f4:a2:92:28:71:62:e3: ba:5e:41:fc:9c:61:51:96:25:01:6b:08:5c:4a:bd:e5: 08:65:81:7e:a3:95:c2:7b:8d:02:d6:87:b2:15:cc:88 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:23:ce:cb:6c:c1:1b:41:ba:95:ca:f4:cc: 71:90:83:e5:9f:ad:3e:84:fe:5d:95:48:31:59:50:3e: 02:1c:49:8d:86:cb:eb:54:24:6c:c3:25:32:0f:08:c6: d7:63:49:5e:d5:39:e1:bb:5d:7d:8b:6b:d1:02 Fingerprint (SHA-256): 19:3F:BF:33:AC:52:34:88:EE:2C:23:42:B1:FD:9F:D8:77:FC:75:1E:3F:87:1C:2D:3C:77:5B:E0:C0:AA:1C:A7 Fingerprint (SHA1): 75:CE:4E:23:E6:EA:46:49:9E:D4:78:1C:61:9E:1B:BE:54:17:D9:94 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #13424: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202214 (0x19581226) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:19:46 2016 Not After : Sun Apr 25 21:19:46 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6f:24:41:c6:7d:26:f9:51:4a:62:c2:37:50:f1:a0:8c: 2b:35:4f:7f:c3:c7:e9:4c:df:ef:86:e3:8d:47:fd:ec: fa:3c:67:14:87:08:86:3c:91:ab:09:64:10:93:10:e4: c6:a2:52:d1:5a:47:33:c7:95:3e:c7:be:1d:85:7e:dc: ad:69:0d:db:67:bd:c7:84:77:42:a9:b5:99:e5:a4:d6: 2d:aa:00:8a:eb:bf:21:d6:78:fc:f8:4b:6c:21:39:bc: 13:39:58:b1:f9:b0:fe:ac:2f:a2:d0:70:50:19:b8:40: 91:4e:cf:92:1c:48:a0:6e:a9:ca:4f:1b:83:27:78:62: 03:0f:0f:51:f0:99:4d:82:11:b7:86:31:12:87:e5:30: d9:d4:86:3b:38:ad:2c:bd:95:64:c1:47:fc:7d:8c:d8: 04:26:42:76:ca:1a:36:d9:67:cf:ba:38:8c:49:e6:87: a4:49:aa:04:1e:fb:e0:68:23:5d:6c:10:9b:b5:e1:48: 32:7a:04:20:5c:ee:e1:76:cf:d2:7b:1b:a2:79:1d:10: 75:58:af:f7:59:07:c8:93:d4:f4:a2:92:28:71:62:e3: ba:5e:41:fc:9c:61:51:96:25:01:6b:08:5c:4a:bd:e5: 08:65:81:7e:a3:95:c2:7b:8d:02:d6:87:b2:15:cc:88 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:3c:02:1c:23:ce:cb:6c:c1:1b:41:ba:95:ca:f4:cc: 71:90:83:e5:9f:ad:3e:84:fe:5d:95:48:31:59:50:3e: 02:1c:49:8d:86:cb:eb:54:24:6c:c3:25:32:0f:08:c6: d7:63:49:5e:d5:39:e1:bb:5d:7d:8b:6b:d1:02 Fingerprint (SHA-256): 19:3F:BF:33:AC:52:34:88:EE:2C:23:42:B1:FD:9F:D8:77:FC:75:1E:3F:87:1C:2D:3C:77:5B:E0:C0:AA:1C:A7 Fingerprint (SHA1): 75:CE:4E:23:E6:EA:46:49:9E:D4:78:1C:61:9E:1B:BE:54:17:D9:94 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #13425: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13426: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13427: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13428: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #13429: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13430: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13431: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13432: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13433: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13434: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13435: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13436: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #13437: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13438: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13439: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13440: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #13441: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13442: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13443: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13444: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13445: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13446: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13447: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13448: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #13449: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13450: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13451: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13452: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425212223Z nextupdate=20170425212223Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 21:22:23 2016 Next Update: Tue Apr 25 21:22:23 2017 CRL Extensions: chains.sh: #13453: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425212224Z nextupdate=20170425212224Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 21:22:24 2016 Next Update: Tue Apr 25 21:22:24 2017 CRL Extensions: chains.sh: #13454: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425212225Z nextupdate=20170425212225Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 21:22:25 2016 Next Update: Tue Apr 25 21:22:25 2017 CRL Extensions: chains.sh: #13455: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425212226Z nextupdate=20170425212226Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 21:22:26 2016 Next Update: Tue Apr 25 21:22:26 2017 CRL Extensions: chains.sh: #13456: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425212227Z addcert 14 20160425212227Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 21:22:27 2016 Next Update: Tue Apr 25 21:22:25 2017 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Mon Apr 25 21:22:27 2016 CRL Extensions: chains.sh: #13457: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425212228Z addcert 15 20160425212228Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 21:22:28 2016 Next Update: Tue Apr 25 21:22:24 2017 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Mon Apr 25 21:22:28 2016 CRL Extensions: chains.sh: #13458: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13459: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13460: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #13461: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #13462: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #13463: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #13464: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #13465: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #13466: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #13467: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:21:00 2016 Not After : Sun Apr 25 21:21:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:b4:64:32:2c:4f:07:a9:9d:64:2f:71:51:61:58:17: 27:2c:d5:b7:c1:67:ef:b0:66:ec:b5:17:33:54:c9:c5: 35:98:90:1d:25:a8:7a:3e:88:66:d0:3c:b9:fa:c6:46: ab:8d:2e:2b:78:75:bd:5f:23:83:b5:5e:71:16:ca:be: 36:39:f4:b0:c8:a6:7e:05:62:1e:ed:cf:cb:ea:88:87: a1:7a:51:5d:7a:cb:11:57:e7:bd:df:bf:f7:0b:c2:94: 85:55:6e:46:47:b4:60:00:4e:eb:2b:e8:2e:b2:d2:70: cf:3a:30:25:c7:2c:1c:72:0c:38:9c:99:8f:54:cf:36: a3:69:10:33:28:e0:10:bb:49:af:4b:35:e5:4f:30:e5: db:64:35:67:b0:49:40:2b:9f:af:7b:2b:3e:4d:2d:15: 48:99:c7:a8:06:aa:81:95:15:58:e4:3b:a4:86:ac:e7: 78:58:80:eb:5c:e1:5a:c5:75:01:8a:02:cd:63:20:9b: c8:20:77:ee:1d:34:cc:b6:48:95:a0:da:a1:e7:e9:d5: 13:bb:32:58:f8:ff:52:65:cd:80:54:3b:ed:35:7f:ab: c9:b8:77:bf:4d:35:e9:5d:16:e5:03:ff:69:86:7e:f7: 3d:8b:1f:02:15:1e:22:77:38:1b:02:8c:b5:25:af:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:33:54:46:8f:e7:69:71:5f:a3:25:2f:f6:72:45:d8: 33:cb:3d:9d:53:91:e7:8c:33:7a:e6:22:b3:f1:79:3c: e2:e9:19:f6:e2:5c:dd:34:ff:33:57:f3:eb:db:88:b7: e4:db:15:80:c5:c3:c0:f0:0c:e2:cc:86:79:e7:61:1a: 1b:b6:78:00:88:56:86:cb:8c:54:8b:63:a7:e8:49:83: 8e:be:d0:8e:94:08:81:4e:b1:9e:1b:5a:2f:b7:91:bd: cb:bb:5d:a9:8a:9e:c4:4f:29:e0:e0:75:fe:a3:c4:00: bc:43:5d:bb:ba:b6:68:22:f3:3b:bc:44:29:83:4a:4c: 62:47:28:2e:33:98:04:75:5b:97:3c:7b:0f:f0:7c:28: f3:75:b8:26:29:28:c6:45:ff:a5:a5:49:75:08:bf:6c: 13:db:f3:ea:6e:44:47:cd:c1:79:93:49:4e:ee:f4:69: 37:d4:6d:f7:6d:f6:e2:13:37:84:e4:61:98:1f:14:7e: a8:e4:de:47:9d:dc:cb:29:72:34:0b:92:9c:04:c5:78: 8b:2b:48:ed:84:99:25:2e:15:fd:95:12:7b:84:32:cd: 2b:81:c5:b1:3d:31:f8:d6:6a:26:2b:5c:c8:8e:90:81: a6:29:4c:60:92:78:70:b3:59:35:4c:04:4d:c5:8b:e1 Fingerprint (SHA-256): 68:46:88:33:03:CD:64:A0:00:3E:FA:89:47:12:B2:3D:9D:B2:EC:95:4E:FA:EF:23:42:AE:2D:5C:72:C8:54:CE Fingerprint (SHA1): 22:3D:56:76:66:50:E0:9C:FF:86:2A:CF:87:BC:D1:99:36:94:2F:AA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #13468: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #13469: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:21:00 2016 Not After : Sun Apr 25 21:21:00 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:b4:64:32:2c:4f:07:a9:9d:64:2f:71:51:61:58:17: 27:2c:d5:b7:c1:67:ef:b0:66:ec:b5:17:33:54:c9:c5: 35:98:90:1d:25:a8:7a:3e:88:66:d0:3c:b9:fa:c6:46: ab:8d:2e:2b:78:75:bd:5f:23:83:b5:5e:71:16:ca:be: 36:39:f4:b0:c8:a6:7e:05:62:1e:ed:cf:cb:ea:88:87: a1:7a:51:5d:7a:cb:11:57:e7:bd:df:bf:f7:0b:c2:94: 85:55:6e:46:47:b4:60:00:4e:eb:2b:e8:2e:b2:d2:70: cf:3a:30:25:c7:2c:1c:72:0c:38:9c:99:8f:54:cf:36: a3:69:10:33:28:e0:10:bb:49:af:4b:35:e5:4f:30:e5: db:64:35:67:b0:49:40:2b:9f:af:7b:2b:3e:4d:2d:15: 48:99:c7:a8:06:aa:81:95:15:58:e4:3b:a4:86:ac:e7: 78:58:80:eb:5c:e1:5a:c5:75:01:8a:02:cd:63:20:9b: c8:20:77:ee:1d:34:cc:b6:48:95:a0:da:a1:e7:e9:d5: 13:bb:32:58:f8:ff:52:65:cd:80:54:3b:ed:35:7f:ab: c9:b8:77:bf:4d:35:e9:5d:16:e5:03:ff:69:86:7e:f7: 3d:8b:1f:02:15:1e:22:77:38:1b:02:8c:b5:25:af:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:33:54:46:8f:e7:69:71:5f:a3:25:2f:f6:72:45:d8: 33:cb:3d:9d:53:91:e7:8c:33:7a:e6:22:b3:f1:79:3c: e2:e9:19:f6:e2:5c:dd:34:ff:33:57:f3:eb:db:88:b7: e4:db:15:80:c5:c3:c0:f0:0c:e2:cc:86:79:e7:61:1a: 1b:b6:78:00:88:56:86:cb:8c:54:8b:63:a7:e8:49:83: 8e:be:d0:8e:94:08:81:4e:b1:9e:1b:5a:2f:b7:91:bd: cb:bb:5d:a9:8a:9e:c4:4f:29:e0:e0:75:fe:a3:c4:00: bc:43:5d:bb:ba:b6:68:22:f3:3b:bc:44:29:83:4a:4c: 62:47:28:2e:33:98:04:75:5b:97:3c:7b:0f:f0:7c:28: f3:75:b8:26:29:28:c6:45:ff:a5:a5:49:75:08:bf:6c: 13:db:f3:ea:6e:44:47:cd:c1:79:93:49:4e:ee:f4:69: 37:d4:6d:f7:6d:f6:e2:13:37:84:e4:61:98:1f:14:7e: a8:e4:de:47:9d:dc:cb:29:72:34:0b:92:9c:04:c5:78: 8b:2b:48:ed:84:99:25:2e:15:fd:95:12:7b:84:32:cd: 2b:81:c5:b1:3d:31:f8:d6:6a:26:2b:5c:c8:8e:90:81: a6:29:4c:60:92:78:70:b3:59:35:4c:04:4d:c5:8b:e1 Fingerprint (SHA-256): 68:46:88:33:03:CD:64:A0:00:3E:FA:89:47:12:B2:3D:9D:B2:EC:95:4E:FA:EF:23:42:AE:2D:5C:72:C8:54:CE Fingerprint (SHA1): 22:3D:56:76:66:50:E0:9C:FF:86:2A:CF:87:BC:D1:99:36:94:2F:AA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #13470: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #13471: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #13472: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202223 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13473: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #13474: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #13475: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13476: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 425202224 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13477: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13478: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13479: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201995.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #13480: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425201969.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13481: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13482: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #13483: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201995.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #13484: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 425202225 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13485: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13486: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13487: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201995.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #13488: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425201970.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13489: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13490: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #13491: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13492: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 425202226 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13493: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13494: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13495: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201995.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #13496: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425201971.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13497: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13498: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #13499: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0-425201995.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #13500: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9719/localhost-28098-CA0Root-425201972.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #13501: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13502: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20160425212418Z nextupdate=20170425212418Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Mon Apr 25 21:24:18 2016 Next Update: Tue Apr 25 21:24:18 2017 CRL Extensions: chains.sh: #13503: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425212419Z nextupdate=20170425212419Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 21:24:19 2016 Next Update: Tue Apr 25 21:24:19 2017 CRL Extensions: chains.sh: #13504: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20160425212419Z nextupdate=20170425212419Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Mon Apr 25 21:24:19 2016 Next Update: Tue Apr 25 21:24:19 2017 CRL Extensions: chains.sh: #13505: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20160425212420Z nextupdate=20170425212420Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Mon Apr 25 21:24:20 2016 Next Update: Tue Apr 25 21:24:20 2017 CRL Extensions: chains.sh: #13506: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425212421Z addcert 20 20160425212421Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 21:24:21 2016 Next Update: Tue Apr 25 21:24:19 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 21:24:21 2016 CRL Extensions: chains.sh: #13507: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20160425212422Z addcert 40 20160425212422Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Mon Apr 25 21:24:22 2016 Next Update: Tue Apr 25 21:24:19 2017 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Mon Apr 25 21:24:21 2016 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Mon Apr 25 21:24:22 2016 CRL Extensions: chains.sh: #13508: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #13509: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13510: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #13511: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202223 (0x1958122f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:22:43 2016 Not After : Sun Apr 25 21:22:43 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:41:2c:fd:0c:b0:48:9a:0b:94:83:b9:d7:c2:63:a8: 20:a0:b1:ed:92:31:e3:ff:c4:36:39:1b:cf:66:2a:23: b0:50:d8:fc:5a:e4:30:1c:63:75:c6:7c:00:19:d6:f6: 03:99:bb:1d:b2:e5:bb:0d:c5:74:41:cf:5f:e7:19:34: 9c:ff:97:2e:64:e6:fc:35:41:05:3c:1e:99:4d:30:07: 06:05:5c:4e:6f:f0:65:37:8c:d2:64:95:7d:ad:11:fb: e5:7f:66:b8:64:12:9c:df:23:40:08:99:bf:f1:fb:0f: 5f:34:be:f9:ee:a5:b2:84:43:0c:09:b4:36:d5:a1:4b: 58:65:c2:d4:2a:39:93:17:2c:99:a3:0c:4f:5e:33:52: c3:9a:42:a7:57:62:fc:86:40:9b:7c:34:6e:3f:66:a0: 95:4e:a6:6d:23:77:e6:a2:47:97:45:1f:25:e2:47:5c: dc:2c:ae:f3:67:9a:53:e1:fa:bc:76:a7:27:f2:63:fb: f0:c8:ca:bf:c4:ee:f1:2b:c0:8e:28:4e:42:bc:e9:74: 1f:e9:93:45:64:fd:4e:03:c6:52:5d:b2:a1:38:4f:90: 4d:62:ee:3d:7c:08:b7:c3:f5:e3:f9:95:a2:57:d6:42: f8:ea:8c:40:ca:20:b7:b2:b2:72:1f:73:11:25:00:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:ce:a9:ea:54:2b:04:a6:6c:e4:6f:10:3c:6d:e2:13: 9d:4f:aa:99:ed:81:bd:45:78:2c:0d:c1:d1:36:7e:54: 12:5d:d2:d8:69:a1:5a:9e:d2:ad:c5:b2:1d:e7:8e:d5: 14:9d:c6:9c:a9:8a:bf:c0:f3:e7:ad:81:94:95:bc:96: f2:cb:95:a9:12:ac:d4:4b:b1:c7:34:13:5b:27:f7:c2: 87:b7:5e:4e:ef:6a:d0:f6:27:6c:04:ca:da:77:b4:42: 18:e0:e2:01:b6:b6:3d:d2:07:cc:6a:36:d7:13:49:fb: 65:3d:90:34:94:ed:08:f7:6d:f7:9e:f4:bb:e5:56:df: 10:d1:67:99:93:63:72:fd:d1:5f:10:4d:0d:49:b7:ac: d0:02:37:1a:7e:81:20:4c:09:7d:e3:e9:54:fd:6a:e9: 1a:40:85:66:94:2a:fb:13:2e:1c:56:6f:4f:1f:35:a5: cd:e3:d6:cc:88:c9:46:de:7b:5a:06:da:b6:28:d7:77: 0e:3c:75:ea:3d:91:83:16:b9:93:c1:ac:f1:53:9a:ee: fe:4b:73:d9:dc:7c:ec:a1:a1:6a:34:cc:c7:92:d1:87: da:05:6e:44:12:9e:9b:9e:5d:be:55:79:82:f1:2a:35: 05:0c:d5:2a:dd:b4:88:ea:bc:c0:e9:91:ec:b7:25:a6 Fingerprint (SHA-256): 57:8E:30:8C:E5:74:48:DC:88:A6:94:53:A1:2C:A2:57:9B:06:73:E6:3F:83:A9:BB:49:55:5D:93:4C:D6:16:D0 Fingerprint (SHA1): C7:65:04:FE:A8:15:57:99:87:75:80:22:AC:31:39:B0:08:C0:13:A3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #13512: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #13513: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202223 (0x1958122f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Mon Apr 25 21:22:43 2016 Not After : Sun Apr 25 21:22:43 2066 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:41:2c:fd:0c:b0:48:9a:0b:94:83:b9:d7:c2:63:a8: 20:a0:b1:ed:92:31:e3:ff:c4:36:39:1b:cf:66:2a:23: b0:50:d8:fc:5a:e4:30:1c:63:75:c6:7c:00:19:d6:f6: 03:99:bb:1d:b2:e5:bb:0d:c5:74:41:cf:5f:e7:19:34: 9c:ff:97:2e:64:e6:fc:35:41:05:3c:1e:99:4d:30:07: 06:05:5c:4e:6f:f0:65:37:8c:d2:64:95:7d:ad:11:fb: e5:7f:66:b8:64:12:9c:df:23:40:08:99:bf:f1:fb:0f: 5f:34:be:f9:ee:a5:b2:84:43:0c:09:b4:36:d5:a1:4b: 58:65:c2:d4:2a:39:93:17:2c:99:a3:0c:4f:5e:33:52: c3:9a:42:a7:57:62:fc:86:40:9b:7c:34:6e:3f:66:a0: 95:4e:a6:6d:23:77:e6:a2:47:97:45:1f:25:e2:47:5c: dc:2c:ae:f3:67:9a:53:e1:fa:bc:76:a7:27:f2:63:fb: f0:c8:ca:bf:c4:ee:f1:2b:c0:8e:28:4e:42:bc:e9:74: 1f:e9:93:45:64:fd:4e:03:c6:52:5d:b2:a1:38:4f:90: 4d:62:ee:3d:7c:08:b7:c3:f5:e3:f9:95:a2:57:d6:42: f8:ea:8c:40:ca:20:b7:b2:b2:72:1f:73:11:25:00:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:ce:a9:ea:54:2b:04:a6:6c:e4:6f:10:3c:6d:e2:13: 9d:4f:aa:99:ed:81:bd:45:78:2c:0d:c1:d1:36:7e:54: 12:5d:d2:d8:69:a1:5a:9e:d2:ad:c5:b2:1d:e7:8e:d5: 14:9d:c6:9c:a9:8a:bf:c0:f3:e7:ad:81:94:95:bc:96: f2:cb:95:a9:12:ac:d4:4b:b1:c7:34:13:5b:27:f7:c2: 87:b7:5e:4e:ef:6a:d0:f6:27:6c:04:ca:da:77:b4:42: 18:e0:e2:01:b6:b6:3d:d2:07:cc:6a:36:d7:13:49:fb: 65:3d:90:34:94:ed:08:f7:6d:f7:9e:f4:bb:e5:56:df: 10:d1:67:99:93:63:72:fd:d1:5f:10:4d:0d:49:b7:ac: d0:02:37:1a:7e:81:20:4c:09:7d:e3:e9:54:fd:6a:e9: 1a:40:85:66:94:2a:fb:13:2e:1c:56:6f:4f:1f:35:a5: cd:e3:d6:cc:88:c9:46:de:7b:5a:06:da:b6:28:d7:77: 0e:3c:75:ea:3d:91:83:16:b9:93:c1:ac:f1:53:9a:ee: fe:4b:73:d9:dc:7c:ec:a1:a1:6a:34:cc:c7:92:d1:87: da:05:6e:44:12:9e:9b:9e:5d:be:55:79:82:f1:2a:35: 05:0c:d5:2a:dd:b4:88:ea:bc:c0:e9:91:ec:b7:25:a6 Fingerprint (SHA-256): 57:8E:30:8C:E5:74:48:DC:88:A6:94:53:A1:2C:A2:57:9B:06:73:E6:3F:83:A9:BB:49:55:5D:93:4C:D6:16:D0 Fingerprint (SHA1): C7:65:04:FE:A8:15:57:99:87:75:80:22:AC:31:39:B0:08:C0:13:A3 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #13514: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #13515: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #13516: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202227 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13517: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #13518: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #13519: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13520: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 425202228 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13521: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13522: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #13523: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13524: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 425202229 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13525: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13526: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #13527: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13528: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 425202230 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13529: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13530: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #13531: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -m 425202231 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #13532: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #13533: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #13534: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #13535: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 425202232 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13536: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13537: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #13538: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #13539: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 425202233 < /builddir/build/BUILD/nss-3.21.0/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #13540: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13541: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #13542: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #13543: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #13544: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202227 (0x19581233) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:24:35 2016 Not After : Sun Apr 25 21:24:35 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a5:c9:43:36:83:c8:57:0a:b5:d2:96:94:63:79:06: dc:3d:7d:b1:ef:f0:f5:41:e2:f6:bd:60:b7:20:9d:18: 7e:ca:28:ca:cd:4a:a3:95:6f:59:59:dd:17:2c:a7:96: 40:1e:95:07:0d:71:30:d5:44:76:8d:21:e3:7f:55:e5: c5:15:86:c1:82:c9:2a:0e:fa:39:bf:e1:2a:64:e2:8f: 43:85:20:10:fd:28:25:4d:00:3e:5d:7b:10:4f:2c:8c: 96:41:63:d4:ac:d2:ae:3a:7a:5e:58:8b:7d:94:75:ce: ad:ef:8f:95:0e:ed:43:f6:e5:f2:92:09:8d:fb:91:6f: 9a:2a:c9:03:89:7a:f3:33:2b:e0:cb:d4:c7:71:0e:f5: eb:cd:08:bc:66:f9:8e:e8:d9:de:09:43:be:76:84:2c: ea:54:25:d0:6c:5b:bf:02:f2:c5:20:2c:34:5a:8a:48: f5:ad:58:c5:3d:e2:d0:10:30:90:b6:f1:11:90:b6:61: 77:45:ba:39:3e:8e:68:0c:52:dc:49:67:81:c5:68:60: 65:1c:cc:17:19:71:3c:20:9e:70:ce:fd:22:36:5b:f7: 98:e2:ee:46:cf:49:56:bd:af:ef:76:0a:5a:42:63:3b: a8:1a:e4:d9:1b:1d:f2:4f:df:76:6d:e0:fe:de:f4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:75:9b:c6:c6:e4:da:ea:ad:22:64:a0:45:16:8d:6b: c4:cd:73:6b:96:4b:15:01:2b:29:2c:ef:b8:53:49:9e: 84:54:ff:ed:71:7e:e0:da:c3:8b:96:7a:24:ff:0a:71: 0a:f3:0e:1a:7e:f5:57:89:b8:46:30:90:f0:14:74:00: c1:23:e5:c8:23:89:e2:79:ac:93:3c:3b:4a:84:97:12: 7f:d3:c2:a4:af:ae:40:cf:06:8a:bd:d2:1b:f4:4d:55: 9e:a5:26:01:8b:70:41:e0:bd:ef:d7:7b:a0:36:a4:d0: 27:2d:f4:e4:68:70:a0:2b:36:9b:2c:fd:86:a1:14:0f: ab:53:58:9c:c4:3e:14:8f:ff:51:b0:87:3f:55:bd:5d: 3d:d8:03:b9:8c:81:cc:50:df:f3:bc:e0:d1:82:8f:6b: b5:d9:b9:07:25:65:1f:1e:be:c3:59:04:6b:c2:a1:00: fe:a8:52:49:4b:71:2e:00:82:20:ce:bf:f5:e2:a9:28: ff:6d:2a:b6:4c:8d:24:9c:1a:27:7e:6a:d2:3a:30:ed: 17:23:d0:63:29:e7:8b:2b:2c:9b:15:8c:fa:e8:22:ab: 1c:1f:3e:73:b5:08:43:6f:cc:89:ce:4e:10:49:29:e7: 87:17:7d:18:45:bf:95:6b:f8:70:df:f3:a2:19:d3:04 Fingerprint (SHA-256): EE:BB:4A:E7:7D:E5:1B:03:5B:87:83:12:D0:F7:75:F9:4B:07:52:C8:9A:7E:41:00:53:62:E5:F8:31:E6:49:52 Fingerprint (SHA1): AB:52:D4:FE:94:59:7E:0D:FB:DD:81:8B:27:82:43:3C:D4:21:F2:6C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13545: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202229 (0x19581235) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:25:03 2016 Not After : Sun Apr 25 21:25:03 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:5b:09:72:44:b6:52:79:83:c6:f4:48:dd:8d:49:ea: eb:0c:f8:f8:5c:ee:dc:86:a2:f2:eb:90:c4:42:39:a3: e7:65:ff:be:e9:94:c3:df:2b:af:a9:1b:b0:9c:36:f7: ea:16:fa:4d:25:d7:87:ac:bc:62:96:93:a6:6a:3b:a3: dd:cf:21:8e:b1:74:65:66:18:c3:60:ad:d9:01:b7:d1: 21:c5:d8:5e:0c:fd:58:2d:99:e2:8f:31:0b:e8:c2:e7: c2:c8:fb:42:c4:d7:e9:52:d6:38:14:5f:40:5e:b8:4a: 30:22:9b:8f:8d:33:b9:0e:44:c3:0a:58:48:be:4c:9a: 4b:d3:c8:7b:b7:43:2f:3d:2a:8f:cf:ee:c1:ba:76:ef: fb:74:be:34:83:da:82:a5:e0:2e:56:92:48:ba:64:96: 11:0d:01:9f:9d:19:40:0f:7d:50:2c:a3:a1:22:a1:a6: 0e:bd:7c:41:11:4c:8f:eb:3b:7e:13:cc:e9:8b:6c:3a: b9:a0:6f:b6:43:9a:2b:4d:a7:42:f1:99:a6:9b:62:77: 4f:e5:1c:c1:50:f5:46:a4:dc:40:0f:bf:82:65:aa:0f: 1b:fe:12:d2:10:7f:67:e4:3d:07:37:d2:e4:ad:8b:3f: 03:e5:d5:62:a1:cb:e4:e2:23:af:0c:4a:9c:8a:fd:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:4e:ae:8e:a0:c1:4d:e3:55:fc:7d:6a:49:9c:45:13: a5:13:03:b9:da:c7:d7:72:b4:d2:08:22:59:67:4c:35: 5f:c9:69:e7:bd:de:a3:34:f0:e4:ab:50:16:05:71:e5: ef:36:fa:92:8f:d5:e5:a3:63:b9:e6:c6:e8:e2:f2:8a: 36:11:d4:70:f0:f1:cb:d9:33:37:a2:c1:a7:c0:41:e1: 53:de:bd:c5:e4:9b:2d:29:08:f1:2b:c3:7d:13:da:52: 4b:95:a6:59:38:55:29:6a:6c:7a:b8:60:e7:1d:79:22: 2d:c8:2a:ef:ff:58:10:15:51:4b:e9:92:2c:a0:da:49: 19:b0:d5:f1:86:72:17:1e:86:93:ba:ef:29:64:33:df: df:28:c7:d8:3c:6e:16:59:eb:3a:08:e6:10:65:70:7c: 2f:be:cf:e0:aa:c4:f0:b9:2c:4a:f8:c8:d5:18:f8:7e: 5b:ba:e7:d1:4f:8f:df:65:ff:70:88:6a:43:dc:87:1b: 57:5a:d7:91:6d:b9:3d:f5:47:90:74:28:01:9b:43:4a: 0e:48:a5:dd:20:c0:0c:cf:78:d1:c4:9e:60:7b:ff:53: 7c:2c:e1:74:60:11:48:c8:63:6e:b0:2e:ae:b6:ae:3f: de:ee:cc:fa:4e:1d:ac:83:51:f1:75:78:40:f8:a2:8a Fingerprint (SHA-256): 0D:36:21:E1:CC:89:61:33:17:5A:E1:1A:E0:38:57:38:8A:30:63:CE:30:59:F8:74:A9:3B:00:25:4C:46:95:9A Fingerprint (SHA1): 14:B5:05:ED:7B:6B:94:7D:99:D7:20:0D:DF:F4:21:39:DA:81:0C:7A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #13546: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202227 (0x19581233) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:24:35 2016 Not After : Sun Apr 25 21:24:35 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a5:c9:43:36:83:c8:57:0a:b5:d2:96:94:63:79:06: dc:3d:7d:b1:ef:f0:f5:41:e2:f6:bd:60:b7:20:9d:18: 7e:ca:28:ca:cd:4a:a3:95:6f:59:59:dd:17:2c:a7:96: 40:1e:95:07:0d:71:30:d5:44:76:8d:21:e3:7f:55:e5: c5:15:86:c1:82:c9:2a:0e:fa:39:bf:e1:2a:64:e2:8f: 43:85:20:10:fd:28:25:4d:00:3e:5d:7b:10:4f:2c:8c: 96:41:63:d4:ac:d2:ae:3a:7a:5e:58:8b:7d:94:75:ce: ad:ef:8f:95:0e:ed:43:f6:e5:f2:92:09:8d:fb:91:6f: 9a:2a:c9:03:89:7a:f3:33:2b:e0:cb:d4:c7:71:0e:f5: eb:cd:08:bc:66:f9:8e:e8:d9:de:09:43:be:76:84:2c: ea:54:25:d0:6c:5b:bf:02:f2:c5:20:2c:34:5a:8a:48: f5:ad:58:c5:3d:e2:d0:10:30:90:b6:f1:11:90:b6:61: 77:45:ba:39:3e:8e:68:0c:52:dc:49:67:81:c5:68:60: 65:1c:cc:17:19:71:3c:20:9e:70:ce:fd:22:36:5b:f7: 98:e2:ee:46:cf:49:56:bd:af:ef:76:0a:5a:42:63:3b: a8:1a:e4:d9:1b:1d:f2:4f:df:76:6d:e0:fe:de:f4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:75:9b:c6:c6:e4:da:ea:ad:22:64:a0:45:16:8d:6b: c4:cd:73:6b:96:4b:15:01:2b:29:2c:ef:b8:53:49:9e: 84:54:ff:ed:71:7e:e0:da:c3:8b:96:7a:24:ff:0a:71: 0a:f3:0e:1a:7e:f5:57:89:b8:46:30:90:f0:14:74:00: c1:23:e5:c8:23:89:e2:79:ac:93:3c:3b:4a:84:97:12: 7f:d3:c2:a4:af:ae:40:cf:06:8a:bd:d2:1b:f4:4d:55: 9e:a5:26:01:8b:70:41:e0:bd:ef:d7:7b:a0:36:a4:d0: 27:2d:f4:e4:68:70:a0:2b:36:9b:2c:fd:86:a1:14:0f: ab:53:58:9c:c4:3e:14:8f:ff:51:b0:87:3f:55:bd:5d: 3d:d8:03:b9:8c:81:cc:50:df:f3:bc:e0:d1:82:8f:6b: b5:d9:b9:07:25:65:1f:1e:be:c3:59:04:6b:c2:a1:00: fe:a8:52:49:4b:71:2e:00:82:20:ce:bf:f5:e2:a9:28: ff:6d:2a:b6:4c:8d:24:9c:1a:27:7e:6a:d2:3a:30:ed: 17:23:d0:63:29:e7:8b:2b:2c:9b:15:8c:fa:e8:22:ab: 1c:1f:3e:73:b5:08:43:6f:cc:89:ce:4e:10:49:29:e7: 87:17:7d:18:45:bf:95:6b:f8:70:df:f3:a2:19:d3:04 Fingerprint (SHA-256): EE:BB:4A:E7:7D:E5:1B:03:5B:87:83:12:D0:F7:75:F9:4B:07:52:C8:9A:7E:41:00:53:62:E5:F8:31:E6:49:52 Fingerprint (SHA1): AB:52:D4:FE:94:59:7E:0D:FB:DD:81:8B:27:82:43:3C:D4:21:F2:6C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13547: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #13548: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202227 (0x19581233) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:24:35 2016 Not After : Sun Apr 25 21:24:35 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a5:c9:43:36:83:c8:57:0a:b5:d2:96:94:63:79:06: dc:3d:7d:b1:ef:f0:f5:41:e2:f6:bd:60:b7:20:9d:18: 7e:ca:28:ca:cd:4a:a3:95:6f:59:59:dd:17:2c:a7:96: 40:1e:95:07:0d:71:30:d5:44:76:8d:21:e3:7f:55:e5: c5:15:86:c1:82:c9:2a:0e:fa:39:bf:e1:2a:64:e2:8f: 43:85:20:10:fd:28:25:4d:00:3e:5d:7b:10:4f:2c:8c: 96:41:63:d4:ac:d2:ae:3a:7a:5e:58:8b:7d:94:75:ce: ad:ef:8f:95:0e:ed:43:f6:e5:f2:92:09:8d:fb:91:6f: 9a:2a:c9:03:89:7a:f3:33:2b:e0:cb:d4:c7:71:0e:f5: eb:cd:08:bc:66:f9:8e:e8:d9:de:09:43:be:76:84:2c: ea:54:25:d0:6c:5b:bf:02:f2:c5:20:2c:34:5a:8a:48: f5:ad:58:c5:3d:e2:d0:10:30:90:b6:f1:11:90:b6:61: 77:45:ba:39:3e:8e:68:0c:52:dc:49:67:81:c5:68:60: 65:1c:cc:17:19:71:3c:20:9e:70:ce:fd:22:36:5b:f7: 98:e2:ee:46:cf:49:56:bd:af:ef:76:0a:5a:42:63:3b: a8:1a:e4:d9:1b:1d:f2:4f:df:76:6d:e0:fe:de:f4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:75:9b:c6:c6:e4:da:ea:ad:22:64:a0:45:16:8d:6b: c4:cd:73:6b:96:4b:15:01:2b:29:2c:ef:b8:53:49:9e: 84:54:ff:ed:71:7e:e0:da:c3:8b:96:7a:24:ff:0a:71: 0a:f3:0e:1a:7e:f5:57:89:b8:46:30:90:f0:14:74:00: c1:23:e5:c8:23:89:e2:79:ac:93:3c:3b:4a:84:97:12: 7f:d3:c2:a4:af:ae:40:cf:06:8a:bd:d2:1b:f4:4d:55: 9e:a5:26:01:8b:70:41:e0:bd:ef:d7:7b:a0:36:a4:d0: 27:2d:f4:e4:68:70:a0:2b:36:9b:2c:fd:86:a1:14:0f: ab:53:58:9c:c4:3e:14:8f:ff:51:b0:87:3f:55:bd:5d: 3d:d8:03:b9:8c:81:cc:50:df:f3:bc:e0:d1:82:8f:6b: b5:d9:b9:07:25:65:1f:1e:be:c3:59:04:6b:c2:a1:00: fe:a8:52:49:4b:71:2e:00:82:20:ce:bf:f5:e2:a9:28: ff:6d:2a:b6:4c:8d:24:9c:1a:27:7e:6a:d2:3a:30:ed: 17:23:d0:63:29:e7:8b:2b:2c:9b:15:8c:fa:e8:22:ab: 1c:1f:3e:73:b5:08:43:6f:cc:89:ce:4e:10:49:29:e7: 87:17:7d:18:45:bf:95:6b:f8:70:df:f3:a2:19:d3:04 Fingerprint (SHA-256): EE:BB:4A:E7:7D:E5:1B:03:5B:87:83:12:D0:F7:75:F9:4B:07:52:C8:9A:7E:41:00:53:62:E5:F8:31:E6:49:52 Fingerprint (SHA1): AB:52:D4:FE:94:59:7E:0D:FB:DD:81:8B:27:82:43:3C:D4:21:F2:6C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13549: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202229 (0x19581235) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Mon Apr 25 21:25:03 2016 Not After : Sun Apr 25 21:25:03 2021 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:5b:09:72:44:b6:52:79:83:c6:f4:48:dd:8d:49:ea: eb:0c:f8:f8:5c:ee:dc:86:a2:f2:eb:90:c4:42:39:a3: e7:65:ff:be:e9:94:c3:df:2b:af:a9:1b:b0:9c:36:f7: ea:16:fa:4d:25:d7:87:ac:bc:62:96:93:a6:6a:3b:a3: dd:cf:21:8e:b1:74:65:66:18:c3:60:ad:d9:01:b7:d1: 21:c5:d8:5e:0c:fd:58:2d:99:e2:8f:31:0b:e8:c2:e7: c2:c8:fb:42:c4:d7:e9:52:d6:38:14:5f:40:5e:b8:4a: 30:22:9b:8f:8d:33:b9:0e:44:c3:0a:58:48:be:4c:9a: 4b:d3:c8:7b:b7:43:2f:3d:2a:8f:cf:ee:c1:ba:76:ef: fb:74:be:34:83:da:82:a5:e0:2e:56:92:48:ba:64:96: 11:0d:01:9f:9d:19:40:0f:7d:50:2c:a3:a1:22:a1:a6: 0e:bd:7c:41:11:4c:8f:eb:3b:7e:13:cc:e9:8b:6c:3a: b9:a0:6f:b6:43:9a:2b:4d:a7:42:f1:99:a6:9b:62:77: 4f:e5:1c:c1:50:f5:46:a4:dc:40:0f:bf:82:65:aa:0f: 1b:fe:12:d2:10:7f:67:e4:3d:07:37:d2:e4:ad:8b:3f: 03:e5:d5:62:a1:cb:e4:e2:23:af:0c:4a:9c:8a:fd:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:4e:ae:8e:a0:c1:4d:e3:55:fc:7d:6a:49:9c:45:13: a5:13:03:b9:da:c7:d7:72:b4:d2:08:22:59:67:4c:35: 5f:c9:69:e7:bd:de:a3:34:f0:e4:ab:50:16:05:71:e5: ef:36:fa:92:8f:d5:e5:a3:63:b9:e6:c6:e8:e2:f2:8a: 36:11:d4:70:f0:f1:cb:d9:33:37:a2:c1:a7:c0:41:e1: 53:de:bd:c5:e4:9b:2d:29:08:f1:2b:c3:7d:13:da:52: 4b:95:a6:59:38:55:29:6a:6c:7a:b8:60:e7:1d:79:22: 2d:c8:2a:ef:ff:58:10:15:51:4b:e9:92:2c:a0:da:49: 19:b0:d5:f1:86:72:17:1e:86:93:ba:ef:29:64:33:df: df:28:c7:d8:3c:6e:16:59:eb:3a:08:e6:10:65:70:7c: 2f:be:cf:e0:aa:c4:f0:b9:2c:4a:f8:c8:d5:18:f8:7e: 5b:ba:e7:d1:4f:8f:df:65:ff:70:88:6a:43:dc:87:1b: 57:5a:d7:91:6d:b9:3d:f5:47:90:74:28:01:9b:43:4a: 0e:48:a5:dd:20:c0:0c:cf:78:d1:c4:9e:60:7b:ff:53: 7c:2c:e1:74:60:11:48:c8:63:6e:b0:2e:ae:b6:ae:3f: de:ee:cc:fa:4e:1d:ac:83:51:f1:75:78:40:f8:a2:8a Fingerprint (SHA-256): 0D:36:21:E1:CC:89:61:33:17:5A:E1:1A:E0:38:57:38:8A:30:63:CE:30:59:F8:74:A9:3B:00:25:4C:46:95:9A Fingerprint (SHA1): 14:B5:05:ED:7B:6B:94:7D:99:D7:20:0D:DF:F4:21:39:DA:81:0C:7A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #13550: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #13551: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #13552: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #13553: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202227 (0x19581233) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:24:35 2016 Not After : Sun Apr 25 21:24:35 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a5:c9:43:36:83:c8:57:0a:b5:d2:96:94:63:79:06: dc:3d:7d:b1:ef:f0:f5:41:e2:f6:bd:60:b7:20:9d:18: 7e:ca:28:ca:cd:4a:a3:95:6f:59:59:dd:17:2c:a7:96: 40:1e:95:07:0d:71:30:d5:44:76:8d:21:e3:7f:55:e5: c5:15:86:c1:82:c9:2a:0e:fa:39:bf:e1:2a:64:e2:8f: 43:85:20:10:fd:28:25:4d:00:3e:5d:7b:10:4f:2c:8c: 96:41:63:d4:ac:d2:ae:3a:7a:5e:58:8b:7d:94:75:ce: ad:ef:8f:95:0e:ed:43:f6:e5:f2:92:09:8d:fb:91:6f: 9a:2a:c9:03:89:7a:f3:33:2b:e0:cb:d4:c7:71:0e:f5: eb:cd:08:bc:66:f9:8e:e8:d9:de:09:43:be:76:84:2c: ea:54:25:d0:6c:5b:bf:02:f2:c5:20:2c:34:5a:8a:48: f5:ad:58:c5:3d:e2:d0:10:30:90:b6:f1:11:90:b6:61: 77:45:ba:39:3e:8e:68:0c:52:dc:49:67:81:c5:68:60: 65:1c:cc:17:19:71:3c:20:9e:70:ce:fd:22:36:5b:f7: 98:e2:ee:46:cf:49:56:bd:af:ef:76:0a:5a:42:63:3b: a8:1a:e4:d9:1b:1d:f2:4f:df:76:6d:e0:fe:de:f4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:75:9b:c6:c6:e4:da:ea:ad:22:64:a0:45:16:8d:6b: c4:cd:73:6b:96:4b:15:01:2b:29:2c:ef:b8:53:49:9e: 84:54:ff:ed:71:7e:e0:da:c3:8b:96:7a:24:ff:0a:71: 0a:f3:0e:1a:7e:f5:57:89:b8:46:30:90:f0:14:74:00: c1:23:e5:c8:23:89:e2:79:ac:93:3c:3b:4a:84:97:12: 7f:d3:c2:a4:af:ae:40:cf:06:8a:bd:d2:1b:f4:4d:55: 9e:a5:26:01:8b:70:41:e0:bd:ef:d7:7b:a0:36:a4:d0: 27:2d:f4:e4:68:70:a0:2b:36:9b:2c:fd:86:a1:14:0f: ab:53:58:9c:c4:3e:14:8f:ff:51:b0:87:3f:55:bd:5d: 3d:d8:03:b9:8c:81:cc:50:df:f3:bc:e0:d1:82:8f:6b: b5:d9:b9:07:25:65:1f:1e:be:c3:59:04:6b:c2:a1:00: fe:a8:52:49:4b:71:2e:00:82:20:ce:bf:f5:e2:a9:28: ff:6d:2a:b6:4c:8d:24:9c:1a:27:7e:6a:d2:3a:30:ed: 17:23:d0:63:29:e7:8b:2b:2c:9b:15:8c:fa:e8:22:ab: 1c:1f:3e:73:b5:08:43:6f:cc:89:ce:4e:10:49:29:e7: 87:17:7d:18:45:bf:95:6b:f8:70:df:f3:a2:19:d3:04 Fingerprint (SHA-256): EE:BB:4A:E7:7D:E5:1B:03:5B:87:83:12:D0:F7:75:F9:4B:07:52:C8:9A:7E:41:00:53:62:E5:F8:31:E6:49:52 Fingerprint (SHA1): AB:52:D4:FE:94:59:7E:0D:FB:DD:81:8B:27:82:43:3C:D4:21:F2:6C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13554: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202231 (0x19581237) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 21:25:24 2016 Not After : Sun Apr 25 21:25:24 2066 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:93:9b:76:36:46:8b:d5:2a:7d:17:4c:d9:09:be:ed: 42:60:22:0c:03:7b:11:4e:2d:f9:99:bd:21:22:57:c3: 2b:3d:6b:06:1a:37:7a:f7:5c:8d:f7:ef:ea:5d:0c:42: 8a:39:66:b2:3f:29:27:99:b9:71:a5:bd:52:fd:82:45: 02:8c:b3:53:76:d5:26:4a:67:15:4a:3c:9b:13:49:f5: 69:16:8f:4f:c7:13:85:eb:74:da:88:eb:42:ac:e2:c6: b5:ff:81:b3:67:b1:b9:92:35:d1:86:ed:45:d2:7f:e4: 1c:5c:63:40:91:78:61:55:50:41:ba:5d:33:1a:32:2f: 97:99:06:94:32:90:7f:5e:21:cd:94:4d:8e:de:ca:66: 64:a1:99:23:7e:73:94:a4:60:b1:96:27:cb:3c:07:01: 9d:3d:d5:19:c7:18:37:eb:62:f0:cc:7e:fd:60:ab:97: 37:2c:82:e5:71:df:37:ce:4b:72:9e:8f:12:45:a2:da: f3:ed:f8:c0:16:5e:eb:4b:b2:29:56:da:de:87:95:a9: bf:12:f8:e5:d5:66:89:c1:00:31:f4:9c:d7:84:6a:53: 92:95:46:fc:22:f8:98:9f:fb:f9:e0:08:2e:41:b7:51: 99:ac:0a:eb:4a:aa:a5:28:fe:7d:ee:9f:81:a1:b0:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:3d:d8:46:fb:84:ac:d7:d4:dc:22:0d:27:e6:e2:27: 96:8d:88:69:18:cc:35:74:f2:22:45:92:b0:48:39:2a: 96:92:f8:64:87:42:61:74:75:d7:32:99:41:73:64:8e: bd:56:24:d5:1d:60:76:b3:1c:57:87:6f:ae:aa:57:79: f7:15:04:05:19:84:24:5d:4b:39:6f:e4:54:7d:2d:78: 51:6b:4d:9d:c9:ce:fd:f9:f5:19:43:a2:3b:fc:52:8c: f1:26:df:d4:8b:89:63:cb:85:d4:05:e7:3f:a4:da:3e: d1:72:1c:c5:56:96:86:f0:0b:a8:f7:fd:1d:25:8a:29: 40:5e:6b:e4:d4:7c:d4:d8:3a:73:b7:bd:35:8f:4f:6a: ec:3b:ea:30:59:94:53:50:f1:98:87:53:98:c6:3e:11: 6a:65:14:ae:75:be:df:ff:c4:3d:31:87:72:4c:c9:c8: 9e:97:19:d0:9f:b6:97:53:43:15:09:c7:03:ca:79:b0: d7:ca:3e:fb:dc:e9:a2:dd:50:9c:12:34:4f:ac:2e:09: e4:6e:f3:2e:0d:5e:6b:bf:f8:dc:f9:14:a7:f2:1d:04: 95:99:cd:a9:96:c5:1b:18:a0:1b:d5:ac:47:d2:24:c0: 74:40:79:4b:3b:c5:26:97:21:f3:11:2b:45:81:12:00 Fingerprint (SHA-256): 46:54:76:7F:D2:78:A7:FB:4C:BF:C9:EE:CD:56:1F:94:69:0B:69:D9:B4:21:37:EC:BF:94:4C:8D:20:89:34:EA Fingerprint (SHA1): 96:32:4F:DD:83:1F:A1:2C:E5:8D:68:C6:CB:D4:C0:8A:CD:DB:77:03 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #13555: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202227 (0x19581233) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Mon Apr 25 21:24:35 2016 Not After : Sun Apr 25 21:24:35 2066 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:a5:c9:43:36:83:c8:57:0a:b5:d2:96:94:63:79:06: dc:3d:7d:b1:ef:f0:f5:41:e2:f6:bd:60:b7:20:9d:18: 7e:ca:28:ca:cd:4a:a3:95:6f:59:59:dd:17:2c:a7:96: 40:1e:95:07:0d:71:30:d5:44:76:8d:21:e3:7f:55:e5: c5:15:86:c1:82:c9:2a:0e:fa:39:bf:e1:2a:64:e2:8f: 43:85:20:10:fd:28:25:4d:00:3e:5d:7b:10:4f:2c:8c: 96:41:63:d4:ac:d2:ae:3a:7a:5e:58:8b:7d:94:75:ce: ad:ef:8f:95:0e:ed:43:f6:e5:f2:92:09:8d:fb:91:6f: 9a:2a:c9:03:89:7a:f3:33:2b:e0:cb:d4:c7:71:0e:f5: eb:cd:08:bc:66:f9:8e:e8:d9:de:09:43:be:76:84:2c: ea:54:25:d0:6c:5b:bf:02:f2:c5:20:2c:34:5a:8a:48: f5:ad:58:c5:3d:e2:d0:10:30:90:b6:f1:11:90:b6:61: 77:45:ba:39:3e:8e:68:0c:52:dc:49:67:81:c5:68:60: 65:1c:cc:17:19:71:3c:20:9e:70:ce:fd:22:36:5b:f7: 98:e2:ee:46:cf:49:56:bd:af:ef:76:0a:5a:42:63:3b: a8:1a:e4:d9:1b:1d:f2:4f:df:76:6d:e0:fe:de:f4:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:75:9b:c6:c6:e4:da:ea:ad:22:64:a0:45:16:8d:6b: c4:cd:73:6b:96:4b:15:01:2b:29:2c:ef:b8:53:49:9e: 84:54:ff:ed:71:7e:e0:da:c3:8b:96:7a:24:ff:0a:71: 0a:f3:0e:1a:7e:f5:57:89:b8:46:30:90:f0:14:74:00: c1:23:e5:c8:23:89:e2:79:ac:93:3c:3b:4a:84:97:12: 7f:d3:c2:a4:af:ae:40:cf:06:8a:bd:d2:1b:f4:4d:55: 9e:a5:26:01:8b:70:41:e0:bd:ef:d7:7b:a0:36:a4:d0: 27:2d:f4:e4:68:70:a0:2b:36:9b:2c:fd:86:a1:14:0f: ab:53:58:9c:c4:3e:14:8f:ff:51:b0:87:3f:55:bd:5d: 3d:d8:03:b9:8c:81:cc:50:df:f3:bc:e0:d1:82:8f:6b: b5:d9:b9:07:25:65:1f:1e:be:c3:59:04:6b:c2:a1:00: fe:a8:52:49:4b:71:2e:00:82:20:ce:bf:f5:e2:a9:28: ff:6d:2a:b6:4c:8d:24:9c:1a:27:7e:6a:d2:3a:30:ed: 17:23:d0:63:29:e7:8b:2b:2c:9b:15:8c:fa:e8:22:ab: 1c:1f:3e:73:b5:08:43:6f:cc:89:ce:4e:10:49:29:e7: 87:17:7d:18:45:bf:95:6b:f8:70:df:f3:a2:19:d3:04 Fingerprint (SHA-256): EE:BB:4A:E7:7D:E5:1B:03:5B:87:83:12:D0:F7:75:F9:4B:07:52:C8:9A:7E:41:00:53:62:E5:F8:31:E6:49:52 Fingerprint (SHA1): AB:52:D4:FE:94:59:7E:0D:FB:DD:81:8B:27:82:43:3C:D4:21:F2:6C Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #13556: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #13557: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #13558: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #13559: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #13560: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #13561: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 425202232 (0x19581238) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Mon Apr 25 21:25:32 2016 Not After : Sun Apr 25 21:25:32 2021 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:21:bd:50:1e:15:b4:ca:a8:c2:6b:ba:eb:d1:69:c3: 09:f1:b0:58:b7:52:51:61:45:42:fe:35:4f:88:ba:c2: cc:5d:b2:bc:f9:00:74:e4:a5:a9:2a:2b:d9:76:e9:c1: 28:51:c7:ff:20:c3:94:cc:a6:6a:3a:82:3c:b4:42:61: 0a:66:99:ab:47:ff:1f:47:72:53:c8:6f:49:51:90:a4: ac:a9:d5:a8:a1:1a:a6:e0:32:98:33:96:87:85:6e:9b: a9:77:2f:f9:e7:8d:17:25:4f:de:3e:23:2b:c6:d8:61: 3d:cb:a7:7f:6d:af:6b:aa:23:d4:ea:12:82:4d:81:c9: 53:3c:0a:07:5b:04:92:e0:c8:68:81:2c:83:2c:ed:0d: 65:33:63:9c:00:d2:f9:98:36:76:34:18:80:12:dd:65: 2b:89:1f:82:b3:1e:75:81:67:2e:25:d9:77:85:2a:ab: 1d:06:59:af:88:17:29:c5:3d:3d:8f:3e:88:9f:f0:87: 22:86:c9:0e:33:d0:6a:c0:54:3b:75:3e:2f:76:7d:d4: b4:cf:0d:f3:21:6f:d2:74:05:c4:22:3f:11:f9:27:54: 53:39:60:57:dc:a2:e6:55:d0:89:73:91:18:b1:85:17: c0:1d:d7:40:2e:5b:f3:ee:d9:40:06:6f:15:0a:5b:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:a5:ca:4e:6a:c8:8f:ed:cc:91:66:da:ac:35:f5:77: f7:8d:64:9b:57:79:71:38:20:2d:e1:1c:cc:3e:52:f5: 2f:f6:0c:d3:90:ca:6a:8a:d0:70:be:c2:b2:85:37:ed: 35:70:13:60:fc:b4:cb:bb:cd:27:28:96:0c:67:b4:6a: 88:aa:77:95:27:b0:4c:2c:ea:4f:9e:9c:58:0f:9f:0e: f7:f9:be:e2:e2:68:6b:7d:66:56:98:e3:af:08:93:73: cc:a2:d2:eb:75:cc:75:ce:1a:3a:5b:d8:17:f3:e5:5c: 87:87:5c:9e:a1:fd:b5:ba:9b:f9:55:c4:49:4c:5f:9c: bc:e9:79:aa:c4:66:a3:44:cc:4d:47:87:3d:3d:4d:0c: d7:d9:7d:14:3a:f1:75:26:59:2b:8d:7b:13:4a:6c:96: d8:f1:7d:bb:cf:29:78:3f:19:c8:94:1b:3d:f9:c8:24: 2c:d9:6c:9f:7a:7b:97:4e:74:30:79:47:93:53:68:c6: 59:4b:b2:26:07:29:37:4d:fe:9c:02:65:7e:9d:64:d4: aa:95:f7:9a:38:51:66:7a:5f:ed:a3:44:3f:ce:4f:7f: ed:cb:7d:87:43:9f:77:01:5e:81:41:9f:f5:af:c3:df: 2e:b4:76:51:aa:d6:a3:d8:ba:bd:e4:53:a3:f6:44:6a Fingerprint (SHA-256): 73:CA:09:D1:4A:58:02:79:5B:DB:AA:69:77:15:AE:E6:C1:20:5B:59:29:D5:35:03:86:9E:CD:F2:E2:19:DB:18 Fingerprint (SHA1): 56:CB:C3:FC:2D:7E:65:4A:FD:75:9F:DC:70:6D:1C:1E:4F:3C:90:22 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #13562: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #13563: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #13564: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #13565: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #13566: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #13567: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #13568: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #13569: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #13570: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #13571: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #13572: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #13573: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #13574: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #13575: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #13576: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Dec 04 01:22:58 2013 Not After : Mon Dec 04 01:22:58 2023 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:a2:61:5c:94:82:74:ad:40:d1:ea:b6:ba:d2:e5:49: 0e:fa:dc:08:c1:30:0e:1e:ca:b2:db:2c:ef:84:25:03: 7f:18:db:32:ec:d9:18:75:8d:32:bc:86:93:ea:92:8c: c7:e2:a5:24:64:83:03:89:1f:97:aa:a6:42:6b:5b:a4: 0d:ae:51:8a:56:b3:b0:38:0c:d6:32:b7:a1:05:53:b1: 75:87:0c:33:76:28:02:36:e1:0e:d8:6b:a7:60:36:26: 7b:d9:99:a3:b1:ed:61:a5:fd:dc:4c:33:a0:68:73:5f: be:96:e0:79:c5:ca:70:29:93:51:0d:63:37:c1:c9:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 99:2b:25:2a:61:3a:ad:77:42:92:ec:03:db:87:48:21: a9:86:67:80:3e:99:dd:13:d7:aa:53:10:01:4d:7d:03: 2b:d0:8e:03:8b:b0:b7:38:0b:24:12:74:45:90:95:99: b6:d6:9d:e2:2d:ba:28:8f:59:57:1b:c1:44:97:a0:d8: 30:d3:43:38:68:97:29:40:cf:24:61:29:6c:4d:6d:24: fe:73:1c:34:2d:be:0d:1c:8b:f3:6c:eb:0c:d7:d0:c6: 5c:72:ca:41:74:30:59:94:9d:95:04:59:6a:fa:65:ca: f4:86:72:8a:a0:59:b6:31:25:ad:e8:2a:f0:d1:57:95 Fingerprint (SHA-256): A5:97:EA:1F:13:1C:89:B0:76:A6:36:A7:F2:59:9D:81:92:15:A3:49:71:D0:2F:24:D3:F0:19:7B:46:EB:38:C1 Fingerprint (SHA1): 56:18:A9:C1:8A:81:01:7A:FC:AA:54:68:9F:6E:7F:3C:0F:11:CA:41 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #13577: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #13578: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #13579: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #13580: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #13581: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #13582: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jan 04 01:22:59 2014 Not After : Sat Nov 04 01:22:59 2023 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:de:c4:e3:a7:09:e3:b3:85:70:e6:da:bc:af:24:28: c0:ac:99:38:ae:ea:b9:32:a5:57:9d:1c:77:06:24:c4: 71:69:63:73:97:44:44:35:9f:e2:37:71:8d:bd:ef:04: 4d:cc:a0:31:0b:fc:db:6d:58:70:c9:28:61:38:f6:ba: ca:1b:ee:0e:e1:b4:99:78:95:78:73:e2:67:21:6d:a9: f2:4a:29:1c:61:0a:21:0c:d1:70:0d:38:fc:95:75:85: 49:e0:4b:e0:1b:69:96:8d:07:f9:ae:71:f3:cf:25:34: a1:d2:63:bb:d0:25:96:0f:c2:a6:7f:c2:47:3d:ed:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Minimum: 0 (0x0) Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:54:cb:5c:0a:63:14:04:d9:6f:63:d6:22:89:45:91: 33:d6:f3:66:c4:06:cc:5f:d0:91:9c:e8:66:58:c5:89: 3f:10:68:ec:08:66:80:05:e2:f6:25:d9:15:18:f5:8a: 9b:71:23:af:80:79:eb:a3:94:26:d7:60:50:4c:3b:df: 46:70:2f:d4:51:6d:b9:e2:ac:57:28:2a:c5:c4:2d:1b: c8:cb:8d:43:6a:4e:a8:27:9d:4b:a9:9c:07:11:d2:4e: 5e:98:db:ec:02:e2:74:a6:80:a9:bd:fb:03:e2:77:bd: df:23:0c:ba:2b:be:44:e6:20:6d:4e:fa:79:41:4e:34 Fingerprint (SHA-256): 63:EF:E9:FE:7D:06:80:C9:BF:27:95:BB:FB:0F:A5:92:23:5E:C7:AE:BC:7D:E1:39:BC:4A:B3:E3:47:5C:01:29 Fingerprint (SHA1): 56:B5:8D:10:3C:0D:28:DC:F1:80:FB:2E:C4:3C:85:8B:20:02:68:CA Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #13583: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #13584: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.21.0/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #13585: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED trying to kill httpserv with PID 456 at Mon Apr 25 21:26:15 UTC 2016 kill -USR1 456 httpserv: normal termination httpserv -b -p 9719 2>/dev/null; httpserv with PID 456 killed at Mon Apr 25 21:26:15 UTC 2016 TIMESTAMP chains END: Mon Apr 25 21:26:15 UTC 2016 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64= NSS_CYCLES="" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains" NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr" NSS_SSL_RUN="cov auth stapling stress" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= Tests summary: -------------- Passed: 13585 Failed: 0 Failed with core: 0 Unknown status: 0 ~/build/BUILD/nss-3.21.0 + popd + killall selfserv_9709 selfserv_9709: no process found + : ++ grep -c FAILED ./tests_results/security/localhost.1/output.log + TEST_FAILURES=0 okay: test suite detected no failures test suite completed + GREP_EXIT_STATUS=1 + '[' 1 -eq 1 ']' + echo 'okay: test suite detected no failures' + echo 'test suite completed' + exit 0 Processing files: nss-3.21.0-9.el7.armv7hl Provides: config(nss) = 3.21.0-9.el7 libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.10.2) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.11.9) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.10) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.4) libnss3.so(NSS_3.12.5) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.7) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.13.2) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.1) libnss3.so(NSS_3.14.3) libnss3.so(NSS_3.15) libnss3.so(NSS_3.15.4) libnss3.so(NSS_3.16.1) libnss3.so(NSS_3.16.2) libnss3.so(NSS_3.18) libnss3.so(NSS_3.19) libnss3.so(NSS_3.19.1) libnss3.so(NSS_3.2) libnss3.so(NSS_3.2.1) libnss3.so(NSS_3.21) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.7.1) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssckbi.so libnssckbi.so(NSS_3.1) libnsspem.so libnsspem.so(NSS_3.1) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.12.10) libsmime3.so(NSS_3.12.2) libsmime3.so(NSS_3.13) libsmime3.so(NSS_3.15) libsmime3.so(NSS_3.16) libsmime3.so(NSS_3.18) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.2.1) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.4.1) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.7) libsmime3.so(NSS_3.7.2) libsmime3.so(NSS_3.8) libsmime3.so(NSS_3.9) libsmime3.so(NSS_3.9.3) libssl3.so libssl3.so(NSS_3.11.4) libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.10) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.14) libssl3.so(NSS_3.15) libssl3.so(NSS_3.15.4) libssl3.so(NSS_3.2) libssl3.so(NSS_3.2.1) libssl3.so(NSS_3.20) libssl3.so(NSS_3.21) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) nss = 3.21.0-9.el7 nss(armv7hl-32) = 3.21.0-9.el7 Requires(interp): /bin/sh /bin/sh /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): /bin/sh /usr/sbin/update-alternatives Requires(postun): /bin/sh /usr/sbin/update-alternatives Requires(posttrans): /bin/sh Requires: ld-linux-armhf.so.3 ld-linux-armhf.so.3(GLIBC_2.4) libc.so.6 libc.so.6(GLIBC_2.4) libdl.so.2 libfreebl3.so libgcc_s.so.1 libgcc_s.so.1(GCC_3.5) libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.3) libnss3.so(NSS_3.15) libnss3.so(NSS_3.19.1) libnss3.so(NSS_3.2) libnss3.so(NSS_3.21) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnssdbm3.so libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.3) libnssutil3.so(NSSUTIL_3.12.5) libnssutil3.so(NSSUTIL_3.13) libnssutil3.so(NSSUTIL_3.14) libnssutil3.so(NSSUTIL_3.15) libnssutil3.so(NSSUTIL_3.17.1) libnssutil3.so(NSSUTIL_3.21) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.4) libsoftokn3.so libz.so.1 rtld(GNU_HASH) Processing files: nss-tools-3.21.0-9.el7.armv7hl Provides: nss-tools = 3.21.0-9.el7 nss-tools(armv7hl-32) = 3.21.0-9.el7 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: ld-linux-armhf.so.3 ld-linux-armhf.so.3(GLIBC_2.4) libc.so.6 libc.so.6(GLIBC_2.4) libdl.so.2 libgcc_s.so.1 libgcc_s.so.1(GCC_3.5) libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.14) libnss3.so(NSS_3.14.1) libnss3.so(NSS_3.15) libnss3.so(NSS_3.16.1) libnss3.so(NSS_3.16.2) libnss3.so(NSS_3.18) libnss3.so(NSS_3.2) libnss3.so(NSS_3.3) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.7) libnssutil3.so(NSSUTIL_3.15) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.4) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.9.3) libsoftokn3.so libssl3.so libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13.2) libssl3.so(NSS_3.14) libssl3.so(NSS_3.15) libssl3.so(NSS_3.15.4) libssl3.so(NSS_3.2) libssl3.so(NSS_3.20) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) libz.so.1 rtld(GNU_HASH) Processing files: nss-sysinit-3.21.0-9.el7.armv7hl Provides: libnsssysinit.so nss-sysinit = 3.21.0-9.el7 nss-sysinit(armv7hl-32) = 3.21.0-9.el7 nss-system-init Requires(interp): /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): coreutils sed Requires: /bin/sh ld-linux-armhf.so.3 ld-linux-armhf.so.3(GLIBC_2.4) libc.so.6 libc.so.6(GLIBC_2.4) libdl.so.2 libgcc_s.so.1 libgcc_s.so.1(GCC_3.5) libnspr4.so libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.14) libplc4.so libplds4.so libpthread.so.0 rtld(GNU_HASH) Processing files: nss-devel-3.21.0-9.el7.armv7hl Provides: nss-devel = 3.21.0-9.el7 nss-devel(armv7hl-32) = 3.21.0-9.el7 nss-static = 3.21.0-9.el7 pkgconfig(nss) = 3.21.0 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /bin/sh /usr/bin/pkg-config pkgconfig(nspr) >= 4.11.0 pkgconfig(nss-util) >= 3.21.0 Processing files: nss-pkcs11-devel-3.21.0-9.el7.armv7hl Provides: nss-pkcs11-devel = 3.21.0-9.el7 nss-pkcs11-devel(armv7hl-32) = 3.21.0-9.el7 nss-pkcs11-devel-static = 3.21.0-9.el7 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Processing files: nss-debuginfo-3.21.0-9.el7.armv7hl Provides: nss-debuginfo = 3.21.0-9.el7 nss-debuginfo(armv7hl-32) = 3.21.0-9.el7 Requires(rpmlib): rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 rpmlib(CompressedFileNames) <= 3.0.4-1 Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm Wrote: /builddir/build/RPMS/nss-3.21.0-9.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-tools-3.21.0-9.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-sysinit-3.21.0-9.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-devel-3.21.0-9.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-pkcs11-devel-3.21.0-9.el7.armv7hl.rpm Wrote: /builddir/build/RPMS/nss-debuginfo-3.21.0-9.el7.armv7hl.rpm Executing(%clean): /bin/sh -e /var/tmp/rpm-tmp.Et2KhW + umask 022 + cd /builddir/build/BUILD + cd nss-3.21.0 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.21.0-9.el7.arm + exit 0 Child return code was: 0 LEAVE do -->